DOD Business Systems Modernization

Long-Standing Weaknesses in Enterprise Architecture Development Need to Be Addressed Gao ID: GAO-05-702 July 22, 2005

The Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 directed the Department of Defense (DOD) to develop, by September 2005, a well-defined business enterprise architecture (BEA) and a transition plan. GAO has made numerous recommendations to assist the department in successfully doing so. As part of ongoing monitoring of the architecture, GAO assessed whether the department had (1) established an effective governance structure; (2) developed program plans, including supporting workforce plans; (3) performed effective configuration management; (4) developed well-defined BEA products; and (5) addressed GAO's other recommendations.

To effectively and efficiently modernize its nonintegrated and duplicative business operations and systems, it is essential for DOD to develop and use a well-defined BEA. However, it does not have such an architecture, and the products that it has produced do not provide sufficient content and utility to effectively guide and constrain ongoing and planned systems investments. As a result, despite spending almost 4 years and about $318 million, DOD does not have an effective architecture program. The current state of the program is due largely to long-standing architecture management weaknesses that GAO has made recommendations over the last 4 years to correct. In particular, DOD has not done the following: (1) established an effective governance structure, including an effective communications strategy, to achieve stakeholder buy-in. In particular, the structure that has been in place since 2001 lacks the requisite authority and accountability to be effective, and the key entities that made up this structure have not performed according to their respective charters; (2) developed program plans that explicitly identify measurable goals and outcomes to be achieved, nor has it defined the tasks to be performed to achieve the goals and outcomes, the resources needed to perform these tasks, or the time frames within which the tasks will be performed. DOD also has not assessed, as part of its program planning, the workforce capabilities that it needs in order to effectively manage its architecture efforts, nor does it have a strategy for doing so; (3) performed effective configuration management, which is a formal approach to controlling product parts to ensure their integrity. The configuration management plan and the charter for the configuration control board are draft; the board has limited authority; and, after 4 years of development, the department has not assigned a configuration manager; (4) developed a well-defined architecture. The latest versions of the architecture do not include products describing the "As Is" business and technology environments and a transition plan for investing in business systems. In addition, the versions that have been produced for the "To Be" environment have not had a clearly defined purpose and scope, are still missing important content, and contain products that are neither consistent nor integrated; and (5) fully addressed other GAO recommendations. DOD recognizes that these weaknesses need to be addressed and has recently assigned a new BEA leadership team. DOD also has either begun steps to or stated its intentions to (1) revise its governance structure; (2) develop a program baseline, by September 30, 2005, that will be used as a managerial and oversight tool to allocate resources, manage risks, and measure and report progress; and (3) revise the scope of the architecture and establish a new approach for developing it. However, much remains to be accomplished to establish an effective architecture program. Until it does, its business systems modernization effort will remain a high-risk program.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-05-702, DOD Business Systems Modernization: Long-Standing Weaknesses in Enterprise Architecture Development Need to Be Addressed This is the accessible text file for GAO report number GAO-05-702 entitled 'DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed' which was released on July 25, 2005. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: July 2005: DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed: GAO-05-702: GAO Highlights: Highlights of GAO-05-702, a report to congressional committees: Why GAO Did This Study: The Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 directed the Department of Defense (DOD) to develop, by September 2005, a well-defined business enterprise architecture (BEA) and a transition plan. GAO has made numerous recommendations to assist the department in successfully doing so. As part of ongoing monitoring of the architecture, GAO assessed whether the department had (1) established an effective governance structure; (2) developed program plans, including supporting workforce plans; (3) performed effective configuration management; (4) developed well-defined BEA products; and (5) addressed GAO‘s other recommendations. What GAO Found: To effectively and efficiently modernize its nonintegrated and duplicative business operations and systems, it is essential for DOD to develop and use a well-defined BEA. However, it does not have such an architecture, and the products that it has produced do not provide sufficient content and utility to effectively guide and constrain ongoing and planned systems investments. As a result, despite spending almost 4 years and about $318 million, DOD does not have an effective architecture program. The current state of the program is due largely to long-standing architecture management weaknesses that GAO has made recommendations over the last 4 years to correct. In particular, DOD has not done the following: * Established an effective governance structure, including an effective communications strategy, to achieve stakeholder buy-in. In particular, the structure that has been in place since 2001 lacks the requisite authority and accountability to be effective, and the key entities that made up this structure have not performed according to their respective charters. * Developed program plans that explicitly identify measurable goals and outcomes to be achieved, nor has it defined the tasks to be performed to achieve the goals and outcomes, the resources needed to perform these tasks, or the time frames within which the tasks will be performed. DOD also has not assessed, as part of its program planning, the workforce capabilities that it needs in order to effectively manage its architecture efforts, nor does it have a strategy for doing so. * Performed effective configuration management, which is a formal approach to controlling product parts to ensure their integrity. The configuration management plan and the charter for the configuration control board are draft; the board has limited authority; and, after 4 years of development, the department has not assigned a configuration manager. * Developed a well-defined architecture. The latest versions of the architecture do not include products describing the ’As Is“ business and technology environments and a transition plan for investing in business systems. In addition, the versions that have been produced for the ’To Be“ environment have not had a clearly defined purpose and scope, are still missing important content, and contain products that are neither consistent nor integrated. * Fully addressed other GAO recommendations. DOD recognizes that these weaknesses need to be addressed and has recently assigned a new BEA leadership team. DOD also has either begun steps to or stated its intentions to (1) revise its governance structure; (2) develop a program baseline, by September 30, 2005, that will be used as a managerial and oversight tool to allocate resources, manage risks, and measure and report progress; and (3) revise the scope of the architecture and establish a new approach for developing it. However, much remains to be accomplished to establish an effective architecture program. Until it does, its business systems modernization effort will remain a high-risk program. What GAO Recommends: Beyond GAO‘s prior recommendations and in light of DOD‘s intended changes to its BEA development efforts, GAO is making additional recommendations to ensure that (1) DOD‘s architecture progress and plans are fully disclosed to congressional committees, (2) GAO‘s prior recommendations are integral to the department‘s next steps, and (3) the department‘s plans provide for effective BEA workforce planning. DOD concurred with GAO‘s recommendations and stated the department‘s intent to implement them. www.gao.gov/cgi-bin/getrpt?GAO-05-702. To view the full product, including the scope and methodology, click on the link above. For more information, contact Randolph C. Hite at (202) 512-3439 or hiter@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: DOD Has Yet to Implement Effective Governance and Communications, but Improvements Are Under Way: DOD Has Yet to Develop Program Plans and Supporting Workforce Plans, but Intends to Make Improvements: DOD Is Not Performing Effective Configuration Management: DOD Has Yet to Develop a Well-Defined BEA to Guide Its Modernization Efforts: DOD Has Yet to Fully Address Most of Our Other Recommendations: Conclusions: Recommendations for Executive Action: Agency Comments: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Status of Prior Recommendations on DOD's Development and Maintenance of Its Business Enterprise Architecture: Appendix III: Summary of Several Architecture Frameworks: Appendix IV: Description of DOD Architecture Framework Products, Version 1.0: Appendix V: Comments from the Department of Defense: Appendix VI: GAO Contact and Staff Acknowledgments: Tables: Table 1: Roles and Responsibilities of Governance Entities: Table 2: Roles and Responsibilities of the Program Office Divisions: Table 3: Increments for Developing the BEA: Table 4: List of DOD's Architecture Framework Products Included in Each Release: Figures: Figure 1: Simplified Diagram of the Program Office: Figure 2: Organization Chart of the Program Office: Figure 3: Interdependent DODAF Views of an Architecture: Abbreviations: ASD(NII)/CIO: Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer: AV: all view: BEA: business enterprise architecture: BMMP: Business Management Modernization Program: C4ISR: Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (architecture framework): CIO: Chief Information Officer: DBSMC: Defense Business Systems Management Committee: DOD: Department of Defense: DODAF: Department of Defense Architecture Framework: DO/IT: Domain Owners Integration Team: FEA: Federal Enterprise Architecture: FEAF: Federal Enterprise Architecture Framework: IBM: International Business Machines: IT: information technology: OMB: Office of Management and Budget: OV: operational view: PPBE: Planning, Programming, Budgeting, and Execution: SFIS: Standard Financial Information Structure: SV: systems view: TV: technical standards view: USD(AT&L): Under Secretary of Defense for Acquisition, Technology, and Logistics: Letter July 22, 2005: The Honorable John W. Warner: Chairman: The Honorable Carl Levin: Ranking Minority Member: Committee on Armed Services: United States Senate: The Honorable Duncan Hunter: Chairman: The Honorable Ike Skelton: Ranking Minority Member: Committee on Armed Services: House of Representatives: We first designated business systems modernization efforts within the Department of Defense (DOD) as a high-risk program in 1995, and we continue to designate it as such today.[Footnote 1] As our research on successful public and private sector organizations has shown, attempting such large-scale systems modernization programs without a well-defined enterprise architecture often results in systems that are duplicative; are not well integrated; are unnecessarily costly to manage, maintain, and operate; and do not effectively optimize mission performance. To help DOD transform its operations, we recommended[Footnote 2] in 2001 that the department develop an enterprise architecture to guide and constrain its multibillion dollar annual investment in business systems. In July 2001, the department initiated a business management modernization program to, among other things, develop a business enterprise architecture (BEA). Recognizing the importance of DOD's efforts to transform its business operations and systems through the use of an enterprise architecture, Congress included provisions in the National Defense Authorization Act for Fiscal Year 2003[Footnote 3] aimed at having the department develop and effectively implement a well-defined BEA. In addition, the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005[Footnote 4] again directs DOD to develop a well-defined BEA and a transition plan by September 2005. As part of our ongoing monitoring of the BEA, we assessed whether DOD had (1) established an effective governance structure; (2) developed program plans, including supporting workforce plans; (3) performed effective configuration management; (4) developed well-defined BEA products; and (5) addressed our other recommendations. We performed our work from July 2004 through May 2005, in accordance with generally accepted government auditing standards. We conducted this review under the Comptroller General's authority and have addressed this report to the committees of jurisdiction. Details on our objectives, scope, and methodology are contained in appendix I. Results in Brief: DOD has yet to establish an effective governance structure for its architecture development, maintenance, and implementation efforts, including an effective communications strategy to achieve stakeholder buy-in to the architecture. In particular, the structure that has been in place since 2001 has lacked the requisite authority and accountability to be effective, and the key entities making up this structure have not performed according to their respective charters. For example, one governance entity met only four times in 4 years, another last met about a year ago, and a third did not include key members--the military services--in its deliberations. Moreover, efforts under this governance structure to outreach to and communicate with key stakeholders, whose input and support of the BEA are critical to its success, fell short of plans. DOD recognizes the need for change to address these long-standing BEA governance weaknesses. Specifically, the department established the Defense Business Systems Management Committee (as required by the Fiscal Year 2005 Defense Authorization Act) to direct, oversee, and approve, among other things, the BEA. In addition, program officials stated that the department intends to revise its communications strategy. However, much remains to be accomplished before these steps result in establishment of an operational governance structure. Until such a structure exists, the department's architecture, and thus its modernization efforts, will be at risk of failure. DOD does not have the program plans it needs to effectively manage its BEA efforts. It has not developed plans that explicitly identify measurable goals and outcomes to be achieved, nor has it defined the tasks to be performed to achieve the goals and outcomes, the resources needed to perform the tasks, or the time frames within which the tasks will be performed. DOD also has not assessed, as part of its program planning, the workforce capabilities that it has in place and that it needs to acquire to manage its architecture efforts, and it does not have a strategy for meeting its human capital needs. Unless this situation changes, it is unlikely that DOD will be successful in its attempt to develop, maintain, and implement its BEA. Recognizing this long-standing planning weakness, the department stated that it will have an approved program plan by September 30, 2005. DOD is not performing effective configuration management, which is a formal process for maintaining integrity and traceability and for controlling modifications or changes to the architecture products throughout their life cycles. Although the department has a draft plan that defines key steps and practices, it has not followed this plan. In addition, the department does not have a configuration manager after almost 4 years of architecture development. Further, while there is a configuration control board, the board's charter has yet to be approved, and its authority is limited to approving changes to a subset of BEA products. Until this situation is remedied, DOD will not have adequate assurance that it is controlling product changes and maintaining the integrity of product content. DOD's BEA is not well defined and, thus, provides limited utility. The latest releases and updates of the BEA do not include products describing DOD's current or "As Is" business and technology environments, nor do they include a plan for investing in business systems in a sequence that will allow it to move from this "As Is" environment to its target or "To Be" environment. In addition, there are no clearly defined associations between the purpose of the BEA releases and updates produced to date for this "To Be" environment and the department's goals and objectives. These releases are also still missing important content that we have made recommendations to correct. Moreover, the artifacts produced in these releases and updates have been neither consistent with one another nor adequately integrated. Finally, only the first release (Release 1.0) of the BEA has been approved. Recognizing the need to develop architecture products that have utility and provide a foundation upon which to build, program officials have stated the department's intent to reduce the scope of the BEA and to change the development approach from one that focuses on producing as many products as it can within a specific time period to one that focuses on developing high-quality products. Without such products, DOD will not be able to effectively modernize its business systems. To date, DOD has not addressed most of our other prior recommendations regarding the development and maintenance of the BEA. While the department has taken recent actions that fully address one of these recommendations and partially address others, much remains to be accomplished. For example, the department has yet to develop and implement a quality assurance plan. Until our recommendations are addressed, the department will remain challenged in its ability to effectively develop and implement a BEA, and, thus, its business systems modernization will remain at high risk of failure. Given that roughly $318 million and 4 years have been invested without commensurate progress and results, and given the department's recent actions intended to address some of them, we are making several recommendations to the Secretary of Defense to ensure that (1) DOD's architecture progress, plans for moving forward, and capability to implement these plans are fully disclosed to congressional committees; (2) our open recommendations are integral to DOD's next steps; and (3) these next steps provide for effective BEA workforce planning. In its written comments on a draft of this report, DOD concurred with our recommendations and stated the department's intent to implement them. Background: DOD is a massive and complex organization. In fiscal year 2004, the department reported that its operations involved $1.2 trillion in assets, $1.7 trillion in liabilities, over 3.3 million military and civilian personnel, and over $605 billion in net cost of operations. For fiscal year 2005, the department received appropriations of about $417 billion. Moreover, execution of its operations spans a wide range of defense organizations, including the military services and their respective major commands and functional activities, numerous large defense agencies and field activities, and various combatant and joint operational commands, which are responsible for military operations for specific geographic regions or theaters of operations. In executing these military operations, the department performs an assortment of interrelated and interdependent business functions, including logistics management, procurement, health care management, and financial management. DOD reports that, in order to support these business functions, it currently relies on about 4,200 systems-- including accounting, acquisition, finance, logistics, and personnel. As we have previously reported,[Footnote 5] this systems environment is overly complex and error prone and is characterized by (1) little standardization across the department, (2) multiple systems performing the same tasks, (3) the same data stored in multiple systems, and (4) manual data entry into multiple systems. These problems continue despite the department's spending billions of dollars annually to operate, maintain, and modernize its business systems. DOD received approximately $13.3 billion for fiscal year 2005 to operate, maintain, and modernize this environment. In addition, our reports[Footnote 6] continue to show that the department's stovepiped and duplicative systems contribute to fraud, waste, and abuse. Of the 25 areas on GAO's governmentwide "high-risk" list, 8 are DOD program areas, and the department shares responsibility for 6 other high-risk areas that are governmentwide in scope.