DOD Business Systems Modernization
Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments
Gao ID: GAO-04-731R May 17, 2004
The Department of Defense's (DOD) long-standing business systems problems adversely affect the economy, effectiveness, and efficiency of its business operations and have resulted in a lack of adequate transparency and appropriate accountability across all of its major business areas. In July 2001, DOD initiated a program to, among other things, develop a DOD business enterprise architecture (architecture). This effort is an essential part of the Secretary of Defense's broad initiative to "transform the way the department works and what it works on." Because DOD is one of the largest and most complex organizations in the world, overhauling its business operations and supporting systems represents a huge management challenge. In fiscal year 2003, DOD reported that its operations involved over $1 trillion in assets, nearly $1.6 trillion in liabilities, approximately 3.3 million military and civilian personnel, and disbursements of over $416 billion. To support its business operations, DOD reported that it relies on about 2,300 business systems, including accounting, acquisition, logistics, and personnel systems. The department requested about $19 billion--about $4.8 billion for business systems modernization and about $14 billion for operation and maintenance of these systems--in fiscal year 2004. Recognizing the importance of DOD's efforts to transform its business operations and systems through the use of an enterprise architecture, the Congress included provisions in the National Defense Authorization Act for Fiscal Year 2003 that were aimed at developing and effectively implementing a well-defined architecture. Specifically, section 1004 of this act required that DOD (1) develop, by May 1, 2003, a financial management enterprise architecture and a transition plan for implementing the architecture that meets certain requirements and (2) review financial system improvements with proposed obligations of funds in amounts exceeding $1 million to determine if those system improvements meet specific conditions that are called for in the act. The act also directed us to assess actions that DOD has taken to comply with these requirements. In July and September 2003, we reported on DOD's actions and made a number of recommendations to assist DOD in its efforts to effectively develop and implement an architecture and to guide and constrain its business systems investments. The act further requires that the Secretary of Defense submit an annual report not later than March 15 of each year from 2004 through 2007 to congressional defense committees on its progress in implementing the architecture, including the transition plan. Additionally, the act directs us to submit to congressional defense committees, within 60 days of DOD's report submission, an assessment of DOD's actions taken to comply with these requirements. DOD submitted its first annual report on March 15, 2004. This report is our assessment of DOD's March 15, 2004 report. We determined (1) the actions DOD has taken to address our previous recommendations regarding the development and implementation of the architecture and (2) the actions DOD is taking to ensure its ongoing and planned investments will be consistent with its evolving architecture.
Since our last review--and after 3 years of effort and over $203 million in obligations--we have not seen any significant change in the content of DOD's architecture or in DOD's approach to investing billions of dollars annually in existing and new systems. Few actions have been taken to address the recommendations we made in our September 2003 report, which were aimed at improving DOD's plans for developing the next version of the architecture and implementing the institutional means for selecting and controlling both planned and ongoing business systems investments. To DOD's credit, it has established, for example, a group under the Business Management Modernization Program (program) steering committee to facilitate communication and coordination across the domains for modernization program activities, including extending and evolving the architecture. However, DOD has not yet adopted key architecture management best practices and has not added the scope and detail to its architecture that we previously identified as missing. Additionally, the department does not have reasonable assurance that it is in compliance with the National Defense Authorization Act for Fiscal Year 2003, which requires DOD's Comptroller to review all system improvements with obligations exceeding $1 million. While DOD has recently issued a policy that assigns investment management responsibilities to the domains, the policy has not yet been implemented, and DOD has not clearly defined the roles and responsibilities of the domains, established common investment criteria, and conducted a comprehensive review of its existing business systems to ensure that they are consistent with the architecture. Further, each of the DOD components continues to receive its own funding and make its own parochial investment decisions. The department acknowledges that it still has much more to do, including developing the architecture to a necessary level of detail, defining specific performance metrics, and clarifying the roles and responsibilities associated with managing the domains' portfolios of business systems and ensuring that these systems comply with the architecture. The limited progress that DOD has made is due, in part, to the lack of clearly assigned, accountable, and sustained program leadership and to changes in the program direction and priorities. Our experience in reviewing other challenged architecture efforts shows that these efforts have suffered from limited senior management understanding of and commitment to an architecture and from cultural resistance to having and using one.
GAO-04-731R, DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments
This is the accessible text file for GAO report number GAO-04-731R
entitled 'DOD Business Systems Modernization: Limited Progress in
Development of Business Enterprise Architecture and Oversight of
Information Technology Investments' which was released on May 17, 2004.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
May 17, 2004:
Congressional Defense Committees:
Subject: DOD Business Systems Modernization: Limited Progress in
Development of Business Enterprise Architecture and Oversight of
Information Technology Investments:
The Department of Defense's (DOD) long-standing business systems
problems adversely affect the economy, effectiveness, and efficiency of
its business operations and have resulted in a lack of adequate
transparency and appropriate accountability across all of its major
business areas. To help the department transform its operations, we
recommended[Footnote 1] in 2001 that DOD develop an enterprise
architecture to guide and constrain its almost $20 billion annual
investment in business systems and that it establish the investment
controls needed to implement this architecture. In July 2001, DOD
initiated a program[Footnote 2] to, among other things, develop a DOD
business enterprise architecture (architecture). This effort is an
essential part of the Secretary of Defense's broad initiative to
"transform the way the department works and what it works on.":
Because DOD is one of the largest and most complex organizations in the
world, overhauling its business operations and supporting systems
represents a huge management challenge. In fiscal year 2003, DOD
reported that its operations involved over $1 trillion in assets,
nearly $1.6 trillion in liabilities, approximately 3.3 million military
and civilian personnel, and disbursements of over $416 billion. To
support its business operations, DOD reported that it relies on about
2,300 business systems, including accounting, acquisition, logistics,
and personnel systems. The department requested about $19 billionóabout
$4.8 billion for business systems modernization and about $14 billion
for operation and maintenance of these systemsóin fiscal year 2004.
ecognizing the importance of DOD's efforts to transform its business
operations and systems through the use of an enterprise architecture,
the Congress included provisions in the National Defense Authorization
Act for Fiscal Year 2003[Footnote 3] that were aimed at developing and
effectively implementing a well-defined architecture. Specifically,
section 1004 of this act required that DOD (1) develop, by May 1, 2003,
a financial management enterprise architecture[Footnote 4] and a
transition plan for implementing the architecture that meets certain
requirements and (2) review financial system improvements with proposed
obligations of funds in amounts exceeding $1 million to determine if
those system improvements meet specific conditions that are called for
in the act. The act also directed us to assess actions that DOD has
taken to comply with these requirements. In July[Footnote 5] and
September 2003,[Footnote 6] we reported on DOD's actions and made a
number of recommendations to assist DOD in its efforts to effectively
develop and implement an architecture and to guide and constrain its
business systems investments.
The act further requires that the Secretary of Defense submit an annual
report not later than March 15 of each year from 2004 through 2007 to
congressional defense committees on its progress in implementing the
architecture, including the transition plan. Additionally, the act
directs us to submit to congressional defense committees, within 60
days of DOD's report submission, an assessment of DOD's actions taken
to comply with these requirements. (See enc. I for a copy of section
1004 of the act.) DOD submitted its first annual report on March 15,
2004. This report is our assessment of DOD's March 15, 2004 report. As
agreed with your offices, we determined (1) the actions DOD has taken
to address our previous recommendations regarding the development and
implementation of the architecture and (2) the actions DOD is taking to
ensure its ongoing and planned investments will be consistent with its
evolving architecture.
We performed our work from December 2003 through April 2004 in
accordance with U.S. generally accepted government auditing standards.
Details on our scope and methodology are in enclosure II.
Results in Brief:
Since our last review--and after 3 years of effort and over $203
million in obligations--we have not seen any significant change in the
content of DOD's architecture or in DOD's approach to investing
billions of dollars annually in existing and new systems. Few actions
have been taken to address the recommendations we made in our September
2003[Footnote 7] report, which were aimed at improving DOD's plans for
developing the next version of the architecture and implementing the
institutional means for selecting and controlling both planned and
ongoing business systems investments. To DOD's credit, it has
established, for example, a group under the Business Management
Modernization Program (program) steering committe[Footnote 8]eE to
facilitate communication and coordination across the domai[Footnote
9]ns for modernization program activities, including extending and
evolving the architecture. However, DOD has not yet adopted key
architecture management best practi[Footnote 10]ces and has not added
the scope and detail to its architecture that we previously identified
as missing. Further, DOD has not yet implemented an effective
management structure and processes to provide adequate control and
accountability over its $5 billion annual investment in business
systems modernization. Additionally, the department does not have
reasonable assurance that it is in compliance with the National Defense
Authorization Act for Fiscal Year 2003, which requires DOD's
Comptroller to review all system improvements with obligations
exceeding $1 million.
Regarding architecture management best practices, DOD has not yet
implemented key elements, such as assigning accountability and
responsibility for directing, overseeing, and approving the
architecture. In addition, it has not explicitly defined performance
metrics to evaluate the architecture's quality, content, and utility.
With respect to the architectural content, DOD's latest version of the
architecture does not include many of the key elements of a well-
defined "As Is," "To Be," and transition plan that we previously
reported as not being satisfied.[Footnote 11] For example, the "To Be"
environment does not provide sufficient descriptive content related to
future business operations and supporting technology to permit
effective acquisition and implementation of system solutions and
associated operational change. Similarly, DOD's verification and
validation contractor has concluded that this latest version of the
architecture retains most of the limitations that the initial version
had. Moreover, DOD has not yet defined specific plans, including
milestones, detailing how it intends to extend and evolve the
architecture to incorporate this missing content. For example, the
program's first objective for increment one--to enable asset
accountability, total force visibility, and an unqualified audit
opinion on DOD's fiscal year 2007 consolidated financial statements--is
not supported by a DOD-wide plan of action, and the individual
component plans for accomplishing this objective may not be linked to
the program's activities, including the architecture. According to DOD,
it will not have the plans on how the capabilities for increment one
will be achieved until August 2004.
DOD has also made limited progress in addressing our recommendations
aimed at establishing and implementing effective investment management
processes and, therefore, continues to lack effective management
oversight and control over ongoing business systems modernization
investments. While DOD has recently issued a policy that assigns
investment management responsibilities to the domains, the policy has
not yet been implemented, and DOD has not clearly defined the roles and
responsibilities of the domains, established common investment
criteria, and conducted a comprehensive review of its existing business
systems to ensure that they are consistent with the architecture.
Further, each of the DOD components continues to receive its own
funding and make its own parochial investment decisions. Moreover, DOD
has not yet established and implemented an effective process for
ensuring that system improvements with obligations exceeding $1 million
are submitted to DOD's Comptroller for review and to determine whether
they are consistent with the architecture, as required by the National
Defense Authorization Act for Fiscal Year 2003. Based upon a comparison
of limited information provided by the military services and defense
agencies, we identified a total of $863 million in obligations for
improvements that exceeded $1 million each but had not been submitted
to DOD's Comptroller for review and determination.
The department acknowledges that it still has much more to do,
including developing the architecture to a necessary level of detail,
defining specific performance metrics, and clarifying the roles and
responsibilities associated with managing the domains' portfolios of
business systems and ensuring that these systems comply with the
architecture. The limited progress that DOD has made is due, in part,
to the lack of clearly assigned, accountable, and sustained program
leadership and to changes in the program direction and priorities. For
example, from May 2003 to February 2004, there was no program manager
to identify, direct, and execute program activities. Our experience in
reviewing other challenged architecture efforts shows that these
efforts have suffered from limited senior management understanding of
and commitment to an architecture and from cultural resistance to
having and using one. Cultural resistance to change, organization
component parochialism, and stovepiped operations are all evident at
DOD.
Because many of our prior recommendations--for managing architecture
development, maintenance, and implementation and for controlling
ongoing and planned investments in business systems--remain open, we
are not making any new recommendations in this report, but we are
reiterating the 22 open recommendations that we made in our May
2001,[Footnote 12] February 2003,[Footnote 13] and September
2003[Footnote 14] reports. (Enc. III contains details on the status of
all of our prior recommendations, including our assessment of DOD's
actions.) It is imperative that DOD act swiftly to implement these
recommendations. If it does not, the prognosis for this program is
bleak, which in turn puts the department's business transformation
efforts in jeopardy.
In written comments, which are reprinted in enclosure IV, DOD agreed
with our assessment that the department's long-standing business
systems problems have resulted in a lack of adequate transparency and
appropriate accountability across all major business areas and that
development and use of an architecture is necessary to transforming its
business operations and supporting systems. In response to our
characterization that progress has been limited, DOD stated that, over
the past 3 years, progress has been slower than either GAO or DOD would
prefer but that it has been significant, despite appearances to the
contrary. In support of its view, DOD provided an extensive package of
information. We considered this information, most of which we had
previously evaluated. The willingness of DOD's leadership to tackle the
department's decades-old problems with its business operations and
supporting systems represents a major step forward. However, we remain
convinced that it is fair to characterize DOD's progress in developing
a well-defined architecture and implementing effective management
oversight and control over its business systems as limited. As a
result, we did not make any changes to this report.
Background:
Prior Reviews of DOD's Architecture Efforts Have Identified Challenges
and Weaknesses:
Over the last 3 years, we have reported[Footnote 15] that one of the
key elements to successfully meeting DOD's financial and related
business management challenges is establishing and implementing an
enterprise architecture, or modernization blueprint. An enterprise
architecture provides a clear and comprehensive picture of an entity,
whether it is an organization (e.g., federal department or agency) or a
functional or mission area that cuts across more than one organization
(e.g., financial management). This picture consists of snapshots of
both the enterprise's current or "As Is" operational and technological
environment and its target or "To Be" environment, as well as a capital
investment road map for transitioning from the current to the target
environment. These snapshots further consist of "views," which are
basically one or more architecture products that provide conceptual or
logical representations of the enterprise. We have made numerous
recommendations to assist DOD in successfully developing the
architecture and using it to gain control over its ongoing business
systems investments. Enclosure III contains details on the status of
all of our prior recommendations, including our assessment of DOD's
actions.