[Footnote 7] Because of the department's size and complexity, modernizing its business systems is a huge management challenge that we first designated as one of the department's high-risk areas in 1995, and we continue to do so today.[Footnote 8] To help meet this challenge, DOD established its business systems modernization program in 2001. As we testified in 2003,[Footnote 9] one of the seven key elements that are necessary to successfully execute this modernization program is to establish and implement an enterprise architecture. Subsequently, in its Fiscal Year 2004 Performance and Accountability Report,[Footnote 10] DOD acknowledged that deficiencies in its systems and business processes hindered the department's ability to collect and report financial and performance information that was accurate, reliable, and timely. The DOD report noted that to address its systemic problems and assist in the modernization of its business operations, the department had undertaken the development and implementation of a BEA. Enterprise Architecture Is Critical to Achieving Successful Modernization: Effective use of an enterprise architecture, or a modernization blueprint, is a trademark of successful public and private organizations. For more than a decade, we have promoted the use of architectures to guide and constrain systems modernization, recognizing them as a crucial means to a challenging goal: agency operational structures that are optimally defined in both business and technological environments. Congress, the Office of Management and Budget (OMB), and the federal Chief Information Officer (CIO) Council have also recognized the importance of an architecture-centric approach to modernization. The Clinger-Cohen Act of 1996[Footnote 11] mandates that an agency's CIO develop, maintain, and facilitate the implementation of an information technology (IT) architecture. Further, the E-Government Act of 2002[Footnote 12] requires OMB to oversee the development of enterprise architectures within and across agencies. In addition, OMB has issued guidance that, among other things, requires system investments to be consistent with these architectures. What Is an Enterprise Architecture? An enterprise architecture provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., a federal department) or a functional or mission area that cuts across more than one organization (e.g., financial maagement). This picture consists of snapshots of both the enterprise's current or "As Is" environment and its target or "To Be" environment, as well as a capital investment road map for transitioning from the current to the target environment. These snapshots consist of "views," which are one or more architecture products that provide logical or technical representations of the enterprise. The suite of products and their content that form a given entity's enterprise architecture are largely governed by the framework used to develop the architecture. Since the 1980s, various architecture frameworks have emerged and been applied. See appendix III for a discussion of these various frameworks. The importance of developing, implementing, and maintaining an enterprise architecture is a basic tenet of both organizational transformation and systems modernization. Managed properly, an enterprise architecture can clarify and help to optimize the interdependencies and relationships among an organization's business operations and the underlying IT infrastructure and applications that support these operations. Employed in concert with other important management controls, such as portfolio-based capital planning and investment control practices, architectures can greatly increase the chances that an organization's operational and IT environments will be configured to optimize its mission performance. Our experience with federal agencies has shown that investing in IT without defining these investments in the context of an architecture often results in systems that are duplicative, not well integrated, and unnecessarily costly to maintain and interface.[Footnote 13] DOD's Business Management Modernization Program: A Brief Description and Chronology: In July 2001, the Secretary of Defense established the Business Management Modernization Program (BMMP) to improve the efficiency and effectiveness of DOD's business operations and provide the department's leaders with accurate and timely information through the development and implementation of a BEA. At that time, the Secretary tasked the Under Secretary of Defense (Comptroller), in coordination with the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and the Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer (ASD(NII)/CIO), with responsibility for overseeing the program. To accomplish this, in October 2001, the Comptroller established governance bodies and assigned them responsibilities associated with developing, maintaining, and implementing the BEA. These entities and their respective roles and responsibilities are shown in table 1. DOD is currently revising its BEA governance structure, including recently eliminating its long- standing governance entities. These revisions are discussed later in this report. Table 1: Roles and Responsibilities of Governance Entities: Entity: Executive Committee; Roles and responsibilities: * Provides strategic direction to the Steering Committee; * Champions program execution; * Holds components[A] responsible for program results; * Advises the Under Secretary of Defense (Comptroller) on business modernization; Membership: * Cochaired by the Comptroller and the Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer (ASD(NII)/CIO); * Includes representatives from both the Office of the Secretary of Defense and the military departments, such as the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and the Under Secretary of the Army. Entity: Steering Committee; Roles and responsibilities: * Advises the Executive Committee on program performance; * Serves as the forum for discussion of component issues; * Provides guidance to the program office[B]; Membership: * Cochaired by the Principal Deputy Comptroller and the Deputy DOD CIO; * Includes representatives from both the Office of the Secretary of Defense and the military departments, such as the Principal Deputy USD(AT&L) and the Assistant Secretary of the Army. Entity: Domain Owners Integration Team; Roles and responsibilities: * Provides recommendations to the Steering Committee; * Provides guidance regarding architecture updates and their effects; * Identifies, addresses, and resolves cross-domain[C] issues, and program governance and domain operational issues; Membership: * Chaired by the program office director; * Includes representatives from the program office, senior executives from each business domain (domain representatives) and the enterprise information environment mission area, and military services representatives. Entity: Domains and Mission Area; Roles and responsibilities: * Implements the architecture; * Develops and executes the transition plan; * Oversees portfolio management activities; * Establishes a structure to ensure the representation of the DOD components and the appropriate federal agencies; Membership: * Headed by the USD(AT&L), the Comptroller, the Under Secretary of Defense (Personnel and Readiness), and the ASD(NII)/CIO; * Includes representatives from the DOD components, including the military services. Source: DOD. [A] DOD components include the military departments, defense agencies, and DOD field activities. [B] In March 2005, DOD changed the name of the program office from the Business Modernization and Systems Integration Office to the Transformation Support Office. [C] There are five departmental domains or business process areas: (1) acquisition, (2) financial management, (3) human resources management, (4) installations and environment, and (5) logistics. There is also one mission area--enterprise information environment. [End of table] Also in 2001, the BMMP program office was established to execute the program's day-to-day activities, including implementing internal management controls and other mechanisms to provide reasonable assurance that the office would develop and implement an effective BEA. The office is led by a program director and comprised of seven program divisions, each of which is headed by an assistant deputy director. Figure 1 is a simplified diagram of the organizational structure of the program office, and table 2 shows the roles and responsibilities of the program divisions. Figure 1: Simplified Diagram of the Program Office: [See PDF for image] [End of figure] Table 2: Roles and Responsibilities of the Program Office Divisions: Program division: Communications; Roles and responsibilities: Communicate status, progress, goals, and objectives of program to ensure that decision makers (e.g., internal work groups and external customers, such as Congress and GAO) receive quality information to make informed decisions about the department's business modernization efforts. Program division: Financial Management and Comptroller; Roles and responsibilities: Develop and maintain the program budget; report on program performance against the budget; and develop, oversee, and manage all program office contracts. Program division: Chief Technology Officer; Roles and responsibilities: Provide information technology support for program activities and operations, such as maintenance of the architecture data repository, as well as ensure that the program office is in compliance with government security policies and standards. Program division: Enterprise Architecture; Roles and responsibilities: Develop, extend, and improve the business enterprise architecture (BEA); and provide quality assurance and configuration control to ensure BEA quality and utility. Program division: Strategic Planning; Roles and responsibilities: Develop and maintain the strategic plan and program baseline, develop and maintain the risk management program, conduct quality assessments of the BEA and other program deliverables, identify process improvement areas and ensure corrective actions are taken, and assess program performance against program goals. Program division: Transition Planning; Roles and responsibilities: Develop, maintain, and implement the transition plan; provide portfolio management assistance to the domains; and oversee the modernization of the department's business systems and the establishment of a consolidated systems repository. Program division: Administrative Support Programs; Roles and responsibilities: Provide administrative support to the program office for human, material, financial, and technology resources to achieve the mission, vision, and strategy. Source: DOD. [End of table] Initially, DOD planned to develop the architecture in 1 year. Subsequently, the department stated that it would develop its architecture in three increments, each increment addressing a subset of objectives and consisting of specific architecture releases. Table 3 shows these increments, the corresponding architecture releases, and the planned completion dates for the increments. To develop the architecture, DOD entered into a 5-year, $95 million contract with International Business Machines (IBM) in April 2002, under which the department has issued a series of task orders aimed at developing the architecture. In 2004, DOD increased the contract amount to $250 million; however, the contract did not provide a reason for this increase, and program officials have yet to provide an explanation. As of September 2004, DOD reported that it had obligated approximately $318 million for the program, which is primarily for contractor support.[Footnote 14] Table 3: Increments for Developing the BEA: Increment: 1; Objectives: * Achieve unqualified audit opinion for consolidated Department of Defense (DOD) financial statements, including related processes to achieve asset accountability and address other material weaknesses; * Achieve total personnel visibility to include military service members, civilian employees, military retirees, and other U.S. personnel in a theater of operations (including contractors and other federal employees); Architecture release[A] and date: 2.1--April 2004; 2.2--July 2004; 2.3-- November 2004; January 2005 Update; March 2005 Update; Original increment completion date: January 2005; Revised increment completion date: March 2005. Increment: 2; Objectives: * Align acquisition practices with government and industry best practice benchmarks; * Achieve total asset visibility and accurate valuation of assets (includes operating, materials, and supplies; inventory and property; and plant and equipment); * Enhance force management through position accountability and visibility (military and civilian); * Improve military health care delivery through a more efficient health care claims system, more accurate patient diagnostic coding, and joint medical material asset visibility; * Improve environmental safety and occupational health; Architecture release[A] and date: 3.0--September 2005; Original increment completion date: September 2005; Revised increment completion date: No change. Increment: 3; Objectives: * Implement planning, programming, budgeting, and execution (PPBE) process improvements in accordance with Joint Defense Capabilities Study recommendations for a capabilities-based PPBE process; * Achieve integrated total force management; * Improve installation management; Architecture release[A] and date: 3.0-- September 2005; Original increment completion date: September 2006; Revised increment completion date: September 2005. Source: DOD. [A] The architecture releases for increment 1 are limited to "To Be" architecture products. According to DOD, the architecture releases for increments 2 and 3 will include "As Is" and "To Be" architecture products. DOD issued the initial transition plan in May 2003, and, according to program officials, the department currently plans to issue the second release in September 2005. [End of table] Prior Reviews of DOD's Architecture Efforts Have Identified Many Weaknesses and Challenges: Over the last 4 years, we have identified the need for, and reviewed DOD's efforts to develop an enterprise architecture for modernizing its business operations and systems, and we have made a series of recommendations to assist the department in successfully developing the architecture and using it to guide and constrain its ongoing and planned business systems investments. In particular, we reported in May 2001[Footnote 15] that the department did not have an architecture for its financial and financial-related business operations, nor did it have the management structures, processes, and controls in place to effectively develop and implement one. We concluded that continuing to spend billions of dollars on new and modified systems would result in more processes and systems that were duplicative, not interoperable, unnecessarily costly to maintain and interface, and not optimizing mission performance and accountability. We made eight recommendations to the Secretary of Defense that were aimed at providing the means for effectively developing and implementing an architecture and limiting DOD components' systems investments until it had a well-defined architecture and the means to enforce it. In July 2001, DOD initiated the BMMP. In February 2003,[Footnote 16] we reported that the department was following some architecture best practices, such as establishing a program office to be responsible for managing the enterprise architecture development effort. We also reported challenges and weaknesses in DOD's architecture efforts. For example, we reported that DOD had not yet (1) established a governance structure and the process controls needed to ensure ownership of and accountability for the architecture across the department; (2) clearly communicated to intended stakeholders its purpose, scope, and approach for developing the architecture; and (3) defined and implemented an independent quality assurance process. We reiterated our earlier recommendations and made six new recommendations aimed at enhancing DOD's ability to develop its architecture and to guide and constrain its business systems modernization investments. In March 2003,[Footnote 17] we reported that DOD's draft release of its architecture did not include a number of items that were recommended by relevant architectural guidance, and that DOD's plans would not fully satisfy the requirements of the National Defense Authorization Act for Fiscal Year 2003.[Footnote 18] For example, the draft architecture did not include a "To Be" security view, which would define the security requirements--including relevant standards to be applied in implementing security policies, procedures, and controls. DOD officials generally agreed, and they stated that subsequent releases of the architecture would provide these missing details.[Footnote 19] In July and September 2003,[Footnote 20] we reported that the initial release of the department's architecture, including the transition plan, did not adequately address statutory requirements and other relevant architectural requirements. For example, the description of the "As Is" environment did not include (1) the current business operations in terms of entities and people who perform the functions, processes, and activities and (2) the locations where the functions, processes, and activities are performed. The description of the "To Be" environment did not include actual systems to be developed or acquired to support future business operations and the physical infrastructure that would be needed to support the business systems. The transition plan did not include time frames for phasing out existing systems within DOD's then reported inventory of about 2,300 business systems.