In May 2001[Footnote 16], we reported that the department did not have
an architecture for its financial and financial-related business
operations, nor the management structures, processes, and controls in
place to effectively develop and implement one. We reported that if the
department continued to spend billions of dollars on new and modified
systems, independently from one another and outside the context of an
architecture, this would result in more processes and systems that are
duplicative, not interoperable, and unnecessarily costly to maintain
and interface. We made eight recommendations aimed at providing the
means for effectively developing and implementing an architecture. The
Secretary of Defense established a program in July 2001 to develop and
implement an architecture. In April 2002, DOD entered into an agreement
with International Business Machines (IBM) pursuant to a governmentwide
General Services Administration contract, under which DOD issued task
orders for services to begin developing the architecture.
During the first year of DOD's architecture development, in 2002, we
reviewed the department's efforts and recognized that it was
undertaking a challenging and ambitious task and following some
architecture best practices and information technology (IT) investment
management processes and controls. We also identified challenges and
weaknesses in DOD's architecture efforts. For example, in a February
2003 report,[Footnote 17] we pointed out that DOD had not yet (1)
established a governance structure and process controls needed to
ensure ownership of and accountability for the architecture across the
department, (2) clearly communicated to intended stakeholders its
purpose, scope, and approach for developing the architecture, and (3)
defined and implemented an independent quality assurance process. We
also reported that DOD had yet to establish the necessary departmental
investment governance structure and process controls needed to
adequately align ongoing investments with its architectural goals and
direction. We made six recommendations aimed at enhancing DOD's ability
to further develop its architecture and guide and constrain its
business systems modernization investments.
Our March 2003[Footnote 18] report noted that the draft version of the
architecture did not include a number of items recommended by relevant
architectural guidance and that DOD's plans would not fully satisfy the
requirements of the National Defense Authorization Act for Fiscal Year
2003. For example, the draft architecture did not include a "To Be"
security view, which defines the security requirements, including
relevant standards to be applied in implementing security policies,
procedures, and controls. DOD officials agreed with our preliminary
assessment of the architecture and stated that subsequent versions of
the architecture would provide these missing details.
In July and September 2003,[Footnote 19] we reported that although DOD
had expended tremendous effort and resources in complying with
statutory requirements for developing and implementing a well-defined
architecture, the initial version of its architecture, including the
transition plan, did not adequately address the statutory requirements
and other relevant architectural requirements. For example, the "As Is"
environment did not include descriptions of the current business
operations in terms of entities and people who perform the functions,
processes, and activities and the locations where these are performed.
The "To Be" environment did not include descriptions of actual systems
to be developed or acquired to support future business operations and
the physical infrastructure that would be needed to support the
business systems. The transition plan did not include time frames for
phasing out existing systems within DOD's reported current inventory of
about 2,300 business systems. Overall, the department's initial version
of the architecture did not contain sufficient scope and detail either
to satisfy the act's requirements or to effectively guide and constrain
the departmentwide business transformation and systems modernization.
In our September 2003 report[Footnote 20], we reiterated the open
recommendations that we had made in our May 2001[Footnote 21] and
February 2003[Footnote 22] reports, and we made 10 new recommendations
aimed at improving DOD's plans for developing the next version of the
architecture and implementing the institutional means for selecting and
controlling both planned and ongoing business systems investments. To
date, DOD has yet to address 22 of our recommendations.
Funding Status of Architecture Program:
As of March 12, 2004, about $258 million had been appropriated to
support the program, of which the department reported having obligated
over $203 million and having made disbursements of $111 million since
the program began in 2002. Table 1 shows the reported status of program
funding by appropriation and fiscal year.
Table 1: Reported Funding Status of DOD's Business Management
Modernization Program as of March 12, 2004:
(Dollars in millions):
:
Appropriation; Appropriated; Obligated; Unobligated[A]; Disbursed;
Unliquidated[B].
Fiscal year 2002/2003 Research, Development, Test, and
Evaluation (RDT&E) -Defensewide (DW)[C];
Appropriated: $94.5;
Obligated: $94.5;
Unobligated[A]: $0.0;
Disbursed: $83.0;
Unliquidated[B]: $11.5.
Fiscal year 2003/2004 RDT&E -DW[D];
Appropriated: $67.2;
Obligated: $67.2;
Unobligated[A]: $0.0;
Disbursed: $11.9;
Unliquidated[B]: $55.3.
Fiscal year 2004/2005 RDT&E - DW[E];
Appropriated: $45.1;
Obligated: $8.5;
Unobligated[A]: $36.6;
Disbursed: $0.0;
Unliquidated[B]: $8.5.
Fiscal year 2003 Operations and Maintenance (O&M) -DW[F];
Appropriated: $24.9;
Obligated: $24.9;
Unobligated[A]: $0.0;
Disbursed: $16.1;
Unliquidated[B]: $8.8.
Fiscal year 2004 O&M-DW[G];
Appropriated: $26.1;
Obligated: $8.3;
Unobligated[A]: $17.8;
Disbursed: $0.0;
Unliquidated[B]: $8.3.
Total;
Appropriated: $257.8;
Obligated: $203.4;
Unobligated[A]: $54.4;
Disbursed: $111.0;
Unliquidated[B]: $92.4.
Source: Unaudited funding information contained in DOD's March 15, 2004
report to congressional defense committees. We did not validate the
accuracy and reliability of the funding information reported.
[A] Unobligated balances are the differences between funds appropriated
and obligated; they represent funds that have not been obligated for
expenditure. GAO's calculations are based on DOD's reported data.
[B] Unliquidated balances are the differences between the funds
obligated and disbursed; they represent funds that have been obligated
but have not yet been paid. GAO's calculations are based on DOD's
reported data.
[C] The fiscal year 2002/2003 RDT&E funds supported the initial
delivery of the architecture, transition plan, and change management
and communications initiatives.
[D] The fiscal year 2003/2004 RDT&E funds were used to refine the
architecture through business process modeling/reengineering for the
program's first increment and to fund test and evaluation activities,
verification and validation efforts, and engineering support.
[E] The fiscal year 2004/2005 RDT&E funds will be used to complete the
program's first increment and begin work on the second increment and to
fund the integration of the architecture, engineering support, and test
and evaluation activities.
[F] The fiscal year 2003 O&M funds were used for salaries, facilities,
supplies, and program management support contracts.
[G] The fiscal year 2004 O&M funds are being used for salaries,
facilities, supplies, and program management support contracts.
[End of table]
DOD Has Taken Few Actions to Address Our Previous Recommendations:
DOD has taken some steps since our last review, but it has not yet (1)
implemented key architecture management best practices,[Footnote 23]
such as assigning accountability and responsibility for directing,
overseeing, and approving the architecture to a committee or group
comprised of representatives from across DOD's major organization
components, (2) revised the architecture products to include the
missing scope and detail needed to guide and constrain the
implementation of system solutions, and (3) clearly defined near-term
and long-term plans for guiding its transformation activities. Until
the department addresses these key elements to fully satisfy relevant
architectural guidance, it will be challenged in its ability to produce
an architecture that is sufficient to guide and constrain its business
operations and systems modernization efforts. In response to our
recommendations, DOD has taken some actions, including establishing a
group to facilitate communication and coordination across the domains
for program activities; beginning to establish a configuration change
management process; recently issuing a policy governing the
development, maintenance, and implementation of the architecture; and
updating the initial version of the architecture. However, these
actions are not sufficient and do not fully address our concerns.
DOD Has Not Yet Implemented Key Architecture Management Best Practices:
DOD's actions have not been adequate to address architecture management
best practices or our previous recommendations. Since our last report,
the department has taken some actions in response to our
recommendations concerning the need to implement an effective
architecture management program. First, in September 2003, it formally
established the Domain Owners Integration Team (DO/IT), which reports
to the steering committee. The DO/IT is comprised of the various senior
executives from each domain and the Business Modernization and Systems
Integration office. The DO/IT is responsible for facilitating
communication and coordination across the domains for program
activities, including extending and evolving the architecture.
According to program officials, the DO/IT's role is continuing to
evolve. In particular, the specific actions or tasks it needs to
perform to carry out this responsibility have not been defined in
detail.
Second, DOD has taken steps to establish and implement a configuration
management process to ensure that all changes to the architecture
products are justified and are accounted for in a manner that maintains
documentation integrity. Specifically, the department has established a
configuration control board (CCB), developed a charter, and written
procedures governing this process. However, the CCB has been tasked
with reviewing changes to only some, but not all, of the architecture
products. For example, the CCB is not responsible for tracking changes
that are being made to the transition plan. In addition, both the
charter and the procedures governing this process are still in draft.
According to DOD officials, the charter is to be approved in June 2004,
but no time frame has been provided for final approval of the
procedures.
Third, DOD has recently issued an IT portfolio management policy
governing the development, maintenance, and implementation of the
architecture. This policy addresses, among other things, the roles,
responsibilities, and relationships of key players and program
participants, the value of an architecture, and the scope of the
architecture. However, the policy does not address accountability for
and approval of updates to the architecture, as called for by best
practices, nor does it address the issuance of waivers in those
instances when exceptions to the architecture are justified on the
basis of documented analysis.
Finally, DOD has developed high-level performance measures that are to
be used to develop the more specific results-oriented performance
metrics needed to enable it to evaluate program progress and benefits.
This means that DOD has yet to establish measurable, results-oriented
goals to evaluate and track, on an ongoing basis, specific program
progress, outcomes, and results. For example, it has not explicitly
defined performance measures to evaluate the quality, content, and
utility of subsequent major updates to its initial architecture. Given
that DOD has reported obligations of over $203 million since
architecture development efforts began 3 years ago, this is a serious
performance management weakness. It is critical that the department
establishes meaningful, tangible, and measurable program goals and
objectives--short-term and long-term--to enable the department to
determine what value it is receiving for its investment.
In addition, the department has yet to address other prior
recommendations related to architecture management best practices. Two
examples are provided below.
* DOD has not assigned accountability and responsibility for directing,
overseeing, and approving the architecture to a committee or group
comprised of representatives from across the department. Although it
previously established an executive and a steering committee, these
committees are advisory in nature, and they are currently not
accountable or responsible for directing, overseeing, and approving the
architecture. According to the department, it expects to revise the
committees' charters in June 2004 to include these responsibilities.
* DOD does not have an independent verification and validation function
to review the architecture products and management processes. The
department's current verification and validation contractor is not
independent[Footnote 24] and is responsible for reviewing the
architecture products and only selected program deliverables. According
to program officials, the department is planning to acquire the
services of a new contractor to perform this work, who will be tasked
with reviewing all the architecture products and all other program
deliverables. However, DOD officials also said that no decision has
been made to change the reporting structure of this function to make it
independent or to have this contractor review architecture management
processes. In addition, no milestones have been set for any of these
planned actions.
Several factors have contributed to the department's limited progress
in implementing an effective architecture management program, such as
changes to and a lack of accountability in program leadership,
direction, and priorities. As we previously stated, DOD has not yet
formalized responsibility for directing, overseeing, and approving the
architecture. Further, from May 2003 to February 2004, there was no
program manager to identify, direct, and execute program activities.
DOD hired a new program manager in February 2004. Initially, DOD had
planned to develop and implement its architecture in 1 year, but later
it adopted an incremental approach to developing the architecture.
About 1 year after adopting this approach, DOD has assigned labels to
these increments, but it has not yet defined the purpose of these
increments and plans of action to implement them.
Further, our research of successful organizations and experience in
reviewing other challenged enterprise architecture efforts show that
senior management's understanding of and commitment to an enterprise
architecture and overcoming cultural resistance to having and using one
are critical success factors. Cultural resistance to change, military
service parochialism, and stovepiped operations have all contributed
significantly to the failure of previous attempts to implement broad-
based management reforms at DOD. Until such barriers are addressed, and
effective architecture management structures and processes are
established, it is unlikely that DOD will be able to produce and
maintain a complete and enforceable architecture or implement
modernized systems in a way that minimizes overlap and duplication and
maximizes integration and mission support.
DOD's Architecture Products Remain Incomplete, with Minimal Content
Change:
Since our last review, DOD has not made significant changes to the
content of its architecture. The department has an updated version of
the architecture (version 2.0), which is currently being reviewed, but
it has not been approved. According to DOD, this version of the
architecture differs from the initial architecture (version 1.0) in
that it incorporates integrated "baseline reference business process
models," which, according to DOD, constitute a high-level process
framework consisting of processes that provide a business perspective
on the department's operations (e.g., execute budget and performance
plans) that cut across functions and organizations. DOD also stated
that version 2.0 includes the previously excluded requirements (e.g.,
revenue requirements) for the Joint Financial Management Improvement
Program (JFMIP)[Footnote 25] and partially addresses 21 of the 62
missing architecture content elements that we recommended be added.
According to DOD, the domains are currently validating all of the
requirementsóincluding the JFMIP requirements:
Further, with regard to the 21 missing elements, documentation provided
by DOD shows that it is either just beginning to initiate activities or
was planning to develop plans to address these missing elements. This
documentation also did not specify either how or when any of the 21
elements would be fully addressed. Instead, it showed that the
department, to date, has made only cosmetic changes to the
architecture, such as correcting typographical (i.e., misspelled words)
and grammatical errors, as well as deleting unnecessary text from
various architecture products. DOD has yet to incorporate the missing
scope and detail that we previously identified. For example, the "To
Be" environment does not provide sufficient descriptive content related
to future business operations and supporting technology to permit
effective acquisition and implementation of system solutions and the
associated operational change.
Program officials also stated that version 2.0 addresses some of the
recommendations made by its verification and validation contractor.
However, DOD did not provide documentation showing that it had
addressed any of these recommendations. For example, the verification
and validation contractor had previously reported that the "As Is"
information was insufficient to support realistic transition planning.