[Footnote 21] We concluded that the department's initial release of the architecture did not contain sufficient scope and detail either to satisfy the act's requirements or to effectively guide and constrain departmentwide business systems modernization. In our September 2003 report,[Footnote 22] we reiterated the open recommendations that we had made in our May 2001[Footnote 23] and February 2003[Footnote 24] reports, and we made 10 new recommendations to, among other things, improve DOD's efforts for developing the next release of the architecture. In March[Footnote 25] and July 2004,[Footnote 26] we testified that DOD's substantial long-standing financial and business management problems adversely affected the economy, effectiveness, and efficiency of its operations and had resulted in a lack of adequate transparency and appropriate accountability across all major business areas. Further, we said that substantial work remained before the BEA would begin to have a tangible impact on improving the department's overall business operations. We concluded that until DOD completed a number of actions, including developing a well-defined BEA, its business systems modernization efforts would be at a high risk of failure. In May 2004,[Footnote 27] we reported that after 3 years of effort and over $203 million in obligations, DOD had not made significant change in the content of the BEA or in its approach to investing billions of dollars annually in existing and new systems. We reported that few actions had been taken to address the recommendations we had made in our September 2003 report,[Footnote 28] which were aimed at improving the department's plans for developing the next release of the architecture and implementing the institutional means for selecting and controlling both planned and ongoing business systems investments. We also reported that DOD had still not adopted key architecture management best practices that we had recommended,[Footnote 29] such as assigning accountability and responsibility for directing, overseeing, and approving the architecture and explicitly defining performance metrics to evaluate the architecture's quality, content, and utility. Further, DOD had not added the scope and detail to its architecture that we had previously identified as missing. For example, in the latest release of the BEA--Release 2.0--DOD did not provide sufficient descriptive content related to future business operations and supporting technology to permit effective acquisition and implementation of system solutions and associated operational change. Moreover, the department had not yet explicitly defined program plans, including milestones, detailing how it intended to extend and evolve the architecture to incorporate this missing content. We concluded that the future of DOD's architecture development and implementation activities was at risk, which in turn placed the department's business transformation effort in jeopardy of failing. Therefore, we added that it was imperative that the department move swiftly to implement our open recommendations. Because many of our prior recommendations remained open, we did not make any new recommendations in our May 2004 report,[Footnote 30] but we reiterated the open recommendations that we had made in our May 2001, February 2003, and September 2003 reports.[Footnote 31] In November 2004[Footnote 32] and April 2005,[Footnote 33] we testified that for DOD to successfully transform its business operations, it would need a comprehensive and integrated business transformation plan; people with the skills, responsibility, and authority to implement the plan; an effective process and related tools, such as a BEA; and results-oriented performance measures that would link institutional, unit, and individual personnel goals and expectations to promote accountability for results. We testified that over the last 3 years, we had made a series of recommendations to DOD and suggested legislative changes that, if implemented, could help the department move forward in establishing the means to successfully address the challenges it faces in transforming its business operations.[Footnote 34] We also testified that, after about 3 years of effort and over $203 million in reported obligations, the architecture's content and the department's approach to investing billions of dollars annually in existing and new systems had not changed significantly, and that the program had yielded very little, if any, tangible improvements in DOD's business operations. DOD Has Yet to Implement Effective Governance and Communications, but Improvements Are Under Way: Long-standing weaknesses in DOD's BEA governance structure and communications strategy still remain. While DOD has established a new senior committee to oversee its business transformation efforts, including BEA development, much remains to be accomplished before proposed governance and communications concepts are fully defined and implemented. Until the department has made its intended governance and communications concept operational, the success of DOD's architecture efforts will remain in doubt. Long-standing Program Governance Weaknesses Remain, Although Recent Proposals Are Intended to Address Weaknesses: An enterprise architecture is a corporate asset that, among other things, is intended to represent the strategic direction of the enterprise. Accordingly, best practices[Footnote 35] recommend that to demonstrate commitment, organizations should vest accountability and assign responsibility for directing, overseeing, and approving the architecture to a committee or group with representation from across the enterprise. Sustained support and commitment by this committee to the architecture, as well as the committee's ownership of it, are critical to a successful enterprise architecture development effort. We have previously recommended that DOD establish this kind of architecture responsibility and accountability structure.[Footnote 36] (See app. II for our prior recommendations and their current status.) During the last 4 years, DOD has relied on three primary management entities to govern BEA development, maintenance, and implementation-- the Executive Committee, the Steering Committee, and the Domain Owners Integration Team (DO/IT). (See table 1 for their roles and responsibilities.) This governance approach, however, does not assign accountability and responsibility for directing, overseeing, and approving the BEA to these entities either singularly or collectively. As we reported in February 2003,[Footnote 37] the Executive and Steering Committees were advisory in nature, and their responsibilities were limited to providing guidance to the program office and advising the Comptroller and the Executive Committee. Moreover, since they were established, neither the two committees nor the DO/IT have adequately fulfilled their assigned responsibilities, as we discuss below. * The Executive Committee was chartered to, among other things, provide strategic direction to the Steering Committee, champion program execution, and hold DOD components--including the military services-- responsible for program results. To accomplish these things, the charter states that the committee should establish a meeting schedule. However, no schedule was established, and the committee met only four times in over 3½ years. Moreover, no minutes of the four meetings were prepared, according to the program's Acting Assistant Deputy Director for Communications, and no other documentation exists to demonstrate the committee's performance of its chartered functions. In fact, during numerous DO/IT meetings that we attended, participants stated that the Executive Committee was not providing strategic direction, nor was it championing program execution. * The Steering Committee was chartered to advise the Executive Committee on program performance, serve as the forum for discussion of component issues, and provide guidance to the program office. According to the program's Acting Assistant Deputy Director for Communications, neither Executive Committee meeting minutes nor any other documentation exists to demonstrate that the Steering Committee advised the Executive Committee. Moreover, during the Steering Committee meetings that we attended over the last 4 years, we saw no evidence that this committee either planned to or actually did advise the Executive Committee on program performance. While we did observe in these meetings that issues were raised and discussed, which is a chartered responsibility of the committee, we also observed that the committee did not provide guidance and direction to the program office during these meetings. The Steering Committee last met about 1 year ago (June 2004). * The DO/IT was chartered to provide recommendations to the Steering Committee; provide guidance regarding architecture updates and their effects; and identify, address, and resolve domain and program issues. The charter also states that the DO/IT was to ensure that its representation included the military services. However, during the Steering Committee meetings that we attended, DO/IT representatives did not provide any recommendations to the Steering Committee, nor did they provide guidance on architecture updates and their effects. Moreover, the DO/IT did not include military service representatives, and it did not establish any policies and procedures for how to address and resolve issues. As a result, issues that were identified during meetings were not resolved. For example, in July 2004, there were discussions regarding the lack of involvement from the services, the lack of detail in the architecture content, and the lack of clear understanding of the roles and responsibilities among the domains and the services. During this meeting, however, no decisions were made about how these issues were to be resolved, and no actions were taken to provide recommendations to the Steering Committee for resolving the issues. As a result, we observed the same issues being discussed, without resolution, 5 months later. DOD has recently taken steps to improve the program's governance structure and, according to program officials, further steps are planned. For example, the department has implemented the provisions in the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005,[Footnote 38] which are aimed at increasing senior DOD leadership involvement in the program. In particular, it includes DOD's establishment of the Defense Business Systems Management Committee (DBSMC) to replace both the Executive and Steering Committees and to serve as the highest ranking governance body overseeing business transformation. According to the DBSMC charter, the committee is accountable and responsible for directing, overseeing, and approving all program activities. Specific responsibilities of the committee include: * establishing strategic direction and plans for the business mission area[Footnote 39] in coordination with the warfighting and enterprise information environment mission areas; * approving business mission area transformation plans and initiatives and coordinating transition planning in a documented program baseline with critical success factors, milestones, metrics, deliverables, and periodic program reviews; * establishing key metrics and targets by which to track business transformation progress; * establishing policies and approving the business mission area strategic plan, the transition plan for implementation for business systems modernization, the transformation program baseline, and the BEA; and: * executing a comprehensive communications strategy. Consistent with recent legislation, the DBSMC is chaired by the Deputy Secretary of Defense, and the USD(AT&L) serves as the vice chair. Its membership consists of senior leadership from across the department, including the military service secretaries, the defense agency heads, and the principal staff assistants.[Footnote 40] The department has also moved the program office from the Comptroller to the USD(AT&L), reporting to the Special Assistant for Business Transformation. According to DOD, this transfer of functions and responsibilities will allow USD(AT&L) to establish the level of activity necessary to support and coordinate the activities of the newly established DBSMC. Other entities may be established to support the DBSMC. According to program officials, including the Program Director, the DO/IT has been eliminated and may be replaced by a DOD Enterprise Transformation Integration Group. Further, the DO/IT had identified the need for six additional boards[Footnote 41] to assist the program office. These boards have not yet been chartered, but potential board members have met to discuss the boards' roles, responsibilities, and operating procedures, as well as program issues. However, the program director stated that not all of these boards may be established under the new structure. According to the Special Assistant for Business Transformation, a new governance structure will be in place and operational by September 30, 2005. To this end, DOD officials told us that the DBSMC held its first meeting in February 2005 to finalize its charter and member composition, and that to move governance reforms forward, the committee will initially hold monthly meetings. The weaknesses in the BEA governance structure over the last 4 years, according to program officials, are attributable to a lack of authority and accountability in program leadership by the various management entities (e.g., Executive and Steering Committees) and to the limited direction provided by these entities. While DOD's recent actions are intended to address these root causes, almost 4 years and approximately $318 million in obligations have been invested, and the department is still attempting to establish an effective governance structure. Moreover, much remains to be accomplished until DOD's new governance structure becomes an operational reality. Until it does, it is unlikely that the department will be able to develop an effective BEA. An Effective Communications Strategy Has Yet to Be Implemented, but Some Activities Are Under Way: Effective communications among architecture stakeholders are closely aligned with effective governance. According to relevant guidance,[Footnote 42] once initial stakeholder participation in an architecture program is achieved, a communications strategy should be defined and implemented to facilitate the exchange of information among architecture stakeholders about all aspects of the program, such as program purpose, scope, methodologies, progress, results, and key decisions. Such communication is essential to executing an architecture program effectively, including obtaining institutional buy-in for developing and using the architecture for corporate decision making. Accordingly, in 2003 we recommended[Footnote 43] that DOD provide for ensuring stakeholder commitment and buy-in through proactive architecture marketing and communication activities. (See app. II for our prior recommendation and its current status.) In response, the program office defined and approved a strategic communications plan in March 2004. According to the plan, its purpose is to direct the flow of information to inform, collaborate with, and educate DOD internal and external stakeholders about the program. To accomplish this, the plan identifies categories of stakeholders and includes a five-phase implementation approach. The five phases are as follows: 1. Plan Start-up: Conduct a formal tactical review, including an assessment of current communication tools, communication procedures, available resources, and agency or industry best practices. 2. Discovery and Assessment: Identify and verify all internal and external stakeholders and begin defining the benchmarking and reporting requirements. 3. Branding: Determine key messages to be communicated and select tools for disseminating these messages. 4. Communications Planning and Execution: Execute and assess the application of the strategy and continue to develop the communication tools. 5. Evaluation: Evaluate the progress and overall success of the plan's implementation, using metrics. The strategic communications plan states that the five phases were to have been fully implemented by December 2004. Although 5 months have passed since the plan was to be implemented, none of the five phases have been completed, and communications activities that have been performed by those responsible for implementing the plan have been limited in scope. Specifically, communications activities have focused on raising program awareness through the distribution of posters and press releases and the establishment of a Web site that provides information about the program. However, an assessment to evaluate the effectiveness of communication tools and procedures, available resources, and agency or industry best practices in communicating the program's purpose to the various stakeholders (e.g., the domains and the military services) has not been performed. In addition, the program's Acting Assistant Deputy Director for Communications stated that a systematic approach, including metrics, to measure the effectiveness of the communications strategy has not been defined. According to this official, communications activities have been ad hoc. Further, DO/IT representatives told us that the program's Web site does not contain consistent and current information about the program; as a result, stakeholders' understanding of the BEA is limited. Moreover, the plan focuses first on internal stakeholders, and it defers efforts to proactively promote understanding and buy-in with external stakeholders, such as Congress. The plan defines the internal stakeholders to exclude key departmental components, such as the military services and the defense agencies. Instead, it defines internal stakeholders to include only the program office and the domains. As a result, both the internal and external DOD stakeholders with whom we spoke said that they did not have a clear understanding of the program, including its purpose, scope, approach, activities, and status, as well as stakeholders' roles and responsibilities. For example, the Installation and Environment domain representative stated that it was unclear how the program would achieve one of the program's original goals (i.e., achieving an unqualified audit opinion by fiscal year 2007), and what the role of this representative's domain would be in achieving this goal. Similarly, the Acquisition domain representative stated that the roles and responsibilities of the domains for the program are confusing, because the domains should be the entities that are developing the BEA, and not the program office. According to this representative, the current approach will result in redundancy and increased program costs. In addition, the program office's Acting Assistant Deputy Director for Communications acknowledged that stakeholders are confused, stating that they do not have a good understanding of either the BEA's goals, objectives, and intended outcomes or stakeholders' roles and responsibilities. This official also stated that cross-domain integration issues remain that require strong DOD leadership to move the communications efforts beyond conducting awareness activities to achieving departmentwide buy-in. The Special Assistant for Business Transformation has recently begun to better communicate with key external stakeholders, such as Congress. For example, this official stated that department officials have met with and intend to hold future meetings with congressional staff to brief them on the department's plans and efforts to date. Without effective communication with BEA stakeholders, the likelihood that DOD will be able to effectively develop and implement its BEA is greatly reduced. DOD Has Yet to Develop Program Plans and Supporting Workforce Plans, but Intends to Make Improvements: DOD does not have the program plans that it needs to effectively manage the development, maintenance, and implementation of its BEA. In particular, the department has yet to specify measurable goals and outcomes to be achieved, nor has it defined the tasks to be performed to achieve these goals and outcomes, the resources needed to perform the tasks, or the time frames within which the tasks will be performed. DOD has not assessed, as part of its program planning, the workforce capabilities that it has in place and that it needs to manage its architecture development, maintenance, and implementation efforts, nor does it have a strategy for meeting its human capital needs. The absence of effective program planning, including program workforce planning, has contributed to DOD's limited progress in developing a well-defined architecture and clearly reporting on its progress to date. Unless its program planning improves, it is unlikely that the department will be successful in its attempt to develop, maintain, and implement its BEA. Recognizing this long-standing void in planning, DOD stated that it intends to complete, by September 30, 2005, a transition plan that will include a program baseline that will be used to oversee and manage program activities. DOD Has Yet to Develop Effective Program Plans: Architecture management guidance states that organizations should develop and execute program plans, and that these plans should provide an explicit road map for accomplishing architecture development, maintenance, and implementation goals.