In April 2004, this contractor further reported that, while there have
been some improvements in both the overall completeness of definitions
and the structure of the architecture products, version 2.0[Footnote
26] retains most of the critical problems previously cited for version
1.0. Some examples are below.
* The utility of the architecture to stakeholders and the ability of
the architecture to support acquisition and portfolio investment
management decisions remain unclear.
* Supporting documentation that describes the analysis and rationale
for architecture choices represented within many of the architecture
products remains incomplete in many areas and, when available, is
poorly linked or referenced.
* The "As Is" environment, including business processes and existing
business application systems and supporting technology, is inadequate,
making it difficult for DOD to perform a gap analysis to support
development of a transition plan.
* The information assurance (security) representation remains spotty
and difficult to find even at the enterprise level, and it has some
unnecessary deviations from the department's accepted practices.
In addition, the verification and validation contractor stated that the
reference business process models included in version 2.0, which DOD
cited as the major difference from version 1.0, lacked the underlying
data and linkage to make it useful in reengineering existing processes.
The contractor also stated that these models would likely need to be
reworked based on the results of efforts that the domains currently
have under way.
According to DOD and contractor officials responsible for updating the
architecture products, the changes made to date have primarily affected
architecture management processes and not the architecture's content;
and this is the result of the change in the program's focus and
priorities, as discussed above. However, these officials also stated
that the Architecture Integration Teams (AIT), comprised of
representatives from the domains, are currently focused on developing
needed architectural contentóprimarily business processes, business
rules, and regulations for increment one.
Until the architecture is sufficiently complete and includes the
missing scope and detail, the department remains at risk for not
achieving its intended business transformation goals and of not having
an architecture that can be used to guide and constrain ongoing and
planned business systems investments to prevent duplicative and
noninteroperable systems.
DOD Has Yet To Explicitly Define Near-term and Long-term Plans for
Guiding Its Transformation Activities:
DOD has not yet developed either near-term or long-term plans for
developing the architecture that explicitly identify and establish a
baseline for the actions to be taken, milestones to be achieved, cost
estimates to be met, and targeted outcomes to be achieved. As we
previously stated, DOD has adopted an incremental approach to
developing the architecture, including the transition plan, and plans
to refine and extend the architecture in three increments. The
increments, as defined by DOD, are:
* Increment one. To enable asset accountability, total force
visibility, and an unqualified audit opinion of DOD's consolidated
fiscal year 2007 financial statements.
* Increment two. To focus on reducing acquisition cycle time and
streamlining the Planning, Programming, Budgeting, and Execution System
process between fiscal years 2004 and 2009.
* Increment three. To focus on providing total asset visibility and
total force management between fiscal years 2004 and 2010.
However, it is unclear what the increments individually or collectively
mean, and what they will provide or allow DOD to achieve in the near-
term and long-term, because DOD does not have detailed plans that
include performance measures for the quality, content, and utility of
the architecture. Although the three increments were identified in
November 2003, program officials do not expect to have a plan for
increment one until the next version of the transition plan is
completed in August 2004. According to program officials, the goals and
scope for the second and third increments were only recently approved
by the steering committee and, therefore, detailed plans of action and
milestones for developing these plans do not yet exist.
Currently, DOD has three initiatives under way to support increment
one. First, the program office is developing a plan of action for
increment one and intends to complete the plan by August 2004. Second,
the accounting and finance domain is conducting workshops to develop
needed business rules and requirements for extending and evolving
version 2.0 of the architecture. This domain also has two ongoing pilot
initiatives to acquire and implement production accounting systems by
the end of 2005 at an estimated cost of $135 million, which are
intended to provide JFMIP-compliant financial management systems to
support the department's general and working capital fund activities.
Last, DOD components are developing individual plans detailing their
respective efforts for supporting increment one. However, there is no
evidence that the program office is coordinating with the components
and that the components are coordinating amongst themselves. According
to a Defense Logistics Agency (DLA) official, there is currently no
direct link between DLA's plan and modernization program activities.
Because there are not yet detailed plans guiding the program's
activities, it is unclear whether and how these activities support each
other and whether they support the department's goal of achieving an
unqualified audit opinion in 2007.
DOD recognizes that it needs to develop detailed plans and establish
performance metrics to measure and track program progress in order to
determine (1) what it wants to accomplish by a certain point in time,
(2) what it has actually accomplished by that point in time, and (3)
how much it has spent. Changes in the direction of the program and a
lack of sustained leadership have hindered DOD's ability to do so. In
its March 15, 2004 progress report, DOD reported that it plans to
establish an initial approved program metrics baseline to evaluate the
cost, schedule, and performance of the program and that, beginning with
the fourth quarter of fiscal year 2004, it plans to begin formal
tracking and reporting of specific program goals, objectives, and
measures.
The lack of explicitly defined program plans also has made it difficult
to define measurable tasks that are or will be assigned to DOD
employees and the 289 program contractor employees who are involved in
architecture development, domain support, and program support
functions. In reviewing the contractor's work statements for
architecture development, we found that many of the tasks lacked the
specificity necessary to use them effectively to monitor the
contractor's progress. For example, tasks included such broad
statements as "maintain, extend, and integrate" the architecture. Since
DOD is acquiring services on the basis of direct labor hours at
specified fixed hourly rates and cost of materials, it is essential
that the department use efficient methods and effective cost controls
to measure the work being performed.[Footnote 27] It is also essential
because the proposed work statement that DOD plans to approve, at an
estimated cost of $43 million, explicitly states that work is
considered complete when the hours allotted have been expended, rather
than defining completion as the contractor's delivery of products that
meet predefined quality standards. According to DOD, to enable it to
better monitor the contractor's progress, it plans to reduce future
tasks to 15 staff-day increments (from 6 week increments) and to
require the contractor to provide more frequent, informal products to
program officials so they can monitor and track progress more
rigorously.
Without an explicitly defined program baseline, detailed plans, and
performance measures, it is difficult to validate or justify the $122
million that DOD has requested for fiscal year 2005 and the $494
million the department estimates it will need for fiscal years 2006
through 2009. In fact, DOD has been unable to show measurable progress
and meaningful utility of the architecture products to DOD stakeholders
for the $203.4 million that had been obligated for this program as of
March 2004.
DOD Has Taken Few Actions to Control Ongoing and Planned Investments in
Business Systems:
DOD continues to lack effective investment management oversight and
control over its numerous investments in business systems. While the
domains have been designated to oversee business systems investments,
the actual funding continues to be spread among DOD's components, which
continue to make their own parochial decisions regarding those
investments, including obligations in excess of $1 million for system
improvements, without having received the scrutiny of DOD's Comptroller
as required by the National Defense Authorization Act for Fiscal Year
2003.[Footnote 28] Because DOD lacks a departmentwide focus and
effective management oversight and control of its business systems
investments, it continues to invest billions of dollars in systems that
potentially will fail to deliver the integrated business systems
outcomes that are needed to provide DOD management with timely and
reliable financial information.
We previously recommended[Footnote 29] that DOD establish investment
review boards to better control its business systems investments (with
each board comprised of representatives from across the department) and
that the boards, consistent with recognized best practices, use a
standard set of investment review and decision-making criteria to
ensure compliance and consistency with the architecture. DOD agreed
with our recommendations and, in response, it issued in March 2004 an
IT portfolio management policy that assigns the domains responsibility
for IT portfolio management. However, the procedures to be followed to
implement the policy are still under development and no time frames for
completion have been provided. According to the IT portfolio management
policy, the department has 180 days (until mid-September 2004) to
develop these procedures. In addition, the department has yet to
formalize specific roles and responsibilities of the domains, develop
standard criteria for performing the system reviews, and assign
explicit authority for fulfilling roles and responsibilities. DOD
recognizes the need to clarify the roles and responsibilities
associated with managing the domains' portfolios of business systems
and ensure compliance with the architecture. However, it has yet to
establish time frames for completing these activities.
DOD has not yet implemented an effective investment management
structure and processes for controlling ongoing and planned business
systems investments, including one that meets the act's requirements
for ensuring that system improvements with obligations in excess of $1
million are consistent with the architecture. In an attempt to
substantiate that the obligations for business systems modernization
were in accordance with the National Defense Authorization Act for
Fiscal Year 2003, we requested that DOD agencies provide us with a list
of obligations greater than $1 million for fiscal year 2003[Footnote
30] and fiscal year 2004, as of December 2003. To ascertain whether
DOD's Comptroller had made the determination required by the act, we
compared a list of systems approvals provided by the program office
with the obligational data (by system) provided by the DOD activities.
As we previously testified,[Footnote 31] we identified $479 million in
obligations for business systems modernization reported by the DOD
military services that were not submitted to DOD's Comptroller for
review. Subsequently, we requested information from the defense
agencies and found $384 million in reported obligations for business
systems modernization that had not been submitted to DOD's Comptroller
for review. Examples of DOD system improvements with obligations in
excess of $1 million that were not submitted include the following:
* The Defense Finance and Accounting Service (DFAS) obligated about $19
million in fiscal year 2003 for the DFAS Corporate Database/DFAS
Corporate Warehouse. We previously reported[Footnote 32] that DOD had
yet to provide economic justification that its investment in this
system would result in tangible improvements to DOD's financial
management operations. As of April 2004, an economic analysis has yet
to be approved but, according to DOD officials, about $129 million had
been spent on the program through January 2004.
* The Defense Information Systems Agency obligated about $7 million in
fiscal year 2003 and about $2 million in fiscal year 2004 for the Wide
Area Workflow.[Footnote 33]
* DFAS obligated about $7 million in fiscal year 2003 for the Defense
Standard Disbursing System before it was terminated in December 2003
after approximately 7 years of effort and a reported investment of
about $53 million. We previously reported[Footnote 34] that continued
investment in this system had not been justified, because an economic
analysis had not been updated to reflect significant schedule delays.
DFAS noted that this system was terminated because a valid business
case for continuing the effort could not be made.
* DLA obligated about $5 million in fiscal year 2003 and about $2
million in fiscal year 2004 for the Defense Medical Logistics Standard
Support Program.
These and other examples demonstrate that DOD does not have reasonable
assurance that it is in compliance with the National Defense
Authorization Act for Fiscal Year 2003, which provides that obligations
in excess of $1 million for system improvements may not be made unless
DOD Comptroller makes a determination that the improvement is in
accordance with the criteria specified in the act. The act places
limitations on the legal authority of individual program and government
contracting officials to obligate funds in support of the systems for
which they are responsible, but DOD has yet to proactively manage its
investments to avoid violations of the limitations and to review and
approve investments in any meaningful way in order to comply with these
statutory limitations.
DOD acknowledges that the department does not have a systematic means
to identify and determine which system improvements should be submitted
to DOD's Comptroller for review and, in essence, is dependent upon
system owners coming forward to the domains and requesting approval.
Also, as we have testified,[Footnote 35] DOD components continue to
receive direct funding for their business systems and continue to make
their own parochial decisions regarding investments without the
scrutiny of DOD's Comptroller that is required by the act. The current
funding process has contributed to the proliferation of duplicative,
nonintegrated, and stovepiped business systems that are highly prone to
error and are unable to provide DOD management with timely, reliable
financial information. In March 2004,[Footnote 36] we offered a
suggestion for legislative action to address this issue, consistent
with our open recommendations to DOD that funds for its business
systems be appropriated directly to the domains in order to provide for
accountability, transparency, and the ability to prevent the continued
parochial approach to systems investments that exists today. The
legislation we envisioned--for which we will make a legislative
proposal in a related report to be issued soon--would define the scope
of the domains and establish functional responsibility for managing the
portfolio of business systems to the domains. The domains would
establish business systems investment review boards with DOD-wide
representation, including the military services and defense agencies.
Until DOD strengthens its process for selecting and controlling
business systems investments and sufficiently develops a well-defined
architecture that can be used to guide and constrain investment
decisions, it will likely continue to spend billions of dollars on
duplicative, nonintegrated, stovepiped systems that do not optimize
mission performance and accountability and, therefore, do not support
the department's transformation goals.
Conclusions:
Having and effectively using a well-defined architecture is essential
for guiding and constraining DOD's business transformation efforts and
moving the department away from nonintegrated business systems
development efforts. DOD's efforts to date to address our prior
recommendations aimed at accomplishing this have not been sufficient.
Specifically, despite 3 years of effort and over $203 million in
reported obligations, DOD's architecture remains insufficiently
defined, and the way in which the department makes business systems
investments decisions remains largely unchanged. As a result, billions
of dollars continue to be at risk of being spent on more systems that
are duplicative, are not interoperable, cost more to maintain than
necessary, and do not optimize mission performance and accountability.
The future of DOD's architecture development and implementation
activities is at risk; this in turn places the department's business
transformation effort in jeopardy of failing as other efforts by the
department have in the past. Therefore, it is imperative that DOD move
swiftly to implement our 22 open recommendations, which are aimed at
strengthening architecture management activities, adding missing
content to architecture products, and implementing investment oversight
and control measures.
Agency Comments and Our Evaluation:
In commenting on a draft of this report (reprinted in enc. IV), DOD
agreed with our assessment that its long-standing business systems
problems have resulted in a lack of adequate transparency and
appropriate accountability across all major business areas. It
confirmed that development and use of an architecture is necessary to
transforming its business operations and supporting systems. However,
in response to our characterization that progress has been limited, DOD
stated that, over the past 3 years, progress has been slower than
either GAO or DOD would prefer but that it has been significant,
despite appearances to the contrary. The willingness of DOD's
leadership to tackle the department's decades-old problems with its
business operations and supporting systems represents a major step
forward. However, we continue to believe that our characterization of
DOD's progress in developing a well-defined architecture and
implementing effective management oversight and control over its
business systems as limited is fair. Therefore, we are not making any
changes to our report.