[Footnote 44] Among other things, effective plans should specify tasks to be performed, resources needed to perform these tasks (e.g., funding, staffing, tools, and training), program management and contractor roles and responsibilities, time frames for completing tasks, expected outcomes, performance measures, program management controls, and reporting requirements. We have previously reported on the program's lack of effective planning and have recommended that DOD develop BEA program plans.[Footnote 45] (See app. II for our prior recommendation and its current status.) Since the program was launched in 2001, DOD has operated without a program plan. Instead, the department has set target dates for producing a series of architecture releases as part of three generally defined architecture increments (see table 3). However, DOD has not clearly defined what the purpose of the respective increments are, either individually or collectively, and it has not developed near-, mid-, or long-term plans for producing these increments. At a minimum, such plans would identify specific tasks (i.e., provide a detailed work breakdown structure) for producing the architecture releases that possess predefined content and utility. These plans would also contain specific and reliable estimates of the time and resources it will take to perform these tasks. Also in lieu of program plans, the program office provided us with documents in November 2004 that the deputy program director stated were to address our open recommendations for (1) adding needed content and consistency to the BEA's "As Is" and "To Be" architectural products and (2) developing a well-defined BEA transition plan. However, the documents that we were provided were plans for developing plans to address our recommendations and, thus, were not documents explaining how and when our recommendations would be addressed. DOD has recognized the need for program planning. According to the Acting Assistant Deputy Director for Strategic Planning, the program office had committed to developing a program baseline by December 2004. According to the program director, this baseline was to include program goals, objectives, and activities as well as performance, cost, and schedule commitments. Further, the baseline was to establish program roles, responsibilities, and accountabilities and was to be used as a managerial and oversight tool to allocate resources, manage risk, and measure and report progress. However, the department has yet to develop this program baseline. Moreover, while this program baseline would be a useful tool for strengthening program management, it nevertheless was not to have included all of the elements of an effective program plan, such as a detailed work breakdown structure and associated resource estimates. According to senior officials, including the Special Assistant for Business Transformation and the Deputy Under Secretary of Defense (Financial Management), the department is drafting a transition plan that is to be approved by the DBSMC and issued by September 30, 2005. According to these officials, this plan will include a program baseline and a BEA development approach. The lack of well-defined program plans has contributed significantly to the limited BEA progress that we have reported over the last several years. Moreover, this absence of program plans has created a lack of transparency and understanding about what is occurring on the program and what will occur--both inside and outside the department. It has also inhibited BEA governance entities' ability to ensure that resources (e.g., program office, domains, and contractors) are being effectively used to achieve worthwhile outcomes and results. Although the contractor's work statements have provided some additional detail, these task descriptions lack the specificity necessary to use them effectively to monitor the contractor's progress and performance. For example, the latest work statement includes the task "develop business rules based on the available sources of information," which has been included in prior work statements. However, the latest work statement does not define the scope of this effort, nor does it define how this latest task will support prior efforts to develop business rules. As a result, the extent to which business rules have been developed and the work remaining to complete the development of these rules is unclear. Further, the relationship of this task to DOD's ability to satisfy the objectives for increment 1 also has not been defined. These architecture relationships need to be defined before the department can develop explicit plans for effective BEA development. Moreover, because there is no plan linking them together, it is not clear how the contractor's work statements and other BEA working groups' efforts relate to or contribute to larger BEA goals and objectives. For example, the program office has continued to task the contractor to develop architecture releases, although the intended use, and thus the explicit content, of the various releases has not been clearly linked to the goals and objectives of increment 1. Representatives of the DOD business domains raised similar concerns with the contractor's work statements, telling us that the work statements have been vague and have not been linked to the specific architecture products. According to these representatives, the department does not know if it is investing resources on tasks that are needed and add value to the program. According to the deputy program director, continuous changes in the direction and scope of the program have hindered DOD's ability to develop effective program plans. Without such plans, DOD has been, and will continue to be, limited in its ability to develop a well-defined architecture on time and within budget. DOD Has Not Performed Effective Workforce Planning: As we have previously reported,[Footnote 46] workforce planning is an essential component of program management. Workforce planning enables an entity to be aware of and prepared for its current and future human capital needs, such as workforce size, knowledge and skills, and training. Such planning involves assessing the knowledge and skills needed to execute the program, inventorying existing staff knowledge and skills, identifying any shortfalls, and providing for addressing these shortfalls. Through effective workforce planning, programs and organizations can have the right people with the right skills doing the right jobs in the right place at the right time. Relevant architecture management guidance[Footnote 47] recognizes the importance of planning for and having adequate human resources in developing, maintaining, and implementing enterprise architectures. DOD has yet to perform workforce planning for its BEA program. Nevertheless, it has established a program office consisting of seven program divisions (see fig. 1) and staffed the office with 60 government employees and approximately 300 contractor staff. In addition, the department has assigned other staff to support the various program government entities, such as the domains and the DO/IT, and it has established various formal and informal working groups. However, DOD has not taken steps to ensure that the people assigned to the program have the right skill sets or qualifications. In particular, DOD has not defined the requisite workforce skills and abilities that the department needs in order to develop, maintain, and implement the architecture. To illustrate, the program's Assistant Deputy Director for Administrative Support told us that the position descriptions used to staff the program office were generic and were not tailored to the needs of an enterprise architecture program. This official added that, as a result, a person might satisfy the qualifications contained in the position description, but still not meet the needs of the BEA program. In addition to not defining its workforce needs, the program also does not have an inventory of the capabilities of its currently assigned program workforce. For example, the Assistant Deputy Director for Administrative Support told us that the department did not know the number of individuals assigned to support the various governance entities. In the absence of an inventory of existing workforce knowledge and skills, we requested any available information on the qualifications and training of program staff in key leadership positions (e.g., assistant deputy directors). In response, the Assistant Deputy Director for Administrative Support said that such information was not readily available for all staff, and this official provided us with résumés for 15 program officials, 4 of whose résumés we were told were created in response to our request for key staff qualifications and training. Exacerbating the program's lack of workforce planning is the fact that several key program office positions are vacant. For example, four of the seven program division leadership positions (i.e., assistant deputy directors' positions) are temporarily filled by persons "acting" in this position (see fig. 2). In addition, key supporting positions within the program divisions, such as the positions for performance management and independent verification and validation/quality assurance, are vacant. As a result, 1 program official is currently acting in three positions--strategic planning/organization development (includes risk management), performance management (earned value management system), and independent verification and validation/quality assurance. Further, two of the positions this person occupies are incompatible and do not allow for appropriate separation of duties.[Footnote 48] Specifically, this individual is responsible for both program performance management and independent oversight of performance management. Figure 2: Organization Chart of the Program Office: [See PDF for image] [End of figure] In addition, significant staff turnover has occurred in key program positions. For example, the program office has had three directors in 4 years, three transition planning directors since March 2004, and four contracting officer technical representatives responsible for the prime contract since January 2003. The Assistant Deputy Director for Administrative Support stated that the program lacks valid and reliable data about its human capital needs and current capabilities. This official told us that plans are being developed to begin addressing this situation. For example, to begin monitoring staff turnover, the program office recently began maintaining a list of program staff with start dates. However, this official also told us that the plans for improving the program's management of its human capital were not complete, and dates for when the plans would be complete have not been set. The absence of effective workforce planning has contributed significantly to DOD's limited progress to date in developing its architecture. Unless the program's approach to human capital management improves, it is unlikely that the department's future efforts to develop, maintain, and implement the BEA will be successful. DOD Is Not Performing Effective Configuration Management: Relevant architecture guidance,[Footnote 49] including DOD guidance,[Footnote 50] recognizes the importance of configuration management when developing and maintaining an architecture. The purpose of configuration management is to maintain integrity and traceability, and control modifications or changes to the architecture products throughout their life cycles. Effective configuration management, among other things, enables integration and alignment among related architecture products. As we have previously reported,[Footnote 51] an effective configuration management process comprises four primary elements, each of which should be described in a configuration management plan and implemented according to the plan. In addition, responsibility, accountability, and authority for configuration management should be assigned to a configuration manager. The four elements are: * Configuration identification: Procedures for identifying, documenting, and assigning unique identifiers (e.g., serial number and name) to product types generated for the architecture program, generally referred to as configuration items. * Configuration control: Procedures for evaluating and deciding whether to approve changes to a product's baseline configuration, generally accomplished through configuration control boards, which evaluate proposed changes on the basis of costs, benefits, and risks and decide whether to permit a change. * Configuration status accounting: Procedures for documenting and reporting on the status of configuration items as a product evolves. Documentation, such as historical change lists and original architecture products, are generated and kept in a library, thereby allowing organizations to continuously know the state of a product's configuration and to be in a position to make informed decisions about changing the configuration. * Configuration auditing: Procedures for determining alignment between the actual product and the documentation describing it, thereby ensuring that the documentation used to support the configuration control board's decision making is complete and correct. Configuration audits, both functional and physical, are performed when a significant product change is introduced, and they help to ensure that only authorized changes are being made. DOD has a draft configuration management plan and related procedures that address all four of these areas. However, the plan is not being followed. For example, according to the plan and procedures, certain product types[Footnote 52] should be placed under configuration management and be assigned a unique identifier. However, in one case, the verification and validation contractor[Footnote 53] reported that DOD had updated one of the BEA products (i.e., All View-1) that was initially published in Release 2.3, but that this updated product was not given a unique identifier and a new release date, and no entry was made in the version history to enable stakeholders to differentiate between the two versions. Configuration naming conventions also have not been consistently followed, resulting in the updates to a single document being given different unique identifiers than the original document. For example, the November 2003 configuration management plan had the unique identifier "C0008_05_03_BMMP_Configuration_Management_Plan.doc," which was comprised of the call number, the task number, the subtask number, and the name of the document. However, the department later assigned this document the following unique identifier "Configuration_Management_Plan.doc," which did not include the call and task numbers. Such inconsistencies could permit changes to be made to the wrong version of a product, thereby compromising the integrity and reliability of the information. Consistent with relevant guidance, the procedures require that a configuration manager be assigned and that this individual be responsible for ensuring that the four elements are executed. However, after almost 4 years of architecture products development, a configuration manager has not been assigned. In addition, while the department established a configuration control board and chartered it to evaluate and decide whether to approve proposed product changes, this board is not fully functioning. Specifically, the board's charter has yet to be approved, and its authority has been limited to a subset of BEA products. For example, its authority does not extend to the BEA transition plan. With respect to configuration status accounting activities that have been conducted to ensure the integrity of product baselines,[Footnote 54] we were provided with two reports even though program officials, including the Configuration Control Board Chair, told us that no configuration status accounting reports exist and that neither do any auditing procedures and processes (e.g., audit checklists, agendas, or plans). However, one of these reports was missing key data, such as the date of the report, the submitter, and the version of the product currently being reviewed and, thus, was of limited use. It was also unclear as to which version of the product was referenced in the report, and these officials told us that the current baseline of approved configuration items, including the configuration management plan, is unknown. As a result, configuration items can be duplicated. For example, the Acting Assistant Deputy Director for Communications had a second communications plan prepared, and this official told us that he did not know that a prior draft plan existed. Because of this, the new strategy did not leverage any of the work that had previously been done, and duplicative plans exist. Program officials, including the Configuration Control Board Chair, stated that they recognize the importance of effective configuration management. They attributed the absence of effective configuration management to a number of factors, including no policy or directive requiring it and the lack of a common understanding of effective configuration management practices. The absence of effective configuration management raises questions about whether changes to the BEA and other relevant products have been justified and accounted for in a manner that maintains the integrity of the documentation. Unless this situation is remedied, the department will not have adequate assurance that it has maintained accountability and ensured the consistency of information among the products it is developing. In addition to the governance and planning weaknesses we previously discussed, the department's lack of effective configuration management has also contributed to the state of the BEA discussed in the next section of this report. DOD Has Yet to Develop a Well-Defined BEA to Guide Its Modernization Efforts: Despite six BEA releases and two updates, DOD still does not have a version of an enterprise architecture that can be considered well defined, meaning that the architecture, for example, has a clearly defined purpose that can be linked to the department's goals and objectives and describes both the "As Is" and the "To Be" environments; consists of integrated and consistent architecture products; and has been approved by department leadership. According to program officials, the state of the BEA reflects the program's focus on meeting arbitrary milestones rather than architecture content needs. Recognizing the need to develop well-defined architecture products that have utility and provide a foundation upon which to build, program officials have stated the department's intent to change its BEA development approach, refocusing its efforts on fewer, higher quality products. Until a BEA development approach embodying architecture development and content best practices is clearly defined and implemented, it is not likely that DOD will produce an enterprise architecture that will provide needed content and utility. "As Is" Description, Transition Plan, and Purpose of BEA Releases Are Missing: As we previously discussed, the various frameworks used to develop architecture products consistently provide for describing a given enterprise in both logical (e.g., business, performance, application, and information) and technical (e.g., hardware, software, and data) terms, and for doing so for the enterprise's current or "As Is" environment and its target or "To Be" environment; these frameworks also provide for defining a capital investment sequencing plan to transition from the "As Is" to the "To Be" environment. However, the frameworks do not prescribe the degree to which the component parts should be described to be considered correct, complete, understandable, and usable--essential attributes of any architecture. This is because the depth and detail of the descriptive content depends on what the architecture is to be used for (i.e., its intended purpose and scope). Relevant architecture guidance[Footnote 55] states that a well-defined architecture should have a specific and commonly understood purpose and scope, and that it should be developed in incremental releases. Using this purpose and scope, the necessary content of architecture releases can then be defined. In September 2003,[Footnote 56] we reported that Release 1.0 of the BEA was missing important content, and we made 62 recommendations to add this content. The latest releases of the BEA (see table 4) do not address the 32 of our 62 recommendations that are related to the "As Is" description and the transition plan.[Footnote 57] Specifically, the releases do not include products describing the "As Is" environment for those areas of the enterprise that are likely to change, and they do not include a sequencing plan that serves as a road map for transitioning from the "As Is" state to the "To Be" state. For example, the BEA releases do not contain a description of the "As Is" environment that would include current business operations in terms of the entities or people who perform the functions, processes, and activities, and the locations where the functions, processes, and activities are performed. It also does not describe the data or information being used by the functions, processes, and activities. As a result, DOD does not have a picture of its current environment to permit development of a meaningful and useful transition plan. The BEA releases also do not contain a transition plan that would include information such as time frames for phasing out existing systems within DOD's current inventory and resource requirements for implementing the "To Be" architecture. As a result, DOD does not yet have a meaningful and reliable basis for managing the disposition of its existing inventory of systems or for sequencing the introduction of modernized business operations and supporting systems. As we previously reported,[Footnote 58] not having defined the "As Is" operations and technology at this juncture is risky because it defers until too late in the architecture development cycle creation of sufficient descriptive content and context to develop an effective transition plan. (See app. II for our prior recommendations and their current status.) DOD's architecture framework (DODAF),[Footnote 59] which the department is using to develop the BEA, does not require the development of an "As Is" architectural description or a transition plan, and thus neither has been the focus of the program. However, according to program officials, including the Chief Architect, the September 2005 BEA release will include both the "As Is" architectural description and a transition plan. In addition, DOD has not clearly linked the purpose of any of the "To Be" architecture releases produced to date to the goals and objectives of increment 1. Further, these releases also do not have a clearly defined scope with respect to what business processes and supporting systems each release would focus on. According to program officials, the last five versions (i.e., Releases 2.1, 2.2, and 2.3 and the January and March 2005 Updates) support the objectives of increment 1[Footnote 60] (see table 3). These objectives are broad-based strategic goals or outcomes that DOD proposed achieving through a series of architecture releases. However, DOD did not define how many releases were needed to achieve each objective and how the purpose of each release is associated with the objectives. Restated, while each incremental objective would describe the mission outcome that DOD intended to achieve via implementation of the series of releases that make up that increment, the purpose of the releases was not specified in terms of architectural questions that were related to the objectives. To illustrate, one objective of increment 1 is to achieve an unqualified audit opinion for consolidated DOD financial statements. Examples of the purpose questions that would support this objective include the following: 1. What changes need to be made to existing business processes and the supporting systems to address material internal control weaknesses affecting significant line items on the financial statements? 2. Where are gaps in IT support (systems functions) that need to be addressed in order to provide the business capabilities for ensuring that property, plant, and equipment are appropriately valued and recorded on the financial statements? The department did not include architecture products that would answer these types of questions to support the increment 1 objective. As a result, the context needed to plan and measure content sufficiency was not established. Program officials, including the Special Assistant for Business Transformation and the Chief Architect agreed, stating that prior releases have not included a specific purpose and scope. Moreover, the Chief Architect told us that the architecture releases do not fully support increment 1's objectives, nor do they describe the extent to which they do address the increment 1 objectives. According to program officials, including the deputy program director and the Chief Architect, the prior releases were developed with the goal of producing as many architecture products as possible within a predefined schedule. The releases were not developed to provide the content needed to meet the defined purpose and scope of the release. Until the department defines the intended purpose and scope of its BEA, including its incremental releases, and ensures that the architecture products include adequate descriptions of the "As Is" and "To Be" environments, as well as a plan for transitioning between the two, it will not have a well-defined architecture to guide and constrain its systems modernization efforts. BEA Products Are Incomplete, Inconsistent, and Not Integrated: Architecture frameworks[Footnote 61] provide for multiple products, each describing a particular aspect of the enterprise, such as data or systems. Moreover, each of these products is interdependent, meaning that they have relationships with one another that must be explicitly defined and maintained to ensure that the products form a coherent whole. In light of these relationships, it is important to develop the architecture products in a logical sequence that reflects this relationship. DODAF[Footnote 62] recognizes this need for integration of the products that make up its three "To Be" views--operational view (OV), systems view (SV), and technical standards view (TV). (See app. IV for a brief description of the products that comprise each of these views.) According to the framework, an architecture must be well structured so that the products can be readily assembled or decomposed into higher or lower levels of detail, as needed. It should also be consistent--that is, information elements should be the same throughout the architecture. As noted in the previous section, we reported in September 2003,[Footnote 63] that Release 1.0 of the BEA was missing important content, and we made 62 recommendations to add this content. The latest releases of the BEA do not adequately address our 30 prior recommendations related to the "To Be" description.[Footnote 64] For example, these releases do not include descriptions of the actual systems to be developed or acquired to support future business operations and the physical infrastructure (e.g., hardware and software) that will be needed to support the business systems. As a result, the "To Be" environment lacks the detail needed to provide DOD with a common vision and frame of reference for defining a transition plan to guide and constrain capital investments and, thus, to effectively leverage technology to orchestrate logical, systematic change and to optimize enterprisewide mission performance. (See app. II for details on the status of our prior recommendations.) In addition, the respective products of each of the latest BEA releases[Footnote 65] continue to be inconsistent and not integrated, because key architecture products were either not developed or not updated to reflect changes made in other products. Examples of where Releases 2.2 and 2.3 are not consistent and integrated follow: * In Release 2.2, the department updated the system data exchange matrix (SV-6), which assigns attributes (e.g., timeliness) to the data to be exchanged (e.g., Performance Metrics) between system functions-- "Manage Business Enterprise Reporting" and "Establish and Maintain Performance Information"--to support business operations. However, the OV-3 in Release 2.2, which shows the attributes of the information to be exchanged to support operations, is not consistent with the attributes defined in the SV-6. For example, in the OV-3, the attribute referred to as "timeliness" is defined in terms of either "hours," "minutes," or "seconds;" however, in the SV-6, the attribute referred to as "timeliness" is only defined in terms of either "high, medium, or basic." * In Releases 2.2 and 2.3, the department updated the respective operational event-trace description product (OV-6c), which depicts when activities are to occur within operational processes. However, the department did not update, in either release, the operational activity model (OV-5), which shows the operational activities (or tasks) that are to occur and the input and output flows among these activities. For example, the OV-6c shows the sequence of the activities to occur for the process labeled "produce obligation reports;" however, the activities shown in the OV-5 were not associated with this process. The latest releases also do not provide for traceability among the architecture products by clearly identifying the linkages and dependencies among the products, such as associating processes (e.g., produce obligation reports) with activities (e.g., compare expense to obligation) in the operational views and then associating these same processes to systems (e.g., financial reporting system) in the systems view. In addition, the linkage between the two functions (i.e., "Manage Business Enterprise Reporting" and "Establish and Maintain Performance Information") previously discussed cannot be traced to the OV-3 in Release 2.2. This is because Release 2.2 did not include an SV-5, which would provide a traceability of system functions back to operational activities. The lack of an updated SV-5 also raises questions as to whether all operational requirements are satisfied by the system functions. In addition, the architecture products were not developed in a logical sequence, as called for in relevant guidance and standards[Footnote 66] (e.g., the OV-6c, which shows the timing or sequencing of activities, was built before the OV-5, which shows the activities that are to occur). Further, according to the verification and validation contractor, the department has yet to address 242 of its 299 outstanding comments since Release 1.0. The verification and validation contractor also cited similar concerns, as previously described, for Releases 2.2 and 2.3. Specifically, the contractor reported that the BEA products were not integrated, and that key products were missing or had not been updated- -such as the operational nodes connectivity description (OV-2) and the operational information exchange matrix (OV-3). In its report on the January 2005 Update,[Footnote 67] the contractor stated that the architecture products were developed in an order different from that recommended in DODAF, and that the dependency relationships between and among BEA products were not clearly depicted. For example, the contractor reported that the logical data model (OV-7) was to have been developed using the OV-3, OV-5, and OV-6c artifacts as inputs. However, this was not the case. Instead, the OV-7 was developed using information that may have been reverse engineered from existing systems and architectures external to the BEA. The contractor reported that unless these dependencies are clearly documented and depicted, new systems may be implemented without satisfying all operational requirements, with missing functions and interfaces or based on obsolete data models, recreating many of the problems the modernization is intended to resolve. The contractor also reported that the resulting technical problems in the OV-7 could interfere with the department's achievement of the increment 1 objectives. The March 2005 Update also did not have fully integrated products. Specifically, while some of the products were integrated, this integration occurred at the highest level only and could not be found at lower levels of decomposition (e.g., subprocesses and subactivities) within the architecture. For example, the level of integration does not enable the user to determine all information inputs for the activities at all levels, nor does it clearly reflect the dissemination or use of the information after it has been processed. In addition, this update did not include key architecture products that are recommended by DODAF--such as the system data exchange artifact (SV-6), which assigns attributes (e.g., timeliness) to the data to be exchanged between system functions and the system inventory (SV-8). The SV-8 provides a basis for portfolio investment decisions by depicting the evolution of systems, systems integration, and systems improvements over time. We also found that the architecture was not user friendly in that it was difficult to navigate. For example, the linkages among the architecture products did not always work, thereby, requiring manual navigation through the architecture to find the linkages. This would take hours to do, especially since it was complicated by the fact that certain artifacts (e.g., diagrams) could not be read online and had to be printed. Relatedly, as shown in table 4, the latter BEA releases have not included all of the recommended DODAF products. DODAF recommends that the BEA include 23 out of 26 possible architecture products to meet the department's stated intention to use the BEA as the basis for departmentwide business and systems modernization. However, Release 2.2 of the architecture included only 16 of the 23 recommended architecture products, and 6 of the 16 products (OV-1, OV-2, OV-3, OV-4, OV-5, and SV-9) were actually Release 2.0 products that had not been updated to align with the changes that had been made to the 10 products that were updated in this release. Similarly, Release 2.3 included only 4 products; the January 2005 Update included 6, and the March 2005 Update included 15. According to the Chief Architect, all prior architecture products that were not included in a specific release or update are obsolete. For example, Release 2.2 included 16 architecture products, of which 10 had been updated. The remaining 6 products had not been updated, but they were still considered to be valid because they were included in this release. This means that for all releases and updates, only those products included in the release or update are relevant. For example, DOD updated 15 products and included them in the March 2005 Update; therefore, as of March 2005, only these 15 products were considered to be valid artifacts of the BEA. Table 4: List of DOD's Architecture Framework Products Included in Each Release: Product title[A]: All view (AV)[H]: AV-1 Overview and Summary Information; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: Yes; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: Yes; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: All view (AV)[H]: AV-2 Integrated Dictionary; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: Yes; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-1 High-Level Operational Concept Graphic; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-2 Operational Node Connectivity Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-3 Operational Information Exchange Matrix; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-4 Organizational Relationships Chart; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Operational view (OV)[I]: OV-5 Operational Activity Model; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-6a Operational Rules Model; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-6b Operational State Transition Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Operational view (OV)[I]: OV-6c Operational Event- Trace Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: No; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: Yes; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: Yes; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Operational view (OV)[I]: OV-7 Logical Data Model; Recommended[B]: No; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: Yes; Releases and dates issued: Jan: 2005 Update[D,G]: Yes; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Systems view (SV)[J]: SV-1 Systems Interface Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Systems view (SV)[J]: SV-2 Systems Communications Description; Recommended[B]: No; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: No; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-3 Systems-Systems Matrix; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-4 Systems Functionality Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Systems view (SV)[J]: SV-5 Operational Activity to Systems Traceability Matrix; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Systems view (SV)[J]: SV-6 Systems Data Exchange Matrix; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-7 Systems Performance Parameters Matrix; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-8 Systems Evolution Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: No; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-9 Systems Technology Forecast; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Systems view (SV)[J]: SV-10a Systems Rules Model; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: No; Releases and dates issued: 2.0,[C] Feb 2004: No; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-10b Systems State Transition Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: No; Releases and dates issued: 2.0,[C] Feb 2004: No; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-10c Systems Event-Trace Description; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: No. Product title[A]: Systems view (SV)[J]: SV-11 Physical Schema: N/A. Product title[A]: Technical standards view (TV)[K]: TV-1 Technical Standards Profile; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: Yes; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Product title[A]: Technical standards view (TV)[K]: TV-2 Technical Standards Forecast; Recommended[B]: Yes; Releases and dates issued: 1.0, May 2003: Yes; Releases and dates issued: 2.0,[C] Feb 2004: Yes; Releases and