DOD stated that we did not adequately consider or incorporate in our
report important completed and ongoing activities, plans, and
documentation, and provided an extensive package of information. We
disagree that we did not adequately consider or incorporate in our
report important completed and ongoing activities, plans, and
documentation. While our assessment focused primarily on the
department's completed, ongoing, and planned activities that it
reported to Congress on March 15, 2004, we also considered and
incorporated various activities, plans, and documentation through April
27, 2004, which included the vast majority of the information in the
package.
In addition, we acknowledged in this report most, if not all, of the
actions DOD represents in their comments as having been completed such
as issuing the IT portfolio management policy and establishing the DO/
IT. We also recognized many of DOD's ongoing activities, such as the
workshops being held by the accounting and finance domain and the
department's establishment of the AIT, which are currently focused on
developing needed architectural content for increment one. To gain an
understanding of the specific AIT activities, which began in January
2004, we met with the domains during our review and discussed various
collaborative efforts, such as their participation in validating
business rules and requirements to support the development of end-to-
end business processes. Regarding planned activities, we recognized
DOD's intent to revise the executive and steering committees' charters
to include responsibilities for directing, overseeing, and approving
the architecture, and to develop the procedures for implementing the IT
portfolio management policy. In its response, DOD stated that it plans
to complete these actions in June and December 2004, respectively.
Because we received information about certain activities after we
completed our fieldwork--or not at all--these activities are not
included in our evaluation. For example, DOD stated that the department
plans to release a management initiative during May 2004; establish an
architecture and program management maturity plan and supporting
metrics to address the quality, content, and utility of the
architecture; and establish a balanced scorecard and supporting metrics
focused on the organization's internal management processes. While we
inquired about the management initiative during our review, program
officials stated that they were unable to provide us a copy because DOD
does not allow the release of such draft documents outside the
department. In addition, program officials did not provide a
characterization of the focus or scope of the management initiative;
therefore we were unable to include it in our report. We made inquiries
about other initiatives during the course of our review, but were not
advised of the maturity plan and balanced scorecard. However, it is
important to note that carrying out activities does not necessarily
guarantee results, and thus progress, unless these activities are based
on an approved program plan that can be used to measure progress.
In addition, we disagree with DOD's other comments. Specifically, DOD
stated that the Comptroller is accountable for approval of updates to
the architecture as called for by best practices. As we previously
reported[Footnote 37] and reiterated in this report, best practices
recommend that the accountability and responsibility for directing,
overseeing, and approving the architecture be assigned to a committee
or group comprised of representatives responsible for the core business
areas across the department--not a single individual. The purpose of
assigning the accountability and responsibility to such a committee is
to obtain and ensure continued enterprisewide support of the
architecture effort, thereby, increasing the department's chances for
success.
In addition, DOD stated that its verification and validation function
is independent because the contractor responsible for these activities
currently reports to the Deputy Director, Program Support, who is not
directly involved with developing the architecture. DOD also stated
that to ensure this independence, reports prepared by this contractor
are provided directly to GAO and the steering committee. We disagree
that this function is sufficiently independent. According to best
practices, the contractor performing this role should report the
results of its work directly to the steering committee, as well as the
program office. Since the Deputy Director, Program Support reports
directly to the program management office and not the steering
committee, the function is not independent. In addition, the
verification and validation contractor agreed with us that its reports
are not provided directly to GAO or the steering committee. The
contractor also concurred with our statement that, in the one instance
in which it briefed the steering committee, the program office modified
the content of the presentation.
DOD disagreed with our prior position that funds for DOD business
systems be appropriated directly to the domains. We are reaffirming
that position as stated by the Comptroller General in his March 2004
testimony[Footnote 38] before the Subcommittee on Readiness and
Management Support, Senate Armed Services Committee. This matter for
congressional consideration and related changes in responsibility will
be discussed in additional detail in a report to be issued shortly.
We are sending copies of this report to interested congressional
committees; the Director, Office of Management and Budget; the
Secretary of Defense; the Under Secretary of Defense (Comptroller); the
Assistant Secretary of Defense (Networks and Information Integration)/
DOD Chief Information Officer; the Under Secretary of Defense
(Acquisition, Technology, and Logistics); the Under Secretary of
Defense (Personnel and Readiness); and the Director, Defense Finance
and Accounting Service. This report will also be available at no charge
on our Web site at http://www.gao.gov.
If you have any questions concerning this information, please contact
Gregory Kutz at (202) 512-9095 or kutzg@gao.gov or Randolph Hite at
(202) 512-3439 or hiter@gao.gov. GAO contacts and key contributors to
this report are listed in enclosure V.
Signed by:
Gregory D. Kutz:
Director, Financial Management and Assurance:
Signed by:
Randolph C. Hite:
Director, Information Technology Architecture and Systems Issues:
Enclosures:
List of Committees:
The Honorable John W. Warner:
Chairman:
The Honorable Carl Levin:
Ranking Minority Member:
Committee on Armed Services:
United States Senate:
The Honorable Ted Stevens:
Chairman:
The Honorable Daniel K. Inouye:
Ranking Minority Member:
Subcommittee on Defense:
Committee on Appropriations:
United States Senate:
The Honorable Duncan Hunter:
Chairman:
The Honorable Ike Skelton:
Ranking Minority Member:
Committee on Armed Services:
House of Representatives:
The Honorable Jerry Lewis:
Chairman:
The Honorable John P. Murtha:
Ranking Minority Member:
Subcommittee on Defense:
Committee on Appropriations:
House of Representatives:
Enclosure I:
SEC. 1004. [of Public Law 107-314] DEVELOPMENT AND IMPLEMENTATION OF
FINANCIAL MANAGEMENT ENTERPRISE ARCHITECTURE:
(a) REQUIREMENT FOR ENTERPRISE ARCHITECTURE AND FOR TRANSITION PLAN--
Not later than May 1, 2003, the Secretary of Defense shall develop--
(1) a financial management enterprise architecture for all budgetary,
accounting, finance, enterprise resource planning, and mixed
information systems of the Department of Defense; and:
(2) a transition plan for implementing that financial management
enterprise architecture.
(b) COMPOSITION OF ENTERPRISE ARCHITECTURE--
(1) The financial management enterprise architecture developed under
subsection (a)(1) shall describe an information infrastructure that, at
a minimum, would enable the Department of Defense to--
(A) comply with all Federal accounting, financial management, and
reporting requirements;
(B) routinely produce timely, accurate, and reliable financial
information for management purposes;
(C) integrate budget, accounting, and program information and systems;
and:
(D) provide for the systematic measurement of performance, including
the ability to produce timely, relevant, and reliable cost information.
(2) That enterprise architecture shall also include policies,
procedures, data standards, and system interface requirements that are
to apply uniformly throughout the Department of Defense.
(c) COMPOSITION OF TRANSITION PLAN--The transition plan developed under
subsection (a)(2) shall include the following:
(1) The acquisition strategy for the enterprise architecture, including
specific time-phased milestones, performance metrics, and financial and
nonfinancial resource needs.
(2) A listing of the mission critical or mission essential operational
and developmental financial and nonfinancial management systems of the
Department of Defense, as defined by the Under Secretary of Defense
(Comptroller), consistent with budget justification documentation,
together with--
(A) the costs to operate and maintain each of those systems during
fiscal year 2002; and:
(B) the estimated cost to operate and maintain each of those systems
during fiscal year 2003.
(3) A listing of the operational and developmental financial management
systems of the Department of Defense as of the date of the enactment of
this Act (known as 'legacy systems') that will not be part of the
objective financial and nonfinancial management system, together with
the schedule for terminating those legacy systems that provides for
reducing the use of those legacy systems in phases.
(d) CONDITIONS FOR OBLIGATION OF SIGNIFICANT AMOUNTS FOR FINANCIAL
SYSTEM IMPROVEMENTS--An amount in excess of $1,000,000 may be obligated
for a defense financial system improvement only if the Under Secretary
of Defense (Comptroller) makes a determination regarding that
improvement as follows:
(1) Before the date of an approval specified in paragraph (2), a
determination that the defense financial system improvement is
necessary for either of the following reasons:
(A) To achieve a critical national security capability or address a
critical requirement in an area such as safety or security.
(B) To prevent a significant adverse effect (in terms of a technical
matter, cost, or schedule) on a project that is needed to achieve an
essential capability, taking into consideration in the determination
the alternative solutions for preventing the adverse effect.
(2) On and after the date of any approval by the Secretary of Defense
of a financial management enterprise architecture and a transition plan
that satisfy the requirements of this section, a determination that the
defense financial system improvement is consistent with both the
enterprise architecture and the transition plan.
(e) CONGRESSIONAL REPORTS--Not later than March 15 of each year from
2004 through 2007, the Secretary of Defense shall submit to the
congressional defense committees a report on the progress of the
Department of Defense in implementing the enterprise architecture and
transition plan required by this section. Each report shall include, at
a minimum--
(1) a description of the actions taken during the preceding fiscal year
to implement the enterprise architecture and transition plan (together
with the estimated costs of such actions);
(2) an explanation of any action planned in the enterprise architecture
and transition plan to be taken during the preceding fiscal year that
was not taken during that fiscal year;
(3) a description of the actions taken and planned to be taken during
the current fiscal year to implement the enterprise architecture and
transition plan (together with the estimated costs of such actions);
and:
(4) a description of the actions taken and planned to be taken during
the next fiscal year to implement the enterprise architecture and
transition plan (together with the estimated costs of such actions).
(f) COMPTROLLER GENERAL REVIEW--Not later than 60 days after the
approval of an enterprise architecture and transition plan in
accordance with the requirements of subsection (a), and not later than
60 days after the submission of an annual report required by subsection
(e), the Comptroller General shall submit to the congressional defense
committees an assessment of the extent to which the actions taken by
the Department comply with the requirements of this section.
(g) DEFINITIONS--In this section:
(1) The term 'defense financial system improvement' means the
acquisition of a new budgetary, accounting, finance, enterprise
resource planning, or mixed information system for the Department of
Defense or a modification of an existing budgetary, accounting,
finance, enterprise resource planning, or mixed information system of
the Department of Defense. Such term does not include routine
maintenance and operation of any such system.
(2) The term 'mixed information system' means an information system
that supports financial and non-financial functions of the Federal
Government as defined in Office of Management and Budget Circular A-127
(Financial Management Systems).
(h) REPEAL--(1) Section 2222 of title 10, United States Code, is
repealed. The table of sections at the beginning of chapter 131 of such
title is amended by striking the item relating to such section.
(2) Section 185(d) of such title is amended by striking 'has the
meaning given that term in section 2222(c)(2) of this title' and
inserting 'means an automated or manual system from which information
is derived for a financial management system or an accounting system'.
Enclosure II: Scope and Methodology:
Consistent with the act and as agreed with congressional defense
committees' staffs, our review focused on (1) the actions the
Department of Defense (DOD) has taken to address our previous
recommendations regarding the development and implementation of the
architecture and (2) the actions DOD is taking to ensure its ongoing
and planned investments will be consistent with its evolving
architecture.
To determine what actions DOD has taken to address our previous
recommendations that relate to the development and implementation of
the architecture, we met with DOD and contractor officials to obtain an
update on the status of our prior recommendations. We used our
Enterprise Architecture Management Maturity Framework,[Footnote 39]
which describes the stages of management maturity, to update the status
of key elements of architecture management best practices that DOD had
not adopted. To make this determination, we reviewed program
documentation, such as program policies and procedures, communications
plan, and charters for the governance bodies; and we compared them to
the elements in the framework. We reviewed program documentation, such
as requests documenting proposed and actual changes to the architecture
and external[Footnote 40] requirements extracted from the updated
architecture. We also reviewed contractor task orders to determine the
work performed and planned by the prime contractor associated with
extending and evolving the architecture.
To determine what actions DOD is taking to ensure its ongoing and
planned business systems investments are consistent with its evolving
architecture, we met with DOD officials to obtain an update on the
status of our prior recommendations. We met with appropriate officials
from the offices of the Under Secretary of Defense (Comptroller) and
the Assistant Secretary of Defense (Networks and Information
Integration)/DOD Chief Information Officer, and with representatives
from the domains to discuss the status of various draft policies and
guidance that are aimed at improving the department's control of and
accountability for business systems investments. We also reviewed and
analyzed DOD's budget request for fiscal year 2004 to identify the
business systems investments that could be subject to the requirements
of the National Defense Authorization Act for Fiscal Year 2003, which
requires that all financial system improvements with obligations in
excess of $1 million be reviewed by DOD's Comptroller, who must make a
determination on whether the system improvements are in accordance with
criteria specified in the act. To assess DOD's compliance with the act,
we also obtained and reviewed departmental guidance, memorandums, DOD
Comptroller review decisions, and other documentation provided by the
program office. Additionally, we requested that DOD provide us with
data on obligations in excess of $1 million for business systems
modernization for fiscal years 2003 and 2004, as of December 2003. We
also received obligational data from some of the defense agencies. We
then compared the obligational data with the information we had
received from the program office to ascertain if the systems
modernization had been reviewed.
To augment our document reviews and analyses, we interviewed officials
from various DOD organizations and contractors, including the Office of
the Under Secretary of Defense (Comptroller); Office of the Under
Secretary of Defense (Acquisition, Technology, and Logistics); Office
of the Under Secretary of Defense (Personnel and Readiness);
International Business Machines; and MITRE Corporation.
We did not validate the accuracy and reliability of the funding
information contained in DOD's March 15, 2004, report. Also, the
unliquidated and unobligated calculations that we made were based on
DOD reported data. Further, we did not validate the accuracy and
reliability of the obligational data provided by the military services
and the defense agencies for systems modernization.
We requested comments on a draft of this report from the Secretary of
Defense or his designee. We received written comments from the Acting
Under Secretary of Defense (Comptroller), which we printed in enclosure
IV. We considered, but did not reprint the voluminous attachments that
DOD provided with its written comments.
We conducted our work primarily at DOD headquarters offices in
Washington, D.C., and Arlington, Virginia, from December 2003 through
April 2004, in accordance with U.S. generally accepted government
auditing standards.
Enclosure III: Status of Prior Recommendations on DOD's Business
Enterprise Architecture (BEA):
GAO-01-525: Information Technology: Architecture Needed to Guide
Modernization of DOD's Financial Operations. May 17, 2001.
Recommendation: (1) The Secretary of Defense immediately designate DOD
financial management modernization a departmental priority and
accordingly direct the Deputy Secretary of Defense to lead an
integrated program across the department for modernizing and optimizing
financial management operations and systems;
Status of recommendation: Implemented;
DOD‘s comments and our assessment: DOD‘s comments and our assessment:
[Empty].
Recommendation: (2) The Secretary immediately issue a DOD policy that
directs the development, implementation, and maintenance of a financial
management enterprise architecture;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: DOD recently issued its Information
Technology (IT) Portfolio Management policy. This policy, in
conjunction with the overarching Global Information Grid[A] policy,
assigns responsibilities for the development, implementation, and
maintenance of the BEA.b However, it does not provide for having
accountability for and approval of updates to the BEA, processes for
BEA oversight and control, and review and validation of the BEA.
Recommendation: (3) The Secretary immediately modify the Senior
Financial Management Oversight Council's charter to;
designate the Deputy Secretary of Defense as the Council Chair and the
Under Secretary of Defense (Comptroller) as the Council vice-Chair;
* empower the Council to serve as DOD's financial management enterprise
architecture steering committee, giving it the responsibility and
authority to ensure that a DOD financial management enterprise
architecture is developed and maintained in accordance with the DOD
C4ISR Architecture Framework;
* empower the Council to serve as DOD's financial management investment
review board, giving it the responsibility and authority to (1) select
and control all DOD financial management investments and (2) ensure
that its investment decisions treat compliance with the financial
management enterprise architecture as an explicit condition for
investment approval that can be waived only if justified by a
compelling written analysis;
and;
* expand the role of the Council's System Compliance Working Group to
include supporting the Council in determining the compliance of each
system investment with the enterprise architecture at key decision
points in the system's development or acquisition life cycle;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: The department had previously
established the executive and steering committees, which we reported
were advisory in nature. The department recently established the Domain
Owners Integration Team[C] and stated that these three bodies are
responsible for governing the program. However, these three groups have
not been assigned the accountability and responsibility for directing,
overseeing, and approving the BEA. According to DOD, it expects to
revise and finalize the executive and steering committees' charters to
include these responsibilities in June 2004; DOD issued an IT portfolio
management policy (March 2004) that assigns the domains[D]
responsibility for IT portfolio management. However, the procedures to
be followed to implement the policy are still under development and no
time frames for completion have been provided. According to the IT
portfolio management policy, the department has 180 days (until mid-
September 2004) to develop these procedures. In addition, the
department has yet to formalize specific roles and responsibilities of
the domains, develop standard criteria for performing the system
reviews, and assign explicit authority for fulfilling roles and
responsibilities. DOD has yet to establish time frames for completing
these activities.
Recommendation: (4) The Secretary immediately make the Assistant
Secretary of Defense (Command, Control, Communications & Intelligence),
in collaboration with the Under Secretary of Defense (Comptroller),
accountable to the Senior Financial Management Oversight Council for
developing and maintaining a DOD financial management enterprise
architecture; In fulfilling this responsibility, the Assistant
Secretary appoint a Chief Architect for DOD financial management
modernization and establish and adequately staff and fund an enterprise
architecture program office that is responsible for developing and
maintaining a DOD-wide financial management enterprise architecture in
a manner that is consistent with the framework defined in the CIO
Council's published guide for managing enterprise architectures. In
particular, the Assistant Secretary should take appropriate steps to
ensure that the Chief Architect;
* obtains executive buy-in and support;
* establishes architecture management structure and controls;
* defines the architecture process and approach;
* develops the baseline architecture, the target architecture, and the
sequencing plan;
* facilitates the use of the architecture to guide financial management
modernization projects and investments;
and;
* maintains the architecture;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: The Assistant Secretary of Defense
(Networks and Information Integration)/DOD Chief Information Officer is
a member of the executive and steering committees; however, as
discussed previously, members' roles and responsibilities are advisory
in nature; DOD established a Financial Management Modernization Program
Office in July 2001. DOD has also appointed a chief architect and,
according to the department, it has adequate program funding and staff
for developing and maintaining its BEA. However, DOD has not yet
defined the roles and responsibilities for the Chief Architect.
Recommendation: (5) The Assistant Secretary of Defense (Command,
Control, Communications & Intelligence) reports at least quarterly to
the Senior Financial Management Oversight Council on the Chief
Architect's progress in developing a financial management enterprise
architecture, including the Chief Architect's adherence to enterprise
architecture policy and guidance from OMB, the CIO Council, and DOD;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: The Assistant Secretary of Defense
(Networks and Information Integration)/ DOD Chief Information Officer
is a member of the steering committee, which is briefed monthly by the
program office on various program activities;
but not necessarily on the development and maintenance of the BEA's
content. The Chief Architect is a member of the program office.
Recommendation: (6) The Senior Financial Management Oversight Council
report to the Secretary of Defense every 6 months on progress in
developing and implementing a financial management enterprise
architecture;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: The Deputy Chief Financial Officer
briefed the Secretary of Defense in November 2003 on behalf of DOD's
Comptroller, who chairs the executive committee.
Recommendation: (7) The Secretary reports every 6 months to the
congressional defense authorizing and appropriating committees on
progress in developing and implementing a financial management
enterprise architecture;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: Senate Report 107-213 directs that
the department report every 6 months on the status of the BEA effort.
DOD submitted status reports on January 31 and July 31, 2003 and on
January 31, 2004. However, these reports were submitted by DOD's
Comptroller and were not signed by the members of the executive or
steering committees.
Recommendation: (8) Until a financial management enterprise
architecture is developed and the Council is positioned to serve as
DOD's financial management investment review board as recommended
above, the Secretary of Defense limit DOD components' financial
management investments to;
* deployment of systems that have already been fully tested and involve
no additional development or acquisition cost;
* stay-in-business maintenance needed to keep existing systems
operational;
* management controls needed to effectively invest in modernized
systems;
and;
* new systems or existing system changes that are congressionally
directed or are relatively small, cost effective, and low risk and can
be delivered in a relatively short time frame;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: DOD has not yet defined and
implemented an approach for selecting and controlling business systems
investments. In March 2004, the Deputy Secretary of Defense signed the
IT portfolio management policy and assigned responsibility to the
domains for IT portfolio management. However, the procedures to be
followed to implement the policy are still under development and no
time frames for completion have been provided. According to the IT
portfolio management policy, the department has 180 days (until mid-
September 2004) to develop these procedures. In addition, the
department has yet to formalize specific roles and responsibilities of
the domains, develop standard criteria for performing the system
reviews, and assign explicit authority for fulfilling roles and
responsibilities. DOD has yet to establish time frames for completing
these activities.
GAO-03-458: DOD Business Systems Modernization: Improvements to
Enterprise Architecture Development and Implementation Efforts Needed.
February 28, 2003.
Recommendation: (1) The Secretary of Defense ensure that the enterprise
architecture executive committee members are singularly and
collectively made explicitly accountable to the Secretary for the
delivery of the enterprise architecture, including approval of each
version of the architecture;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: The department had previously
established the executive and steering committees, which we reported
were advisory in nature. The department recently established the Domain
Owners Integration Team and stated that these three bodies are
responsible for governing the program. However, these groups have not
been assigned the accountability and responsibility for directing,
overseeing, and approving the BEA. According to DOD, it expects to
revise and finalize the executive and steering committees' charters to
include these responsibilities in June 2004.
Recommendation: (2) The Secretary of Defense ensure that the enterprise
architecture program is supported by a proactive marketing and
communication program;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: DOD has a strategic communications
plan;
however, the plan has not yet been executed. According to DOD, the plan
is scheduled to be executed between June and December 2004.
Recommendation: (3) The Secretary of Defense ensure that the quality
assurance function;
* includes the review of adherence to process standards and reliability
of reported program performance,
* is made independent of the program management function, and;
* is not performed by subject matter experts involved in the
development of key architecture products;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: According to DOD, the quality
assurance function does not yet address process standards and program
performance, nor is it yet an independent function. Further, DOD
subject matter experts continue to be involved in the quality assurance
function.
Recommendation: (4) The Secretary gain control over ongoing IT
investments by establishing a hierarchy of investment review boards,
each responsible and accountable for selecting and controlling
investments that meet defined threshold criteria, and each composed of
the appropriate level of executive representatives, depending on the
threshold criteria, from across the department;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: DOD has not yet defined and
implemented an approach for selecting and controlling business systems
investments. In March 2004, the Deputy Secretary of Defense signed the
IT portfolio management policy and assigned responsibility to the
domains for IT portfolio management. However, the procedures to be
followed to implement the policy are still under development and no
time frames for completion have been provided. According to the IT
portfolio management policy, the department has 180 days (until mid-
September 2004) to develop these procedures. In addition, the
department has yet to formalize specific roles and responsibilities of
the domains, develop standard criteria for performing the system
reviews, and assign explicit authority for fulfilling roles and
responsibilities. DOD has yet to establish time frames for completing
these activities.
Recommendation: (5) The Secretary gain control over ongoing IT
investments by establishing a standard set of criteria to include (a)
alignment and consistency with the DOD enterprise architecture and;
(b) our open recommendations governing limitations in business systems
investments pending development of the architecture;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: DOD has not developed standard
criteria for evaluating business systems investments and has not
established time frames for completing this activity.
Recommendation: (6) The Secretary gain control over ongoing IT
investments by directing these boards to immediately apply these
criteria in completing reviews of all ongoing IT investments, and to
not fund investments that do not meet these criteria unless they are
otherwise justified by explicit criteria waivers;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: In March 2004, the Deputy Secretary
of Defense signed the IT portfolio management policy and assigned
responsibility to the domains for IT portfolio management. However, the
procedures to be followed to implement the policy are still under
development and no time frames for completion have been provided.
According to the IT portfolio management policy, the department has 180
days (until mid- September 2004) to develop these procedures. In
addition, the department has yet to formalize specific roles and
responsibilities of the domains, develop standard criteria for
performing the system reviews, and assign explicit authority for
fulfilling roles and responsibilities. DOD has yet to establish time
frames for completing these activities. Further, the policy also does
not address the issuance of waivers in those instances when exceptions
to the BEA are justified on the basis of documented analysis.
GAO-03-1018: DOD Business Systems Modernization: Important Progress
Made to Develop Business Enterprise Architecture, but Much Work
Remains. September 19, 2003.
Recommendation: (1) The Secretary of Defense or his appropriate
designee;
define and implement an effective investment management process to
proactively identify, control, and obtain DOD Comptroller review and
approval of expenditures for new and ongoing business systems
investments exceeding $1 million while the architecture is being
developed and after it is completed, and which includes clearly defined
domain owners' roles and responsibilities for selecting and controlling
ongoing and planned
system investments;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: As discussed in this report, DOD has
not yet defined and implemented an effective investment management
process to proactively identify and control system improvements
exceeding $1 million in obligations. DOD officials have acknowledged
that the department does not have a systematic means to identify and
determine which system improvements should be submitted to the
Comptroller for review and, are dependent upon system owners coming
forward to the domains and requesting approval.
Recommendation: (2) The Secretary of Defense or his appropriate
designee implement the core elements in our Enterprise Architecture
Framework for Assessing and Improving Enterprise Architecture
Management that we identify in this report as not satisfied, including
ensuring that minutes of the meetings of the executive body charged
with directing, overseeing, and approving the architecture are prepared
and maintained;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: DOD has taken some actions, but
these actions are not sufficient to fully address our previous
concerns. For example, DOD has;
* established the Domain Owners Integration Team;
* begun to establish a configuration management process;
* recently issued an IT portfolio management policy governing the
development, maintenance, and implementation of the BEA;
and;
* developed high-level performance measures that are to be used to
develop the more specific results-oriented performance metrics that are
needed to enable it to evaluate program progress and benefits;
However, as discussed previously, accountability and responsibility
have not been assigned to a committee or group comprised of
representatives from across the DOD component organizations--which
would be responsible for directing, overseeing, and approving the BEA.
DOD plans to update the executive and steering committees' charters to
include these responsibilities in June 2004. Also, the configuration
control board has been tasked with reviewing changes to only some, not
all BEA products (e.g., the board is not responsible for tracking
changes that are being made to the transition plan as part of the BEA
effort). In addition, both the charter and the procedures governing the
configuration management process are still in draft. According to DOD,
the charter is to be approved in June 2004, but no time frame has been
provided for final approval of the procedures. The portfolio management
policy does not address accountability for and approval of updates to
the BEA--as called for by best practices. In addition, the policy does
not address the issuance of waivers in those instances when exceptions
to the BEA are justified on the basis of documented analysis. The
department's current verification and validation contractor is not
independent and is responsible for reviewing the BEA products and only
selected program deliverables.
Recommendation: (3) The Secretary of Defense or his appropriate
designee update version 1.0 of the architecture to include the 340
Joint Financial Management Improvement Program requirements that our
report identified as omitted or not fully addressed;
Status of recommendation: Implemented;
DOD‘s comments and our assessment: [Empty].
Recommendation: (4) The Secretary of Defense or his appropriate
designee update version 1.0 of the architecture to include the 29 key
elements governing the "As Is" architectural content that our report
identified as not being fully satisfied;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: Of the 29 elements, DOD stated that
it plans to address 26, but it did not have detailed plans on how and
when they would be fully addressed. According to DOD, it is currently
addressing 2 of the 26--system and process inventories--which will be
part of the transition plan. With respect to the system inventory,
DOD's Comptroller recently testified that the actual number of DOD
systems could be twice as many as is currently reported;
2,274. For the 3 elements that DOD did not consider to be relevant to
the program, it did not provide any explicit analysis as to why the 3
would be irrelevant. Until DOD provides such an analysis, we consider
all 29 elements to be critical for the "As Is" architectural content.