dates issued: 2.1,[D] Apr 2004: No; Releases and dates issued: 2.2,[D,E,F] July 2004: No; Releases and dates issued: 2.3,[D] Nov 2004: No; Releases and dates issued: Jan: 2005 Update[D,G]: No; Releases and dates issued: Mar: 2005 Update[D,G]: Yes. Source: GAO analysis based on DOD data. [A] See appendix IV for a brief description of each product. [B] Products that are recommended by DODAF based on DOD's intended use of the BEA. [C] According to the verification and validation contractor, the AV-1 included in this release had not been updated to align with changes the department had made to the other products that were included in this release. [D] These releases do not include the "As Is" architectural description and a transition plan. [E] In August 2004, DOD updated this release to incorporate the Standard Financial Information Structure (SFIS) in the OV-7 (Logical Data Model). According to DOD, the SFIS will standardize the coding of financial data. This updated release (Release 2.2.1) did not include any additional architecture products. [F] According to the AV-1 and the narrative summary, the following architecture products had not been updated to align with changes the department had made to the other products that were included in this release: OV-1, OV-2, OV-3, OV-4, OV-5, and SV-9. [G] According to program officials, the next BEA release (Release 3.0) is due in September 2005. Until then, all releases will be referred to as updates. [H] All-view products are to provide for overarching aspects of the architecture that relate to additional views (e.g., operational and systems views) and provide the scope and context for the architecture (e.g., to guide and constrain systems investment decisions). [I] Operational view products are to depict the organizationwide business environment and activities that need to occur to achieve the "To Be" state. [J] Systems view products are to describe the set of systems capabilities that are to provide DOD with accurate, reliable, and timely access to business management and associated financial information. [K] Technical standards view products contain the set of technology constraints that will drive the manner of system implementation. [End of table] Program and contractor officials, including the Acting Assistant Deputy Director for Transition Planning, stated that although the department's first release of its architecture included a fairly consistent and integrated set of architecture products, DOD's current releases do not because the department did not update all the recommended architecture products. These officials, including the Chief Architect, also stated that, as a result, the utility of the architecture is limited. However, according to key program officials, including the Special Assistant for Business Transformation and the Chief Architect, the integration of the architecture products was not the focus; rather, DOD's primary goal was to produce as many products as it could within a specified time period (see tables 3 and 4). Recognizing these weaknesses, the Special Assistant for Business Transformation stated that the department intends to reduce the scope of the architecture and revise the development approach, which will be reflected in the September 30, 2005, architecture release. However, according to program officials, including the Special Assistant for Business Transformation, the September 2005 BEA release will not be comprehensive (i.e., it will not meet all the act's requirements). Further, the department has yet to develop plans and a methodology to execute this new focus and vet it through the department. Program officials also stated that as a result of the new focus, they are trying to decide which products from prior releases could be salvaged and used. Nevertheless, the department has spent almost 4 years and approximately $318 million in obligations to develop an architecture that is incomplete, inconsistent, and not integrated and, thus, has limited utility. Until the department develops an approved, well-defined architecture that includes a clear purpose and scope and integrated products, it remains at risk of not achieving its intended business modernization goals and of not having an architecture that the stakeholders can use to guide and constrain ongoing and planned business systems investments to prevent duplicative and noninteroperable systems. BEA Releases Have Not Been Approved: Relevant architecture guidance[Footnote 68] state that architecture versions should be approved by the committee overseeing the development and maintenance of the architecture; the CIO; the chief architect; and senior management, including the department head. Such approval recognizes and endorses the architecture for what it is intended to be- -a corporate tool for managing both business and technological change and transformation. Consistent with guidance, DOD has stated its intention to approve all BEA releases. However, Release 1.0 of the BEA is the only release that DOD reports as having been approved. As we previously reported,[Footnote 69] DOD officials told us that Release 1.0 was approved by the former Executive Committee, the department's CIO as a member of the Executive Committee, and the DOD Comptroller on behalf of the Secretary of Defense in May 2003, but they also said that documentation to verify these approvals did not exist. Since Release 1.0, DOD has issued five additional releases and two updates. None of these have been approved by any individual or committee in the BEA governance structure. According to program officials, including the Special Assistant for Business Transformation and the Chief Architect, Release 3.0 of the BEA, which will be issued in September 2005, will be the next release of the architecture to be approved by the department. These officials stated that the architecture releases have not been approved because the department did not have a governance structure and process in place for doing so. Without the appropriate approvals, buy-in to and recognition of the BEA as an institutionally endorsed change management and transformation tool is not achievable. DOD Has Yet to Fully Address Most of Our Other Recommendations: In addition to the governance, planning, and content issues previously discussed, we have made other recommendations relative to DOD's ability to effectively develop, maintain, and implement an enterprise architecture for its business operations. To date, the department has fully addressed one of our other recommendations, which is to report every 6 months to the congressional committees on the status of the BEA effort, but it has yet to fully address the remaining recommendations. (See app. II for details on the status of these recommendations.) For example, the department has yet to address our recommendations to: * develop a position description for the Chief Architect that defines requisite duties and responsibilities, * update policies to assign responsibility and accountability for approving BEA releases, * update policies to address the issuance of waivers for business systems that are not compliant with the architecture but are nevertheless justified on the basis of documented analysis, and: * develop and implement a quality assurance plan. According to the program director and deputy director, the current state of the BEA, including progress in addressing our recommendations, reflects the program's prior focus on producing as many products as it could within a specific time period. The focus had not been on the content and quality of the releases, but rather on the timing of their delivery. In contrast, our recommendations have all focused on establishing the means by which to deliver a well-defined BEA and ensuring that delivered releases of the architecture contain this requisite content. Until DOD adopts the kind of approach embodied in our recommendations, it is unlikely that it will produce a well-defined BEA within reasonable time frames and at an affordable cost. Conclusions: Having and using a well-defined enterprise architecture are essential for DOD to effectively and efficiently modernize its nonintegrated and duplicative business operations and systems environment. However, the department does not have such an architecture, and the architecture products that it has produced to date do not provide sufficient content and utility to effectively guide and constrain the department's ongoing and planned business systems investments. This means that despite spending almost 4 years and about $318 million to develop its BEA, the department is not positioned to meet its legislative mandates. In our view, the state of the architecture is due largely to long-standing architecture management weaknesses that the recommendations we have made over the last 4 years are aimed at correcting, as well as the department's prior focus on producing as many products as it could within a specific time period. To date, the department has not taken adequate steps to implement most of our recommendations. While recent steps to begin revamping its BEA governance structure and to begin program planning are positive first steps and are consistent with some of the recommendations that we made to lay a foundation for architecture development, maintenance, and implementation, much more remains to be accomplished. Thus, it is imperative for the department to move swiftly to strengthen its BEA program in a manner that incorporates our prior recommendations and recognizes its current architecture management capabilities. Until it does, the department will continue to put billions of dollars at risk of being invested in systems that are duplicative, are not interoperable, cost more to maintain than necessary, and do not optimize mission performance and accountability. Recommendations for Executive Action: We recommend that the Secretary of Defense direct the Deputy Secretary of Defense, as the chair of the DBSMC and in collaboration with DBSMC members, to: * immediately fully disclose the state of its BEA program to DOD's congressional authorization and appropriations committees, including its limited progress and results to date, as well as specific plans and commitments for strengthening program management and producing measurable results that reflect the department's capability to do so; * ensure that each of our recommendations related to the BEA management and content are reflected in the above plans and commitments; and: * ensure that plans and commitments provide for effective BEA workforce planning, including assessing workforce knowledge and skills needs, determining existing workforce capabilities, identifying gaps, and filling these gaps. Agency Comments: In written comments on a draft of this report signed by the Special Assistant for Business Transformation in the Office of the Under Secretary of Defense (Acquisition, Technology, and Logistics) and the Deputy Under Secretary of Defense (Financial Management) (reprinted in app. V), the department concurred with our recommendations and stated its intent to implement them. Specifically, DOD stated that it would (1) disclose plans, progress, and results of its BEA efforts to DOD's congressional committees; (2) address our recommendations related to BEA management and content; and (3) assess its workforce needs and adjust its workforce to meet requirements. We are sending copies of this report to interested congressional committees; the Director, Office of Management and Budget; the Secretary of Defense; the Deputy Secretary of Defense; the Under Secretary of Defense (Acquisition, Technology, and Logistics); the Under Secretary of Defense (Comptroller); the Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer; the Under Secretary of Defense (Personnel and Readiness); and the Director, Defense Finance and Accounting Service. This report will also be available at no charge on our Web site at [Hyperlink, http://www.gao.gov]. If you or your staff have any questions on matters discussed in this report, please contact me at (202) 512-3439 or [Hyperlink, hiter@gao.gov]. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. Signed by: Randolph C. Hite: Director: Information Technology Architecture and Systems Issues: [End of section] Appendixes: Appendix I: Objectives, Scope, and Methodology: Our objectives were to determine whether the Department of Defense (DOD) has (1) established an effective governance structure; (2) developed program plans, including supporting workforce plans; (3) performed effective configuration management; (4) developed well- defined business enterprise architecture (BEA) products; and (5) addressed our other recommendations. To determine whether DOD has established an effective governance structure for its efforts, we reviewed program documentation--such as approved charters for the Executive and Steering Committees, the Domain Owners Integration Team (DO/IT), the Transformation Support Office,[Footnote 70] and the Defense Business Systems Management Committee--and the communications strategy and supporting documents. We compared these documents with the elements in our Enterprise Architecture Management Maturity Framework and federal Chief Information Officer (CIO) Council guidance.[Footnote 71] To determine whether DOD has developed program plans, including supporting workforce plans, we interviewed the Director and deputy program director, and the assistant deputy directors for communications, strategic planning, and transition planning. We also reviewed draft plans that showed the department's intent to address our prior recommendations for the content previously missing from the "As Is" architecture and the transition plan. We also reviewed the department's March 15, 2005, annual report to Congress,[Footnote 72] briefing slides on the department's BEA development approach, and the various statements of work for the contractor responsible for extending and evolving the architecture. For human capital, we reviewed program organization charts and position descriptions for key program officials. In addition, we interviewed key program officials, such as the assistant deputy directors for communications, strategic planning, and enterprise architecture, to discuss their roles and responsibilities. To determine whether effective configuration management was being performed, we reviewed the configuration management plan and associated procedures,[Footnote 73] and the draft configuration control board charter. We compared these documents with best practices, including the federal CIO Council's Practical Guide, to determine the extent to which DOD had adopted key management practices. In addition, we reviewed meeting minutes to determine whether the board was operating effectively and performing activities according to best practices. We also interviewed program officials, including the Chief Architect and the Configuration Control Board Chair, to discuss the process and its effect on the department's ability to develop and maintain the BEA products. To determine whether DOD had developed well-defined BEA products, we reviewed the latest BEA releases (i.e., Releases 2.2, 2.2.1, and 2.3 and the March 2005 Update)[Footnote 74] and the program's verification and validation contractor's reports documenting its assessment of Releases 2.2 and 2.3 and the January 2005 Update of the architecture. To determine whether these BEA releases addressed our prior recommendations on missing architecture content and inconsistencies, we requested contractual change requests related to our recommendations. Program officials, including the program director and Chief Architect, stated that change requests to address our recommendations do not exist. We also reviewed the verification and validation contractor's assessment of DOD's efforts to address its outstanding comments on prior versions of the BEA and DOD stakeholders'[Footnote 75] comments on Release 2.2 of the BEA. Further, we reviewed DOD's approach to developing the architecture products since Release 1.0 and compared it with relevant guidance, such as DOD's architecture framework. We also observed architecture walk-through sessions held by program officials to discuss concerns and provide progress updates. In addition, we interviewed program officials, including the Special Assistant for Business Transformation, Deputy Under Secretary of Defense (Financial Management), Chief Architect, the Configuration Control Board Chair, and the verification and validation contractor to discuss the development and maintenance of the BEA products. To determine the status of DOD's efforts to address our other recommendations related to BEA development and maintenance, we reviewed program documentation, such as the draft quality assurance plan, and compared them with the elements in our Enterprise Architecture Management Maturity Framework. We requested updates to the Information Technology Portfolio Management Policy and the position description for the Chief Architect. We also interviewed program and contractor officials, such as the Director and deputy program director, and the assistant deputy directors for quality assurance and communications. To augment our documentation reviews and analyses, we attended regularly scheduled meetings, such as the DO/IT meetings, the program execution status meetings, and configuration control board meetings. We also held monthly teleconferences with the program and deputy program directors to discuss any issues and to obtain explanations or clarification on the results of our audit work. We did not independently validate cost and budget information provided by the department. We conducted our work primarily at DOD headquarters in Arlington, Virginia, and we performed our work from July 2004 through May 2005, in accordance with generally accepted government auditing standards. We requested comments on a draft of this report from the Secretary of Defense or his designee. Written comments from the Special Assistant for Business Transformation in the Office of the Under Secretary of Defense (Acquisition, Technology, and Logistics) and the Deputy Under Secretary of Defense (Financial Management) are addressed in the "Agency Comments" section of this report and are reprinted in appendix V. [End of section] Appendix II: Status of Prior Recommendations on DOD's Development and Maintenance of Its Business Enterprise Architecture: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations. May 17, 2001: GAO report information and recommendation: (1) The Secretary immediately issue a Department of Defense (DOD) policy that directs the development, implementation, and maintenance of a business enterprise architecture (BEA).