Recommendation: (5) The Secretary of Defense or his appropriate
designee update version 1.0 of the business enterprise architecture to
include the 30 key elements governing the "To Be" architectural content
that our report identified as not being fully satisfied;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: According to DOD, it has partially
addressed 21 elements, but it plans to address all 30. However, DOD did
not provide any detailed plans showing how and when it would fully
address these elements. In addition, the information provided for the
21 elements shows that it had not addressed them but was planning to
address them or had just begun to take needed actions.
Recommendation: (6) The Secretary of Defense or his appropriate
designee update version 1.0 to ensure that "To Be" architecture
artifacts are internally consistent, to include addressing the
inconsistencies described in this report, as well as including user
instructions or guidance for easier architecture navigation and use;
Status of recommendation: Partially implemented;
DOD‘s comments and our assessment: DOD did not have information readily
available to show that it had addressed inconsistencies identified in
our report.
Recommendation: (7) The Secretary of Defense or his appropriate
designee update version 1.0 of the architecture to include (a) the 3
key elements governing the transition plan content that our report
identified as not being fully satisfied and (b) those system
investments that will not become part of the "To Be" architecture,
including time frames for phasing out those systems;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: According to DOD, the next
transition plan will be available in August 2004. However, DOD did not
have information readily available to show how or when it would fully
address our recommendations.
Recommendation: (8) The Secretary of Defense or his appropriate
designee update version 1.0 of the architecture to address comments
made by the verification and validation contractor;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: According to DOD, it has addressed
some of its verification and validation contractor's comments and plans
to address the majority of the others. However, DOD did not have
documentation readily available to show that it had addressed some of
the contractor's comments, and was unable to provide plans detailing
how and when it would fully address the remaining comments. According
to DOD, the verification and validation contractor's comments would be
addressed in BEA updates after version 2.0.
Recommendation: (9) The Secretary of Defense or his appropriate
designee develop a well-defined near-term plan for extending and
evolving the architecture and ensure that this plan includes addressing
our recommendations, defining roles and responsibilities of all
stakeholders involved in extending and evolving the architecture,
explaining dependencies among planned activities, and defining measures
of activity progress;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: As discussed in this report, DOD has
not developed well-defined near-term or long-term plans to be used to
guide day-to-day program activities to enable it to evaluate its
progress.
Recommendation: (10) The Secretary of Defense or his appropriate
designee limit the pilot projects to small, low-cost, low-risk
prototype investments that are intended to provide knowledge needed to
extend and evolve the architecture, and are not to acquire and
implement production version system solutions or to deploy an
operational system capability;
Status of recommendation: Not implemented;
DOD‘s comments and our assessment: The accounting and finance domain
has two ongoing pilot initiatives to acquire and implement production
accounting systems by the end of 2005--at an estimated cost of $135
million. This domain is also currently conducting workshops to develop
needed business rules and requirements for extending and evolving the
BEA in support of DOD's achieving objective of increment one, which
includes achieving an unqualified audit opinion on DOD's fiscal year
2007 consolidated financial statements. However, the department did not
provide detailed plans that showed how or if the workshop results would
serve as the basis for acquiring these production systems.
Source: GAO analysis of DOD data.
[A]DOD DEFINES THE GLOBAL INFORMATION GRID AS THE GLOBALLY
INTERCONNECTED, END-TO-end set of information, capabilities,
associated processes, and personnel for collecting, processing,
storing, disseminating, and managing information on demand to
warfighters, policymakers, and support personnel.
[B]IN MAY 2003, THE DOD COMPTROLLER CHANGED THE ARCHITECTURE NAME FROM
THE Financial Management Enterprise Architecture to the Business
Enterprise Architecture to reflect the transformation of departmentwide
business operations and supporting systems, including accounting and
finance, budget formulation, acquisition, inventory management,
logistics, personnel, and property management systems.
[C]IN SEPTEMBER 2003, DOD ESTABLISHED THE DOMAIN OWNERS INTEGRATION
TEAM, comprised of domain representatives, to facilitate communication
and coordination across the domains.
[D]DOD HAS SIX DEPARTMENTAL DOMAINS, WHICH ARE (1) ACCOUNTING AND
FINANCE, (2) acquisition, (3) human resources management, (4)
installations and environment, (5) logistics, and (6) strategic
planning and budgeting. It also has one enterprise information
environment mission area. The domains and the mission area, comprised
of the Under Secretaries of Defense and the Assistant Secretary of
Defense for Networks and Information Integration/DOD Chief Information
Officer, have authority, responsibility, and accountability within
their domains for business transformation, implementation of the BEA,
development and execution of the transition plan, portfolio management,
and establishment of a structure to ensure representation of the DOD
components and the appropriate federal agencies.
[End of table]
Enclosure IV:
Comments from the Department of Defense:
UNDER SECRETARY OF DEFENSE
1100 DEFENSE PENTAGON
WASHINGTON, DC 20301-1100:
MAY 10 2004
COMPTROLLER:
Mr. Gregory Kutz Director:
Financial Management and Assurance
United States General Accounting Office
Washington, DC 20548:
Dear Mr. Kutz:
Enclosed is the proposed response by the Department of Defense (DoD) to
the General Accounting Office (GAO) Draft Report, "DoD Business Systems
Modernization: Limited Progress in Development of Business Enterprise
Architecture and Oversight of Information Technology Investments,"
(GAO-04-731R), dated April 30, 2004.
The referenced draft General Accounting Office (GAO) report accurately
describes the size and scope of the Business Management Modernization
Program (BMMP). As stated in the opening paragraphs of the draft
report, "DoD is one of the largest and most complex
organizations in the world, overhauling its business operations and
supporting systems represents a huge management challenge."
Furthermore, the draft report pointedly describes the adverse effect of
long-standing business system problems, which have resulted in "a lack
of adequate transparency and appropriate accountability across all
major business areas.":
The DoD agrees with that assessment and concurs with the urgent need to
undertake the largest ongoing transformation in the public sector.
Since July 2001, we have been actively engaged in efforts to correct
these long-standing problems. However, GAO's draft report characterizes
DoD's progress so far as "limited." Though progress over the past 3
years admittedly has been slower than either GAO or DoD would prefer,
it has been significant, despite appearances to the contrary. The
report also underestimates development methodology of the Business
Enterprise Architecture (BEA), as well as the significant growth in
program maturity. The Department remains committed to working with GAO
to address these issues.
My point of contact for this matter is Dr. Paul Tibbits, Director for
Business Modernization and Systems Integration (BMSI). Dr. Tibbits may
be contacted by email: Paul.Tibbits@osd.mil or by telephone at (703)
607-3370.
Sincerely,
Signed by:
Lawrence J. Lanzillotta:
Acting
Enclosure: As stated:
Department of Defense (DoD) Response to General Accounting Office (GAO)
Draft Report, "DoD Business Systems Modernization: Limited Progress in
Development of Business Enterprise Architecture and Oversight of
Information Technology Investments" (GAO-04-731R):
DoD Response: The referenced draft General Accounting Office (GAO)
report accurately describes the size and scope of the Business
Management Modernization Program (BMMP). As stated in the opening
paragraphs of the draft report, "...DoD is one of the largest and most
complex organizations in the world, overhauling its business operations
and supporting systems represents a huge management challenge."
Furthermore, the draft report pointedly describes the adverse effect of
long-standing business system problems, which have resulted in "a lack
of adequate transparency and appropriate accountability across all
major business areas." The Department of Defense (DoD) agrees with that
assessment and concurs with the urgent need to undertake the largest
ongoing transformation in the public sector. Since July, 2001, we have
been actively engaged in efforts to correct these long-standing
problems. However, GAO's draft report characterizes DoD' s progress so
far as "limited." Though progress over the past 3 years admittedly has
been slower than either GAO or DoD would prefer, it has been
significant, despite appearances to the contrary. The report also
underestimates development methodology of the Business Enterprise
Architecture (BEA), as well as the significant growth in program
maturity.
GAO's report states that DoD has little to show for its three-year
effort and $203 million investment. However, GAO's assessment does not
adequately consider or incorporate in their report important completed
and ongoing activities, plans, and documentation. In addition to the
scope and complexity of the BMMP, DoD must solve difficult, persistent,
and tenacious culture, management and partnership barriers to defining
and using the BEA to drive business transformation, conditions for
which the GAO report seems to offer no allowances, although it
certainly acknowledges them.
The draft report asserts that GAO has not observed significant change
since their last review, which seems improbable considering the level
of effort expended during the past year. However, it is possible that
GAO's observations overlooked ongoing architecture development
activity or governance deliberations and therefore did not recognize
relevant improvements in their report. For example, the report should
highlight the significance of the Information Technology (IT) Portfolio
Management policy memorandum issued March 22, 2004. This document lays
the foundation of the Department's portfolio management strategy and
will be supplemented by the IT Portfolio Management Instruction,
currently under development, and other management initiatives.
In 2003-2004, DoD Chief Financial Officer (CFO) and Chief Information
Officer (CIO) collaborated on the DoD portfolio management policy. The
BMMP and its associated governance also enabled development of a
comprehensive directive to leverage the BEA and portfolio management
for near term IT investment decisions.
The DoD IT budget request for FY05 totals $29B. This budget includes
business applications, warfighting systems, shared infrastructure,
information assurance and related
technical activities. The business applications portion of the DoD IT
budget totals $5.0313 in FY05, which includes BMMP systems and IT
activities that support business functions of the Department.
Warfighting systems account for $7.813, shared infrastructure accounts
for $12.813, and Information Assurance and related technical activities
account for $3.113. DoD Domains clearly have responsibility for
developing and implementing business transition plans and portfolios
that will assure that the $4.813 annual business system expenditures
cited in the referenced GAO report are focused on the established
business transformation goals of the Department.
DoD's proposed Management Initiative is a key document that lays out
specific Domain responsibility and authority for DoD business
transformation. It is expected to be released in May 2004. The GAO
report does not it recognize the magnitude of the BMMP governance
accomplishments. For the first time in its history, DOD's business
executives are taking an integrated view of the business environment
and making collaborative decisions based on an enterprise view. In
addition, a major accomplishment and strong indicator of DoD
architecture management maturity is the series of completed and ongoing
Domain-led workshops and the subsequent collaborative Domain-led
Architecture Integration Team (AIT) sessions.
The portfolio management policy (Attachment 1), draft portfolio
management instruction and other related documents, provide clear
direction and accountability for management and oversight of IT
investment decisions. This accountability structure, organized along
functional business owner lines, is the key mechanism for achieving DoD
investment control frequently called for in GAO and other audit and
management reports. These policy documents will provide the Department
the visibility and information necessary to make informed investment
decisions.
The Department's BEA, containing the baseline "blueprint" of the
Department's vast, worldwide business activities (e.g., business
policies and rules, business process controls, information flows, and
business operational data collection and use), is one of the largest,
most complex, and most pervasive business architectures developed to
date, in either the public or private sectors. The DoD progress in the
past three years exceeds any experience in the private sector and
government.
There is no proven roadmap to guide our actions thus far. Despite the
absence of a direct precedent or example to follow, DoD continues to
take full advantage of guidelines, lessons learned and consultant
expertise in addition to the guidance provided by GAO.
BEA 5coue and Detail:
The BEA 1.1 Release provided the baseline and also illustrated the need
to approach architecture extensions in an incremental manner on
creating additional detail. As such, DoD is deliberately delivering
these extensions in increments, each scoped to take approximately a
year to define in the BEA. DoD identified and approved the focus areas
of the additional two increments (Two and Three) at the Domain Owner
Integration Team (DO/IT) meeting on March 22, 2004 and the BMMP
Steering Committee meeting on March 25, 2004 (Attachments 2 and 3). The
scope of increment one had already been approved.
* Increment One: Unqualified audit opinion (UAO), asset accountability
and total force visibility.
* Increment Two: Acquisition best practices, total asset visibility,
improved force management, improved military health care, and improved
environmental safety and occupational health.
* Increment Three: Improved planning, programming, budgeting and
execution, integrated total force management, and improved force
management.
The scope for each increment includes the processes, information,
requirements and business rules pertinent to accomplishing each of the
major focus areas. For the BEA, the Executive Summary Concept of
Operations (Attachment 4) defines the needed level of detail: "The BEA
shall depict architecture products in sufficient detail to provide an
unambiguous interpretation of cross-Domain business transactions".
Plans to Extend and Evolve BEA:
The BEA is an integrated plan for Departmental business transformation.
It includes work products consisting of models, diagrams, tables, and
narratives, all of which translate DoD's business activities into
meaningful representations of business processes with comprehensive
integration of relevant rules and regulations. These include the
initial all views (AV), system views (SV), technical views (TV) and
operational views (OV) of the business processes of the six key DoD
business Domains. The Domains encompass the following business areas;
Accounting and Finance, Acquisition, Human Resource Management,
Installations and Environment, Logistics, and Strategic Planning and
Budget. For the first time in the history of DoD, each Domain Owner is
now serving as the single authoritative source of interpretation of
rules and regulations for the Department in each of their respective
areas of cognizance. In addition to the Business Domains, the Assistant
Secretary of Defense (Networks and Information Integration)/Chief
Information Officer - ASD(NII)/CIO - is the leader of the Enterprise
Information Environment (EIE) Mission Area. This Mission Area is
composed of equipment, software and common information capabilities or
services for Enterprise use.
In the Fall of 2003, the BEA was extended to include the Reference
Business Process Model (RBPM), which proposed a desired condition for
the enterprise-level business processes for BEA 2.0. This Release was
published in February 2004.