[A]; Implemented? Partial; DOD comments and our assessment: DOD has developed the Information Technology Portfolio Management policy. While this policy, in conjunction with the overarching Global Information Grid[B] policy, assigns responsibilities for the development, implementation, and maintenance of the BEA, it does not provide for having accountability for and approval of updates to the architecture processes for architecture oversight and control and architecture review and validation, and it does not address the issuance of waivers for business systems that are not compliant with the BEA but are nevertheless justified on the basis of documented analysis. Program officials stated that the department plans to revise this policy, but they did not provide a time frame for doing so. GAO report information and recommendation: (2) The Secretary immediately modify the Senior Financial Management Oversight Council's charter to; * designate the Deputy Secretary of Defense as the Council Chair and the Under Secretary of Defense (Comptroller) as the Council vice-Chair; and; * empower the council to serve as DOD's BEA steering committee, giving it the responsibility and authority to ensure that a DOD BEA is developed and maintained in accordance with the DOD Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) Architecture Framework; Implemented? Yes; DOD comments and our assessment: We previously reported that DOD had established the Executive and Steering Committees, which were advisory in nature. The department also had established the Domain Owners Integration Team (DO/IT) and stated that these three bodies were responsible for governing the program. However, these groups had not been assigned responsibilities for directing, overseeing, and approving the BEA. According to key department officials, these three entities will be replaced. Specifically, in February 2005, DOD established the Defense Business Systems Management Committee (DBSMC), which replaced the Executive and Steering Committees. According to its charter, the DBSMC is accountable and responsible for the program. The department plans to establish an underlying management structure to support the DBSMC in carrying out its roles and responsibilities. In addition, program officials have stated the department's intention to replace the DO/IT with the DOD Enterprise Transformation Integration Group whose roles and responsibilities and concept of operations have yet to be defined. GAO report information and recommendation: (3) The Secretary immediately make the Assistant Secretary of Defense (Command, Control, Communications & Intelligence), in collaboration with the Under Secretary of Defense (Comptroller), accountable to the Senior Financial Management Oversight Council for developing and maintaining a DOD BEA; In fulfilling this responsibility, the Assistant Secretary appoint a Chief Architect for DOD business management modernization and establish and adequately staff and fund an enterprise architecture program office that is responsible for developing and maintaining a DOD-wide BEA in a manner that is consistent with the framework defined in the Chief Information Officer (CIO) Council's published guide for managing enterprise architectures. In particular, the Assistant Secretary should take appropriate steps to ensure that the Chief Architect; * obtains executive buy-in and support; * establishes architecture management structure and controls; * defines the architecture process and approach; * develops the baseline architecture, the target architecture, and the sequencing plan; * facilitates the use of the architecture to guide business management modernization projects and investments; and; * maintains the architecture; Implemented? Partial; DOD comments and our assessment: The Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer (ASD(NII)/CIO) is a member of the recently established DBSMC; however, it is not known how this committee will operate; DOD established a program office in July 2001. DOD also appointed a Chief Architect, and, according to the department, it has adequate program funding and staff for developing and maintaining its architecture. However, DOD has yet to define the roles and responsibilities for the Chief Architect or provide a time frame for doing so. GAO report information and recommendation: (4) The ASD(NII)/CIO report at least quarterly to the Senior Financial Management Oversight Council on the Chief Architect's progress in developing a BEA, including the Chief Architect's adherence to enterprise architecture policy and guidance from the Office of Management and Budget (OMB), the CIO Council, and DOD; Implemented? Partial; DOD comments and our assessment: The ASD(NII)/CIO is a member of the recently established DBSMC; however, it is not known how this committee will operate; The Steering Committee was briefed monthly by the program office on various program activities until June 2004, when it held its last meeting. As a result, the Steering Committee was not updated on the content and status of Releases 2.2 and 2.3 and the January 2005 and March 2005 Updates of the BEA. According to program officials, the DBSMC held an executive session in February 2005 and its second meeting in April 2005, and the committee will initially hold monthly meetings. GAO report information and recommendation: (5) The Senior Financial Management Oversight Council report to the Secretary of Defense every 6 months on progress in developing and implementing a BEA; Implemented? Partial; DOD comments and our assessment: The Deputy Chief Financial Officer briefed the Secretary of Defense in November 2003 on behalf of DOD's Comptroller, who chairs the Executive Committee. According to the program director, the Secretary of Defense has not been briefed since November 2003 on the department's progress in developing and implementing the BEA. GAO report information and recommendation: (6) The Secretary report every 6 months to the congressional defense authorizing and appropriating committees on progress in developing and implementing a BEA; Implemented? Yes; DOD comments and our assessment: Senate Report 107-213 directs that the department report every 6 months on the status of the BEA effort. DOD submitted status reports on January 31 and July 31, 2003; January 31 and July 30, 2004; and March 15, 2005. The 2003 and 2004 reports were submitted by DOD's Comptroller but were not signed by the members of the Executive or Steering Committees. The 2005 report was signed by the Acting Under Secretary of Defense for Acquisition, Technology, and Logistics, who is the vice-chair of the DBSMC. GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed. February 28, 2003: GAO report information and recommendation: (1) The Secretary of Defense ensure that the enterprise architecture executive committee members are singularly and collectively made explicitly accountable to the Secretary for the delivery of the enterprise architecture, including approval of each release of the architecture; Implemented? Yes; DOD comments and our assessment: We previously reported that DOD had established the Executive and Steering Committees, which were advisory in nature. The department had also established the DO/IT and stated that these three bodies were responsible for governing the program. However, these groups had not been assigned responsibilities for directing, overseeing, and approving the BEA. According to key department officials, these three entities will be replaced. Specifically, in February 2005, DOD established the DBSMC, which replaced the Executive and Steering Committees. According to its charter, the DBSMC is accountable and responsible for the program. The department plans to establish an underlying management structure to support the DBSMC in carrying out its roles and responsibilities. In addition, program officials have stated the department's intention to replace the DO/IT with the DOD Enterprise Transformation Integration Group, whose roles and responsibilities and concept of operations have yet to be defined. GAO report information and recommendation: (2) The Secretary of Defense ensure that the enterprise architecture program is supported by a proactive marketing and communication program; Implemented? Partial; DOD comments and our assessment: DOD has a strategic communications plan; however, the plan has yet to be implemented. According to the communications team, its activities have been limited to raising awareness because it lacks the authority to fully implement the other components of its plan, such as achieving buy-in. According to program officials, the department intends to revise the governance structure, including the communications strategy, in September 2005. GAO report information and recommendation: (3) The Secretary of Defense ensure that the quality assurance function; * includes the review of adherence to process standards and reliability of reported program performance,; * is made independent of the program management function, and; * is not performed by subject matter experts involved in the development of key architecture products; Implemented? Partial; DOD comments and our assessment: DOD has established a quality assurance function; however, this function does not address process standards and program performance, nor is it an independent function. Further, DOD subject matter experts continue to be involved in the quality assurance function. Program officials stated that the department had yet to address our recommendation, and they could not provide a time frame for when they would begin addressing this recommendation. GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains. September 19, 2003: GAO report information and recommendation: (1) The Secretary of Defense or his appropriate designee implement the core elements in our Enterprise Architecture Framework for Assessing and Improving Enterprise Architecture Management that we identify in this report as not satisfied, including ensuring that minutes of the meetings of the executive body charged with directing, overseeing, and approving the architecture are prepared and maintained; Implemented? Partial; DOD comments and our assessment: DOD has taken some actions, but these actions do not fully address our previous concerns. For example, DOD has; * begun to revise its governance structure to provide for improved management and oversight, such as establishing the DBSMC and assigning it accountability and responsibility for directing, overseeing, and approving the BEA; and; * developed a configuration management plan and the related procedures, and established a configuration control board; However, the department has not; * established additional governance entities to support the DBSMC and outlined their roles and responsibilities; * updated the policy for BEA development, maintenance, and implementation; * included the missing scope and detail in the BEA; * finalized, approved, and effectively implemented the plan, procedures, and charter governing the configuration management process; and; * developed specific results-oriented performance metrics. GAO report information and recommendation: (2) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include the 29 key elements governing the "As Is" architectural content that our report identified as not being fully satisfied; Implemented? No; DOD comments and our assessment: Of the 29 elements, program officials stated that 3 were not applicable and that it planned to address an additional 11 by January 2005. However, these officials did not provide any documentation to support this statement. Instead, they provided a draft plan that shows the department's intent to develop a detailed action plan to guide the development of an "As Is" architecture. According to program officials, they plan to update the "As Is" architectural description in September 2005. GAO report information and recommendation: (3) The Secretary of Defense or his appropriate designee update version 1.0 of the BEA to include the 30 key elements governing the "To Be" architectural content that our report identified as not being fully satisfied; Implemented? No; DOD comments and our assessment: DOD officials have provided no evidence that this recommendation has been addressed or that it intends to implement this recommendation. GAO report information and recommendation: (4) The Secretary of Defense or his appropriate designee update version 1.0 to ensure that "To Be" architecture artifacts are internally consistent, to include addressing the inconsistencies described in this report, as well as including user instructions or guidance for easier architecture navigation and use; Implemented? No; DOD comments and our assessment: DOD officials have provided no evidence that this recommendation has been addressed or that it intends to implement this recommendation. GAO report information and recommendation: (5) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include (a) the 3 key elements governing the transition plan content that our report identified as not being fully satisfied and (b) those system investments that will not become part of the "To Be" architecture, including time frames for phasing out those systems; Implemented? No; DOD comments and our assessment: DOD officials provided a draft plan that shows the department's intent to develop a detailed action plan to guide the development of the transition plan; however, the draft plan does not provide time frames for doing so. According to program officials, the department will issue a revised transition plan in September 2005; but, this version will not fully address our recommendation. GAO report information and recommendation: (6) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to address comments made by the verification and validation contractor; Implemented? No; DOD comments and our assessment: According to program officials, of the 299 outstanding comments, 137 have been addressed in Release 2.3 and earlier releases, 100 were not applicable, and the remaining 62 will be addressed in future releases. These officials did not provide any documentation supporting their rationale for the 100 that they considered not applicable nor did they provide plans for addressing the 62 remaining comments. The verification and validation contractor stated that of the 137 comments that program officials stated had been addressed, 35 had been addressed, 22 were not applicable because they were either duplicate or no longer relevant based on updates to prior releases, 22 had yet to be addressed, and 58 were not assessed. The contractor has yet to provide its assessment on the 100 comments that DOD said were not applicable. GAO report information and recommendation: (7) The Secretary of Defense or his appropriate designee develop a well-defined, near-term plan for extending and evolving the architecture and ensure that this plan includes addressing our recommendations, defining roles and responsibilities of all stakeholders involved in extending and evolving the architecture, explaining dependencies among planned activities, and defining measures of activity progress; Implemented? No; DOD comments and our assessment: As discussed in this report, DOD has not developed explicit detailed plans to guide day-to-day program activities and to enable it to evaluate its progress. According to program officials, the department will develop a program baseline by September 30, 2005. Source: GAO. [A] On May 20, 2003, the Under Secretary of Defense (Comptroller) issued a memorandum that renamed and updated the Financial Management Modernization Program to the Business Management Modernization Program. In addition, the Financial Management Enterprise Architecture was renamed the Business Enterprise Architecture. [B] DOD defines the Global Information Grid as the globally interconnected, end-to-end set of information, capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. [End of table] [End of section] Appendix III: Summary of Several Architecture Frameworks: There are various enterprise architecture frameworks that an organization can follow. Although these frameworks differ in their nomenclatures and modeling approaches, they consistently provide for defining an enterprise's operations in both (1) logical terms, such as interrelated business processes and business rules, information needs and flows, and work locations and users, and (2) technical terms, such as hardware, software, data, communications, and security attributes and performance standards. The frameworks also provide for defining these perspectives for both the enterprise's current or "As Is" environment and its target or "To Be" environment, as well as a transition plan for moving from the "As Is" to the "To Be" environment. For example, John A. Zachman developed a structure or framework for defining and capturing an architecture.[Footnote 76] This framework provides for six windows from which to view the enterprise, which Zachman terms "perspectives" on how a given entity operates: those of (1) the strategic planner, (2) the system user, (3) the system designer, (4) the system developer, (5) the subcontractor, and (6) the system itself. Zachman also proposed six models that are associated with each of these perspectives; these models describe (1) how the entity operates, (2) what the entity uses to operate, (3) where the entity operates, (4) who operates the entity, (5) when entity operations occur, and (6) why the entity operates. Zachman's framework provides a conceptual schema that can be used to identify and describe an entity's existing and planned components and their relationships to one another before beginning the costly and time-consuming efforts associated with developing or transforming the entity. Since Zachman introduced his framework, a number of other frameworks has been proposed. In February 1998, DOD directed its components to use its C4ISR Architecture Framework, Version 2.0. In August 2003, the department released Version 1.0 of the DOD Architecture Framework (DODAF)[Footnote 77]--an evolution of the C4ISR Architecture Framework, which supersedes the C4ISR. The DODAF defines the type and content of the architectural artifacts, as well as the relationships among the artifacts that are needed to produce a useful architecture. Briefly, the framework decomposes an architecture into three primary views: operational, systems, and technical standards.