For Increment One, all Domains conducted preparatory workshops to
define supporting business processes more fully. From October 2003 to
January 2004, the Accounting and Finance Domain conducted 26 workshops
(Attachment 5) to specifically analyze DoD business processes and
associated financial management requirements. These formed the basis
for extended analysis by the increment one Architecture Integration
Team (AITs), which focus on the following process categories:
* Team #1: Apportionment:
* Team #2: Receipts & Acceptance:
* Team #3: Commitments & Obligations:
* Team #4: Receivables, Payables & Disbursements:
* Team #5: Asset Accountability:
* Team #6: Purchase Card/Travel Card:
Each of the AITs is comprised of 8 to 21 team members consisting of
Domain Action Officers (DAOs) serving as a Team Lead, domain Subject
Matter Experts (SMEs) and Business Modernization Systems Integration
(BMSI) staff supporting the teams with process modelers, data modelers,
requirements analysts and accountants. Although they did not take
advantage of the DoD offer, GAO was invited to participate in any and
all the AIT sessions to witness the significance and depth of this
collaborative work. The AITs are key to assuring cross domain
integration, unambiguous interpretation of requirements across the
Department, and coherent representation of end-to-end processes that
will serve as the roadmap for subsequent IT investment and system
configuration decisions.
As described in the AIT methodology, DoD is developing the Enterprise
Business Process Model (EBPM), and end-to-end descriptions of DoD
business processes. This model will accurately identify financially
relevant requirements and business rules necessary to resolve all known
material weaknesses to support an Unqualified Audit Opinion and asset
accountability. These rules and requirements, along with their
associated data objects, are being linked to DoD business processes.
The EBPM will update the RBPM previously published in BEA Release 2.0.
The initial EBPM (in HTML) and updated Overview and Summary (AV-1) were
released on April 30, 2004 (BEA 2. 1) as scheduled and approved. This
Release represents a significant improvement of the BEA and can be
found on the BMMP Portal (portal navigation instructions are at
Attachment 6).
The near term schedules for completing Release 2.2 are shown in
Attachments 7 and 8. The EBPM defines the complete end-to-end process
of doing business in the Department, from planning to disposal. The
activity model developed for the baseline BEA will be aligned with the
enterprise processes (EBPM) to ensure architectural completeness, and
to facilitate its use. BEA Release 2.1 Overview and Summary (AV-1,
Attachment 9) explains that the content of BEA Release 2.2, scheduled
for July 2004, will support IT investment decisions for the FY06
Budget. Release 2.3 (October 2004) and 2.4 (January 2005) will augment
BEA 2.2 for enhanced portfolio management acquisition decision support
and business process re-engineering. Attachment 10 maps architecture
products to business utility and will serve to prioritize and focus
development of BEA products.
In BEA Release 2.2, DoD will concentrate on completeness and
correctness of the requirements repository, business rules, the
enterprise business process model, the conceptual data model, and
system functions, entities and information exchanges related to
Increment One. Release 2.3 will add the relevant realigned activity
model, and updated organizational nodes, roles, information and
activities.
In summary, since the publication of BEA Release 1.0 in May 2003, the
Department has:
* Completed an initial Transition Plan that identifies BMMP concept
strategy and delineates steps for future business transformation.
* Established the enterprise-wide DoD Portfolio Management policy.
Page 4 of 10:
* Established a DoD-wide BMMP Governance Structure, which defines
program strategies, performs strategic decision-making, and provides
oversight and control of portfolio management responsibilities with
respect to IT business system investments.
* Established an incremental
approach for extending the BEA into implementable parts that will drive
transformed business operations into DoD. BMMP Increments One, Two, and
Three have been approved by the BMMP Steering and Executive Committees.
* Established initial BMMP and BMSI program office performance metrics
(i.e., goals, objectives, measures and targets), and is near completion
of an integrated set of enterprise and domain business transformation
metrics. DoD plans to begin data collection and reporting in the 4`h
Quarter of FY04.
* Established the initial inventory of business IT systems.
* Identified the template and program entries to instruct the
implementation of a Standard General Ledger (SGL).
* Developed a schedule for completion of initial business process
reengincering and modeling for integration with the next extension of
the BEA.
Independent Verification and Validation Contractor:
GAO states that "DOD does not have an independent verification and
validation function to review the architecture products and management
processes. The department's current verification and validation
contractor is not independent and only reviews selected architecture
products." The current independent verification and validation (IV&V)
contractor is a neutral third party, a Federally Funded Research and
Development Center (FFRDC), free of organizational conflict of interest
(OCI) issues. The contractor is not directly involved with the BEA or
the Transition Plan development; hence they provide the requisite
independence. Under the recently revised BMSI organization structure,
the 1V&V contractor is not within the BEA or Transition Planning chain
of command. IV&V contractor activities are included in a separate
directorate with Quality Assurance and Risk Management. To assure
independence, reports of the IV&V contractor are provided directly to
GAO and the Steering Committees. (The list of IV&V items reviewed since
April 2003 and provided to GAO is included in Attachment 11):
The IV&V contractor provides input to evaluation criteria for major
deliverables and reviews the significant architecture-related
documentation developed by the BMSI office. These include; architecture
methodology, requirements management methodology, BEA Releases and
other significant documents. The BMSI office is in the process of
extending the IV&V support through a competitive acquisition process.
The contract award is anticipated by June 2004.
GAO and Verification and Validation Contractor Comments:
Attachment 12 is the verification and validation contractor's report on
BEA Release 2.0 as submitted to DoD and GAO. It supports DoD statements
that some of the contractor's recommendations were addressed in Release
2.0. Specific comments are on pages 17, 18, 19,
21, 22, and 23. DoD expects Release 2.2 and 2.3 of the architecture to
address the remaining IV&V comments. Attachment 13 is a matrix showing
consolidated comments mapped to disposition.
DoD is also addressing the 61 content elements identified by GAO.
Attachment 14 shows the evaluation criteria for the detailed action
plan for developing AS-IS BEA products. This action plan, scheduled for
completion June 28, 2004, will provide the timeline to reconcile and
address GAO content elements. Status for addressing the TO-BE
architecture products is at Attachment 15. Attachment 16, BEA
Information Assurance (IA) Guidance, illustrates DoD's plans to address
IA and Security and Attachment 17 contains the BEA Configuration
Management (CM) Plan as approved and implemented on January 28, 2004.
To ensure that BEA considers and implements all of the GAO comments
concerning the maturity of the architecture, DoD is using the GAO
Framework for Enterprise Architecture Management Maturity to measure
BMSI performance, as briefed to the BMMP Steering Committee.
DoD will measure BMSI performance relative to the quality of BEA
content, and its alignment with the Federal Enterprise Architecture
(FEA), using the Office of Management and Budget (OMB) Guidelines for
Enterprise Architecture Assessment Framework. To ensure consistent
mapping to FEA, DoD has developed a set of DoD enterprise reference
models (see Attachment 18) that map to each of the FEA reference
models.
BMMP Governance Structure:
The Department has established a BMMP Governance structure that
institutionalizes the participation of senior civilian and military
leaders from the Department's key business areas. We have created, and
are using, a hierarchy of governance committees to address and resolve
business transformation issues in the most efficient manner, at the
lowest level possible.
Through the Program's Executive Committee, the Secretary's senior
political leadership provides strategic direction and guidance. The
BMMP Executive Committee and Steering Committee are jointly chaired by
the DoD CFO and DoD CIO, and include representatives from both the
Office of the Secretary of Defense and the Military Services. The
Domain Owners Integration Team (DO/IT) are responsible for business
transformation by establishing and maintaining intra-Domain governance
processes, managing domain-specific Information Technology (IT)
investment portfolios, ensuring systems compliance with the BEA, and
assisting in the extension of the enterprise architecture..
The Governance Structure, at the appropriate level, has actively
engaged in developing the Department's enterprise level Portfolio
Management policies, and now is developing the guidance to the DoD
Components regarding the submission of IT exhibits for the FY06 budget.
With the release of the Department's Management Initiative, expected in
May 2004, greater detail regarding roles and responsibilities will be
explicitly articulated and Domain Owners will be provided additional
direction to manage DoD IT investments as portfolios. DOD's Management
Initiative will establish specific time frames (30 days from signature
date) for the issuance of initial Portfolio Management guidance, to
include the criteria for performing reviews of proposed IT investments.
Architectural compliance is noted as one of the criteria for decisions
on what investments to make, and to modify or terminate a system in the
recently issued Information Technology
Portfolio Management policy memorandum. This policy memorandum states
that the Under Secretary of Defense (Comptroller)(USD(C))/CFO is
responsible for developing and maintaining the DoD BEA as a component
of the overarching Global Information Grid (GIG) architecture. The
USD(C) is therefore accountable for the approval of updates to the BEA,
as called for by best practices.
The issue of waivers is addressed in DoD Directive 8100.1, "Global
Information Grid (GIG) Overarching Policy", dated September 19, 2002.
This directive is referenced in the Information Technology Portfolio
Management policy memorandum. DoD Directive 8100.1 states that the DoD
Chief Information Officer is responsible for establishing GIG
compliance and enforcement mechanisms to minimize duplication of IT.
The BEA Conops (Attachment 4) clarifies that the BEA is a component of
the GIG and, as such, the GIG waiver policy applies to the BEA as well.
Timeframes have been established for the development and implementation
of a DoD directive and instruction on IT Portfolio Management. The IT
Portfolio Management policy memorandum was signed by the Deputy
Secretary of Defense, March 22, 2004. This policy memorandum will be
issued as a directive within 180 days (mid-September 2004). An
accompanying IT Portfolio Management Instruction is under development,
and as stated earlier, will be issued 30 days from signature of the
Management Initiative. Coordination of this instruction will begin in
June 2004, with a scheduled completion date of December 2004, The
Department is not waiting for the publication of these documents to
begin the review process. The Steering Committee completed its first
round of IT Portfolio Management reviews for all Domains in March 2004.
Decisions from these and subsequent reviews this Summer and Fall will
guide the FY06 budget preparation process.
The Domains have a strong oversight responsibility for guiding
investment in IT. However, the GAO has recommended that funds for DoD
business systems be appropriated directly to the Domains in order to
provide for accountability, transparency, and the ability to prevent
"...a continued parochial approach to systems investments that exists
today.":
The Department does not concur with this recommendation, and does not
envision a governance structure in which Domain owners are assigned the
management responsibility for the planning, design, acquisition,
deployment, operation, maintenance, and modernization of individual DoD
business systems. Similarly, DoD does not envision a governance or
program management strategy in which funds are appropriated to Domain
leaders rather than the military service and Defense agencies to
operate, maintain, and modernize DoD business systems. The Department
does not consider this recommendation to be advisable for several
reasons.
The GAO's recommendation appears to have been made without
consideration of the Department's long standing recognition of the need
for operational expertise and perspective in the development of
business IT systems. The recommendation was made without regard for
collaborative consultation before advancing a concept that is radically
different from the portfolio management concepts being implemented in
DoD today. Finally, funds management by the Domains would require
creation of a completely new layer of bureaucracy to assure proper
management of appropriated funds.
Beginning with the FY06 DoD program budget development process, the
Domains will be acting as an Investment Review Board, and will provide
strong management oversight to the Department's business IT investment
decisions. Therefore the Domains will oversee, coordinate and guide the
business system investment decisions made by the DOD Components. IT
investments will be based on Domain approval. The DoD demonstrated in
last year's Program Review how the Logistics Domain realigned resources
from lower priority efforts into programs that better support the BEA.
In this case, the DoD moved $121M within the Army, $87M within the
Navy, and the $139M within the DLA - clearly a successful demonstration
of portfolio management. We are expanding that effort by working with
all the Domains to identify opportunities for similar realignments in
the FY06 budget.
DOD has the strongest requirements, acquisition and budgeting processes
of any Federal Agency. Our efforts to govern BMMP within these existing
processes, suggests that we will have an even more robust oversight
process for controlling portfolio investments. All Major
Automated Information Systems (MAIS) programs are subjected to the same
acquisition oversight as Major Defense Acquisition Programs (MDAP),
including adherence to Clinger-Cohen Act requirements. IT Capital
Planning and Investment Control have been instituted in DoD through
longstanding processes and executive-level forums. The Department uses
the Planning, Programming, Budgeting, and Execution System and the
Defense Acquisition System to select, manage, and evaluate IT
investments. DoD uses these existing management processes in lieu of
creating parallel processes to manage IT investments - ensuring the
integration of IT investments into the total DoD investment portfolio
in compliance with the BEA.
Several decision-making forums govern the movement of proposed IT
investments from one phase to the next, and ultimately determine
whether programs will be approved for funding. These bodies include the
Defense Resources Board, Defense Acquisition Board, IT Overarching
Integration Product Teams (OIPT), the DoD CIO Executive Board, and the
GIG Architecture Integration Panel. The roles of these bodies include
ensuring proposed IT investments support core missions, allocating
resources, overseeing and controlling IT investments, and overseeing
the development and configuration management of integrated
architectures.
Systems Review and Legislative Compliance:
The Department acknowledges that a more proactive approach is required
to ensure certification compliance with the legislative requirement of
the FY03 National Defense Authorization Act. To that end, we are
currently finalizing and issuing guidance that will significantly
improve the process by clearly delineating roles and responsibilities,
establishing time frames and making key system modifications to better
align budgets with actual IT expenditures. The guidance directs the
Business Domains to develop and submit business 1T system certification
compliance plans to the USD(C) within thirty days of issuance of
Management Initiative. The plan must include a schedule to accomplish
the reviews for all the systems comprising at least 80 percent of the
total business system funding by August 23, 2004. To facilitate
development of the plans the Department will use the Information
Technology Application (ITMA) and system repositories of the
Components, which serve as key components
in developing the Department's IT budget requirements, as the primary
source to identify Business IT systems needing USD(C) certification.
The completion of these reviews by Fall 2004 is required so that
Domains will have the opportunity to review component budget
submissions during the Program/Budget review cycle and make necessary
funding adjustments to the FY06 budget.
Both the BEA and the Business IT investment governance structure depend
significantly on the business system portfolio management process being
established within the Department's key business Domains. Beginning
with the FY06 budget development process, the Domains will provide
strong management oversight to the Department's near-term business
system investment decisions. Additionally, the Department has developed
standard architecture criteria by which the business systems can be
evaluated, to ensure they are being developed and managed in accordance
with BMMP. These criteria will be enhanced as the BEA matures.
Metrics:
The Department understands the importance of establishing meaningful,
tangible, and measurable program goals and objectives to guide and
measure the value of business transformation investments. The
establishment of a comprehensive performance measurement process for
the transformation of DoD business operations, the largest business
operations in the world, takes substantial time, resources, and
extensive cross-organizational coordination. BMMP has made substantial
progress establishing metrics (i.e., goals, objectives, measures, and
targets) to include business transformation metrics and BMSI Program
Management Office management metrics.
As approved by the Steering Committee and the DOAT, DoD is nearing
completion of an initial integrated set of enterprise and domain
business transformation metrics and plans to begin data collection and
reporting in 4 Quarter FY04. BMMP expects the integrated set of metrics
to encompass approximately 16 to 20 goals, 30 to 50 objectives, and 90
to 120 measures. These metrics reflect a major accomplishment because
they provide the basis for demonstrating the alignment of business
transformation investments with strategic outcomes.
Additionally, BMSI has established Architecture Integration Team (AIT)
performance metrics that track the number of requirements dispositioned
relative to the total number of requirements and the percent of process
steps reviewed relative to the total number of process steps. BMSI
tasking to contractors is quite clear, serving as the basis for use of
rigorous Earned Value Management metrics for BEA development. BMSI is
establishing an Architecture and Program Management Maturity Plan and
supporting metrics to address the quality, content, and utility of the
BEA. BMSI is establishing a balanced scorecard (BSC) and supporting
metrics focused on the organization's internal management processes.
Contracting Issues:
Under the General Services Administration (GSA) schedule through which
the BEA Blanket Purchase Agreement (BPA) was awarded, only two types of
contracts are permitted,
Time and Materials (T&M) and Firm Fixed Price (FFP). Due to the
complexity and evolutionary nature of the BEA development effort, it is
not prudent acquisition strategy to use a firm, fixed price vehicle.
Maintaining, extending and integrating the architecture can be
accomplished in a variety of ways using many different approaches, such
as the use of AITs.
The Government and the prime contractor establish acceptance criteria
prior to work beginning on each deliverable. The Government uses the
established criteria to evaluate the deliverables, after providing a
clear understanding of the work expectations. Government personnel
monitor the progress on a daily basis.
In addition, the Government holds weekly reviews with the Contractor to
monitor deliverables, performance (Earned Value Management System-
EVMS). The attached work statement for Call 0009 (Attachment 19)
includes additional EVMS requirements the Government is instituting to
more closely monitor performance.
Pilot Initiatives:
The Accounting and Finance Domain is serving as the program advocate
and oversight entity, to assure compliance with the BEA, in accordance
with the responsibilities assigned to the Domains, for two Component
acquisitions of Joint Financial Management Improvement
Program (JFMIP)-compliant financial management systems (Defense
Enterprise Accounting and Management System (DEAMS) and General Fund
Enterprise Business System (GFEBS)) to support the Department's general
and working capital fund activities. These initiatives are being funded
by the individual Components, not the Accounting and Finance Domain.
The following are GAO's comments on the Department of Defense's (DOD)
letter dated May 10, 2004.
GAO Comments:
See the "Agency Comments and Our Evaluation" section of this report.
We have reviewed multiple versions of the architecture development
methodology, including the latest version, which is currently draft.
Based on our review of the latest draft, we concluded that this
methodology does not provide a documented approach for performing
activities in a coherent, consistent, accountable, and repeatable
manner. Key DOD stakeholders also expressed concerns about the
methodology. For example, these stakeholders stated that it is an
"after-the-fact" description of work products rather than a
prescriptive document that details the approach to be followed to
develop the architecture.
The descriptions of increments 2 and 3 in DOD's comment letter are
different than the descriptions the program manager provided to us on
April 27, 2004, as reflected in this report. Because of the
inconsistencies in the responses, it remains unclear what the
department's focus is for increments 2 and 3. DOD's response also
stated that the executive committee approved all three increments;
however, DOD did not provide evidence of this approval.
As stated in our report, DOD's objective for achieving an unqualified
audit opinion is not supported by a DOD-wide plan of action nor are the
individual component plans linked to program activities.
As stated in our report, DOD does not expect to complete the next
version of its transition plan until August 2004. In addition, as we
previously reported,[Footnote 41] its initial transition plan was
basically a plan to develop a transition plan and did not possess the
attributes needed to guide its transformation efforts.
Attachment 11 does not list the deliverables the verification and
validation contractor has reviewed since April 2003.
The matrix does not show the anticipated disposition (e.g., date and
architecture version) of the verification and validation contractor's
comments.
This information was provided after fieldwork was completed.
These briefings were presentations given by each domain describing its
approach for conducting portfolio management reviews. The steering
committee did not review actual systems investments nor was there
detailed discussion about the domains' approaches.
The scope of our review did not include an evaluation of the
realignment of funds made by the logistics domain to determine an
effective demonstration of portfolio management.
DOD's characterization of its current process for oversight and control
of modernization investments is inaccurate. We along with the DOD
Inspector General continue to report on significant weaknesses in the
department's requirements, acquisition, and budgeting processes for
business systems modernization projects. For example, we
reported[Footnote 42] that estimated costs for the Defense Procurement
Payment System had increased by $274 million and the schedule had
slipped by almost 4 years after having already invested 7 years and
over $126 million. DOD Comptroller's noted that the project was being
terminated due to poor program performance and increased costs.
We look forward to receiving DOD's forthcoming guidance to contracting
and program officials that describes the process by which these
officials obtain DOD Comptroller's statutorily required determination
before making obligations exceeding $1 million for a financial system
improvement. However, given the obligation data provided to us by DOD
and included in our report, we are concerned that DOD plans no action
to review previous obligations for system improvements to ensure that
there have been no such violations since the enactment of the
limitation.
We continue to believe that contractor tasks have not been clearly
defined and that, because DOD is acquiring services on the basis of
time and materials, it is essential that the department use efficient
methods and effective cost controls to measure the work being
performed. While we did not take issue with DOD on its use of a time
and materials contract, we did state that DOD's failure to execute the
required Determination and Finding to evaluate the cost and performance
risks assumed by the government illustrates an overall lack of clear
architecture development plans.
According to a program official, DOD did not begin requiring acceptance
criteria prior to the contractor beginning work until August 2003.
Further, DOD has paid the contractor under the time and materials
contract even when the contractor did not meet all of the criteria for
the deliverable. For example, based on reports provided by DOD, the
department paid the contractor for delivery of version 2.0 of the
architecture even though this version did not meet 50 percent of the
acceptance criteria.
Enclosure V:
GAO Contacts and Staff Acknowledgments:
GAO Contacts Jenniffer Wilson, (202) 512-9192:
Cynthia Jackson, (202) 512-5086:
Acknowledgments In addition to the individuals named above, key
contributors to this report included Beatrice Alff, Francine
DelVecchio, Abe Dymond, Joanne Fiorino, Neelaxi Lakhmani, J.
Christopher Martin, Mai Nguyen, Michael Peacock, David Plocher,
Katherine Schirano, Darby Smith, and Bernard Trescavage.
(192114):
GAO-03-465.
FOOTNOTES
[1] U.S. General Accounting Office, Information Technology:
Architecture Needed to Guide Modernization of DOD's Financial
Operations, GAO-01-525 (Washington, D.C.: May 17, 2001).
[2] The Business Management Modernization Program is the department's
business transformation initiative; it encompasses defense policies,
processes, people, and systems that guide, perform, or support all
aspects of business management--including development and
implementation of the business enterprise architecture. The Under
Secretary of Defense (Comptroller) established a DOD-wide program
management office called Business Modernization and Systems Integration
(BMSI), to oversee and manage the program.
[3] Business systems include financial and nonfinancial systems, such
as civilian personnel, finance, health, logistics, military personnel,
procurement, and transportation, with the common element being the
generation or use of financial data to support DOD‘s business
operations.
[4] Bob Stump National Defense Authorization Act for Fiscal Year 2003,
Pub. L. No. 107-314, § 1004, 116 Stat. 2458, 2629 (Dec. 2, 2002).
[5] In May 2003, the DOD Comptroller changed the architecture name from
the Financial Management Enterprise Architecture to the Business
Enterprise Architecture to reflect the transformation of departmentwide
business operations and supporting systems, including accounting and
finance, budget formulation, acquisition, inventory management,
logistics, personnel, and property management systems.
[6] U.S. General Accounting Office, DOD Business Systems Modernization:
Summary of GAO's Assessment of the Department of Defense's Initial
Business Enterprise Architecture, GAO-03-877R (Washington, D.C.: July
7, 2003).
[7] U.S. General Accounting Office, DOD Business Systems Modernization:
Important Progress Made to Develop Business Enterprise Architecture,
but Much Work Remains, GAO-03-1018 (Washington, D.C.: Sept. 19, 2003).
[8] GAO-03-1018.
[9] The steering committee, made up of senior leaders from across the
department, is advisory in nature and is not accountable for directing,
overseeing, and approving the architecture.
[10] DOD has six departmental domains, which are (1) accounting and
finance, (2) acquisition, (3) human resources management, (4)
installations and environment, (5) logistics, and (6) strategic
planning and budgeting. It also has one enterprise information
environment mission area. The domains and the mission area, comprised
of the Under Secretaries of Defense and the Assistant Secretary of
Defense for Networks and Information Integration/DOD Chief Information
Officer, have authority, responsibility, and accountability within
their domains for business transformation, implementation of the
architecture, development and execution of the transition plan,
portfolio management, and establishment of a structure to ensure
representation of the DOD components and the appropriate federal
agencies.
[11] U.S. General Accounting Office, Information Technology: A
Framework for Assessing and Improving Enterprise Architecture
Management (Version 1.1), GAO-03-584G (Washington, D.C.: April 2003).
[12] GAO-03-1018.
[13] GAO-01-525.
[14] U.S. General Accounting Office, DOD Business Systems
Modernization: Improvements to Enterprise Architecture Development and
Implementation Efforts Needed, GAO-03-458 (Washington, D.C.: Feb. 28,
2003).
[15] GAO-03-1018.
[16] GAO-01-525; U.S. General Accounting Office, DOD Financial
Management: Important Steps Underway But Reform Will Require a Long-
term Commitment, GAO-02-784T (Washington, D.C.: June 4, 2002); and U.S.
General Accounting Office, Department of Defense: Further Actions
Needed to Establish and Implement a Framework for Successful Business
Transformation, GAO-04-626T (Washington, D.C.: Mar. 31, 2004).
[17] GAO-01-525.
[18] GAO-03-458.
[19] U.S. General Accounting Office, Information Technology:
Observations on Department of Defense's Draft Enterprise Architecture,
GAO-03-571R (Washington, D.C.: Mar. 28, 2003).
[20] GAO-03-877R and GAO-03-1018.
[21] GAO-03-1018.
[22] GAO-01-525.
[23] GAO-03-458.
[24] GAO-03-584G.
[25] Best practices recommend that the verification and validation
function be independent of the architecture program and report directly
to the steering committee.
[26] JFMIP requirements arise from various public laws, regulations,
bulletins, circulars, federal accounting standards, and leading
practices and are applicable governmentwide.
[27] The focus of this review was limited to the "As Is" and "To Be"
architecture products, because the transition plan has not been
updated.
[28] We also found that in issuing task orders to International
Business Machines (IBM) pursuant to the General Services Administration
contract, DOD did not execute a Determination and Finding to support
its use of Time-and-Materials task orders, as required by Federal
Acquisition Regulation 16.601, 48 C.F.R. § 16.601 (2003). This
Determination and Finding requirement guides agencies in evaluating the
cost and performance risks assumed by the government in awarding Time-
and-Materials contracts compared to other types of contracts that may
provide increased incentives for the contractor to control costs and
efficiency.
[29] Subsection 1004(d) of the Bob Stump National Defense Authorization
Act for Fiscal Year 2003, Pub. L. No. 107-314, 116 Stat. 2630, (Dec. 2,
2002), provides that any amount in excess of $1 million may be
obligated for Defense financial system improvements before approval of
its enterprise architecture and a supporting transition plan only if
the DOD Comptroller makes a determination that the improvement is
necessary for (1) critical national security capability or critical
safety and security requirements or (2) prevention of significant
adverse effect on a project that is needed to achieve an essential
capability. The act further provides that after the architecture and
transition plan are approved, the DOD Comptroller must determine,
before making obligations that exceed $1 million for system
improvements, that such improvements are consistent with the enterprise
architecture and the transition plan.
[30] GAO-01-525 and GAO-03-458.
[31] We requested the obligational data for fiscal year 2003 for the
period December 2, 2002, the date of enactment of the act, through
September 2003.
[32] GAO-04-626T.
[33] U.S. General Accounting Office, DOD Business Systems
Modernization: Continued Investment in Key Accounting Systems Needs to
be Justified, GAO-03-465 (Washington, D.C.: Mar. 28, 2003).
[34] Wide Area Workflow is a secure web-based system for electronic
invoicing, receipt, and acceptance.
[35] GAO-03-465.
[36] GAO-04-626T.
[37] U.S. General Accounting Office, Department of Defense: Further
Actions Needed to Establish and Implement a Framework for Successful
Financial and Business Management Transformation, GAO-04-551T
(Washington, D.C.: Mar. 23, 2004) and GAO-04-626T.
[38] GAO-03-458.
[39] GAO-04-551T.
[40] U.S. General Accounting Office, Information Technology: A
Framework for Assessing and Improving Enterprise Architecture
Management (Version 1.1), GAO-03-584G (Washington, D.C.: April 2003).
[41] External requirements are those that are obtained from
authoritative sources, such as the Joint Financial Management
Improvement Program, and constrain various aspects of the architecture.
[42] GAO-03-1018.
[43] GAO-03-465.