[Footnote 78] See figure 3 for an illustration of these three views. According to DOD, the three interdependent views are needed to ensure that IT systems support operational needs, and that they are developed and implemented in an interoperable and cost-effective manner. Figure 3: Interdependent DODAF Views of an Architecture: [See PDF for image] [End of figure] In September 1999, the federal CIO Council published the Federal Enterprise Architecture Framework (FEAF), which is intended to provide federal agencies with a common construct on which to base their respective architectures and to facilitate the coordination of common business processes, technology insertion, information flows, and system investments among federal agencies. FEAF describes an approach, including models and definitions, for developing and documenting architecture descriptions for multiorganizational functional segments of the federal government. Similar to most frameworks, FEAF's proposed models describe an entity's business, the data necessary to conduct the business, applications to manage the data, and technology to support the applications. More recently, the Office of Management and Budget (OMB) established the Federal Enterprise Architecture (FEA) Program Management Office to develop a federated enterprise architecture in the context of five "reference models, and a security and privacy profile that overlays the five models." * The Business Reference Model is intended to describe the federal government's businesses, independent of the agencies that perform them. This model consists of four business areas: (1) services for citizens, (2) mode of delivery, (3) support delivery of services, and (4) management of government resources. It serves as the foundation for the FEA. OMB expects agencies to use this model, as part of their capital planning and investment control processes, to help identify opportunities to consolidate information technology (IT) investments across the federal government. Version 2.0 of this model was released in June 2003. * The Performance Reference Model is intended to describe a set of performance measures for major IT initiatives and their contribution to program performance. According to OMB, this model will help agencies produce enhanced performance information; improve the alignment and better articulate the contribution of inputs, such as technology, to outputs and outcomes; and identify improvement opportunities that span traditional organizational boundaries. Version 1.0 of this model was released in September 2003. * The Service Component Reference Model is intended to identify and classify IT service (i.e., application) components that support federal agencies and promote the reuse of components across agencies. This model is intended to provide the foundation for the reuse of applications, application capabilities, components (defined as "a self- contained business process or service with predetermined functionality that may be exposed through a business or technology interface"), and business services. According to OMB, this model is a business-driven, functional framework that classifies service components with respect to how they support business and/or performance objectives. Version 1.0 of this model was released in June 2003. * The Data Reference Model is intended to describe, at an aggregate level, the types of data and information that support program and business line operations and the relationships among these types. This model is intended to help describe the types of interactions and information exchanges that occur across the federal government. Version 1.0 of this model was released in September 2004. * The Technical Reference Model is intended to describe the standards, specifications, and technologies that collectively support the secure delivery, exchange, and construction of service components. Version 1.1 of this model was released in August 2003. * The Security and Privacy Profile is intended to provide guidance on designing and deploying measures that ensure the protection of information resources. OMB has released Version 1.0 of the profile. [End of section] Appendix IV: Description of DOD Architecture Framework Products, Version 1.0: Product: All view (AV): AV-1; Product title: All view (AV): Overview and Summary Information; Product description: All view (AV): Executive-level summary information on the scope, purpose, and context of the architecture. Product: All view (AV): AV-2; Product title: All view (AV): Integrated Dictionary; Product description: All view (AV): Architecture data repository with definitions of all terms used in all products. Product: Operational view (OV): OV-1; Product title: All view (AV): High-Level Operational Concept Graphic; Product description: All view (AV): High-level graphical/textual description of what the architecture is supposed to do, and how it is supposed to do it. Product: Operational view (OV): OV-2; Product title: All view (AV): Operational Node Connectivity Description; Product description: All view (AV): Graphic depiction of the operational nodes (or organizations) with needlines that indicate a need to exchange information. Product: Operational view (OV): OV-3; Product title: All view (AV): Operational Information Exchange Matrix; Product description: All view (AV): Information exchanged between nodes and the relevant attributes of that exchange. Product: Operational view (OV): OV-4; Product title: All view (AV): Organizational Relationships Chart; Product description: All view (AV): Command structure or relationships among human roles, organizations, or organization types that are the key players in an architecture. Product: Operational view (OV): OV-5; Product title: All view (AV): Operational Activity Model; Product description: All view (AV): Operations that are normally conducted in the course of achieving a mission or a business goal, such as capabilities, operational activities (or tasks), input and output flows between activities, and input and output flows to/from activities that are outside the scope of the architecture. Product: Operational view (OV): OV-6a; Product title: All view (AV): Operational Rules Model; Product description: All view (AV): One of three products used to describe operational activity--identifies business rules that constrain operations. Product: Operational view (OV): OV-6b; Product title: All view (AV): Operational State Transition Description; Product description: All view (AV): One of three products used to describe operational activity--identifies business process responses to events. Product: Operational view (OV): OV-6c; Product title: All view (AV): Operational Event-Trace Description; Product description: All view (AV): One of three products used to describe operational activity--traces actions in a scenario or sequence of events. Product: Operational view (OV): OV-7; Product title: All view (AV): Logical Data Model; Product description: All view (AV): Documentation of the system data requirements and structural business process rules of the operational view. Product: Systems view (SV): SV-1; Product title: All view (AV): Systems Interface Description; Product description: All view (AV): Identification of systems nodes, systems, and systems items and their interconnections, within and between nodes. Product: Systems view (SV): SV-2; Product title: All view (AV): Systems Communications Description; Product description: All view (AV): Specific communications links or communications networks and the details of their configurations through which systems interface. Product: Systems view (SV): SV-3; Product title: All view (AV): Systems- Systems Matrix; Product description: All view (AV): Relationships among systems in a given architecture; can be designed to show relationships of interest (e.g., system-type interfaces, planned versus existing interfaces). Product: Systems view (SV): SV-4; Product title: All view (AV): Systems Functionality Description; Product description: All view (AV): System functional hierarchies and system functions, and the system data flow between them. Product: Systems view (SV): SV-5; Product title: All view (AV): Operational Activity to Systems Function Traceability Matrix; Product description: All view (AV): Mapping of relationships between the set of operational activities and the set of system functions applicable to that architecture. Product: Systems view (SV): SV-6; Product title: All view (AV): Systems Data Exchange Matrix; Product description: All view (AV): Characteristics of the system data exchanged between systems. Product: Systems view (SV): SV-7; Product title: All view (AV): Systems Performance Parameters Matrix; Product description: All view (AV): Quantitative characteristics of systems and systems hardware/software items, their interfaces, and their functions. Product: Systems view (SV): SV-8; Product title: All view (AV): Systems Evolution Description; Product description: All view (AV): Planned incremental steps toward migrating a suite of systems to a more efficient suite, or toward evolving a current system to a future implementation. Product: Systems view (SV): SV-9; Product title: All view (AV): Systems Technology Forecast; Product description: All view (AV): Emerging technologies and software/hardware products that are expected to be available in a given set of time frames and that will affect future development of the architecture. Product: Systems view (SV): SV-10a; Product title: All view (AV): Systems Rules Model; Product description: All view (AV): One of three products used to describe system functionality--identifies constraints that are imposed on systems functionality due to some aspect of systems design or implementation. Product: Systems view (SV): SV-10b; Product title: All view (AV): Systems State Transition Description; Product description: All view (AV): One of three products used to describe system functionality--identifies responses of a system to events. Product: Systems view (SV): SV-10c; Product title: All view (AV): Systems Event-Trace Description; Product description: All view (AV): One of three products used to describe system functionality--lays out the sequence of system data exchanges that occur between systems (external and internal), system functions, or human role for a given scenario. Product: Systems view (SV): SV-11; Product title: All view (AV): Physical Schema; Product description: All view (AV): Physical implementation of the Logical Data Model entities (e.g., message formats, file structures, and physical schema). Product: Technical standards view (TV): TV-1; Product title: All view (AV): Technical Standards Profile; Product description: All view (AV): Listing of standards that apply to systems view elements in a given architecture. Product: Technical standards view (TV): TV-2; Product title: All view (AV): Technical Standards Forecast; Product description: All view (AV): Description of emerging standards and the potential impact on current systems view elements, within a set of time frames. Source: DOD. [End of table] [End of section] Appendix V: Comments from the Department of Defense: OFFICE OF THE UNDER SECRETARY OF DEFENSE: ACQUISITION, TECHNOLOGY AND LOGISTICS: 3000 DEFENSE PENTAGON: WASHINGTON, DC 20301-3000: Mr. Randolph C. Hite: Director, Information Technology Architecture and Systems Issues: U.S. Government Accountability Office: Washington, DC 20548: JUL 8 2005: Dear Mr. Hite: Enclosed is the Department of Defense (DoD) response to the Government Accountability Office (GAO) Draft Report, GAO-05-702, "DoD Business Systems Modernization: Longstanding Weaknesses in Enterprise Architecture Development Need to Be Addressed," dated June 7, 2005. The Department concurs with all three of the GAO's executive recommendations. The Business Transformation effort of the Department of Defense, and the activities of the Business Management Modernization Program (BMMP) have been restructured to accelerate the transformation effort, strengthen oversight of department wide system modernization investments, and expand senior leadership engagement in the transformation effort. The focus of the BMMP is to drive greater innovation and higher levels of efficiency throughout the Business Mission Area of the Department. This will be achieved by accelerating the implementation of solutions that support DoD enterprise-level capabilities to realize broader, Department-wide improvements in business processes while continuously improving our financial management discipline and transparency. We look forward to on-going engagement and discussion with the GAO as we continue our effort to transform the business operations of the Department. Sincerely, Signed by: Paul Brinkley: Special Assistant for Business Administration: Signed by: Thomas Modly: Deputy Under Secretary of Defense, Financial Management: Enclosure: As stated: GAO Draft Report - Dated June 7, 2005: GAO CODE 310298/GAO-05-702: "DoD Business Systems Modernization: Longstanding Weaknesses in Enterprise Architecture Development Need to Be Addressed" DEPARTMENT OF DEFENSE COMMENTS TO THE RECOMMENDATIONS: RECOMMENDATION 1: The GAO recommended that the Secretary of Defense direct the Deputy Secretary of Defense, as the chair of the Defense Business Systems Management Committee (DBSMC) and in collaboration with the DBSMC members, to immediately fully disclose the state of its Business Enterprise Architecture (BEA) program to DOD's congressional authorization and appropriations committees, including its limited progress and results to date, as well as specific plans and commitments for strengthening program management and producing measurable results that reflect the department's capability to do so. (p. 50/GAO Draft Report): DOD RESPONSE: Concur. The Department will continue to disclose plans, progress, and results of our business transformation efforts, including the Business Enterprise Architecture (BEA), to DOD's congressional authorization and appropriations committees. We intend to continue our dialog with Congress by testifying before Congressional committees, submitting annual progress reports and dialoging on a regular basis with Congressional members and staff. RECOMMENDATION 2: The GAO recommended that the Secretary of Defense direct the Deputy Secretary of Defense, as the chair of the DBSMC and in collaboration with the DBSMC members, to ensure that each of our recommendations related to BEA management and content are reflected in the above plans and commitments. (p. 50/GAO Draft Report): DOD RESPONSE: Concur. The DBSMC leadership is committed to implementing GAO recommendations. BMMP staff continues to met with GAO staff to bring each recommendation to closure. RECOMMENDATION 3: The GAO recommended that the Secretary of Defense direct the Deputy Secretary of Defense, as the chair of the DBSMC and in collaboration with the DBSMC members, to ensure that plans and commitments provide for effective BEA workforce planning, including assessing workforce knowledge and skills needs, determining existing workforce capabilities, identifying gaps, and filling these gaps. (p. 50/GAO Draft Report): DOD RESPONSE: Concur. The Department continues to assess workforce needs, the business transformation effort of the Department of Defense, and the activities of the Business Management Modernization Program (BMMP). We continue to adjust the federal and contract workforce to meet DBSMC requirements. [End of section] Appendix VI: GAO Contact and Staff Acknowledgments: GAO Contact: Randolph C. Hite, (202) 512-3439 or [Hyperlink, hiter@gao.gov]: Acknowledgments: In addition to the contact named above, Cynthia Jackson, Assistant Director; Barbara Collier; Joanne Fiorino; Neelaxi Lakhmani; Anh Le; Freda Paintsil; Randolph Tekeley; and William Wadsworth made key contributions to this report. (310298): FOOTNOTES [1] GAO, High-Risk Series: An Update, GAO-05-207 (Washington, D.C.: January 2005). [2] GAO, Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, GAO-01-525 (Washington, D.C.: May 17, 2001). [3] Bob Stump National Defense Authorization Act for Fiscal Year 2003, Public Law 107-314, § 1004, 116 Stat. 2458, 2629-2631 (Dec. 2, 2002). [4] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Public Law 108-375, § 332, 118 Stat. 1811, 1851-1856, (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [5] GAO, DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, GAO-03-458 (Washington, D.C.: Feb. 28, 2003). [6] See, for example, GAO, Defense Inventory: Opportunities Exist to Improve Spare Parts Support Aboard Deployed Navy Ships, GAO-03-887 (Washington, D.C.: Aug. 29, 2003); Military Pay: Army National Guard Personnel Mobilized to Active Duty Experienced Significant Pay Problems, GAO-04-89 (Washington, D.C.: Nov. 13, 2003); and DOD Travel Cards: Control Weaknesses Resulted in Millions of Dollars of Improper Payments, GAO-04-576 (Washington, D.C.: June 9, 2004). [7] GAO-05-207. The 8 specific DOD high-risk areas are (1) approach to business transformation, (2) business systems modernization, (3) contract management, (4) financial management, (5) personnel security clearance program, (6) supply chain management, (7) support infrastructure management, and (8) weapon systems acquisition. The 6 governmentwide high-risk areas are (1) disability programs, (2) interagency contracting, (3) information systems and critical infrastructure, (4) information sharing for homeland security, (5) human capital, and (6) real property. [8] GAO-05-207. [9] GAO, Department of Defense: Status of Financial Management Weaknesses and Progress Toward Reform, GAO-03-931T (Washington, D.C.: June 25, 2003). [10] DOD, Department of Defense Performance and Accountability Report, Fiscal Year 2004 (Nov. 15, 2004). [11] The Clinger-Cohen Act of 1996, 40 U.S.C. §§ 11312 and 11315(b)(2). [12] The E-Government Act of 2002, Public Law 107-347 (Dec. 17, 2002). [13] See, for example, GAO, Homeland Security: Efforts Under Way to Develop Enterprise Architecture, but Much Work Remains, GAO-04-777 (Washington, D.C.: Aug. 6, 2004); DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments, GAO-04-731R (Washington, D.C.: May 17, 2004); Information Technology: Architecture Needed to Guide NASA's Financial Management Modernization, GAO-04-43 (Washington, D.C.: Nov. 21, 2003); DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, GAO-03-1018 (Washington, D.C.: Sept. 19, 2003); Business Systems Modernization: Summary of GAO's Assessment of the Department of Defense's Initial Business Enterprise Architecture, GAO- 03-877R (Washington, D.C.: July 7, 2003); Information Technology: DLA Should Strengthen Business Systems Modernization Architecture and Investment Activities, GAO-01-631 (Washington, D.C.: June 29, 2001); and Information Technology: INS Needs to Better Manage the Development of Its Enterprise Architecture, GAO/AIMD-00-212 (Washington, D.C.: Aug. 1, 2000). [14] Program officials, including the Chief Architect, stated that they do not track and report the cost of each architecture release. These officials stated that it would not be cost-effective to attempt to capture this information for this review. [15] GAO-01-525. [16] GAO-03-458. [17] GAO, Information Technology: Observations on Department of Defense's Draft Enterprise Architecture, GAO-03-571R (Washington, D.C.: Mar. 28, 2003). [18] Bob Stump National Defense Authorization Act for Fiscal Year 2003, Public Law 107-314, § 1004, 116 Stat. 2458, 2629-2631 (Dec. 2, 2002). [19] Because the review was focused on draft architecture products that were not intended to be complete, we did not make any recommendations in the March 2003 report. Our assessment was a specific point-in-time review of the BEA (i.e., the Feb. 7, 2003, draft architecture). [20] GAO-03-877R and GAO-03-1018. [21] DOD reported that it had approximately 4,200 business systems as of February 2005. [22] GAO-03-1018. [23] GAO-01-525. [24] GAO-03-458. [25] GAO, Department of Defense: Further Actions Needed to Establish and Implement a Framework for Successful Financial and Business Management Transformation, GAO-04-551T (Washington, D.C.: Mar. 23, 2004); and Department of Defense: Further Actions Needed to Establish and Implement a Framework for Successful Business Transformation, GAO- 04-626T (Washington, D.C.: Mar. 31, 2004). [26] GAO, Department of Defense: Long-standing Problems Continue to Impede Financial and Business Management Transformation, GAO-04-907T (Washington, D.C.: July 7, 2004); and Department of Defense: Financial and Business Management Transformation Hindered by Long-standing Problems, GAO-04-941T (Washington, D.C.: July 8, 2004). [27] GAO-04-731R. [28] GAO-03-1018. [29] GAO, Information Technology: A Framework for Assessing and Improving Enterprise Architecture Management (Version 1.1), GAO-03- 584G (Washington, D.C.: April 2003). [30] GAO-04-731R. [31] GAO-01-525, GAO-03-458, and GAO-03-1018. [32] GAO, Department of Defense: Further Actions Are Needed to Effectively Address Business Management Problems and Overcome Key Business Transformation Challenges, GAO-05-140T (Washington, D.C.: Nov. 18, 2004). [33] GAO, DOD's High-Risk Areas: Successful Business Transformation Requires Sound Strategic Planning and Sustained Leadership, GAO-05-520T (Washington, D.C.: Apr. 13, 2005). [34] See, for example, GAO, DOD Business Systems Modernization: Billions Continue to Be Invested with Inadequate Management Oversight and Accountability, GAO-04-615 (Washington, D.C.: May 27, 2004); GAO- 04-551T; and GAO-03-1018. [35] See, for example, GAO-03-584G; and Chief Information Officer Council, A Practical Guide to Federal Enterprise Architecture, Version 1.0 (February 2001). [36] GAO-03-458. [37] GAO-03-458. [38] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Public Law 108-375, § 332, 118 Stat. 1811, 1851-1856, (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [39] DOD plans to restructure the five business domains and the one mission area into five core business mission areas: (1) Personnel Management, (2) Weapon Systems Life-cycle Management, (3) Real Property and Installation Life-cycle Management, (4) Material Supply and Service Management, and (5) Financial Management. [40] In DOD, principal staff assistants are the Under Secretaries of Defense; the Assistant Secretaries of Defense; the General Counsel of the Department of Defense; the Assistants to the Secretary of Defense; and the Directors of the Office of the Secretary of Defense, or equivalents, who report directly to the Secretary or Deputy Secretary of Defense. [41] The six boards are the (1) Architecture Management Board, (2) Capabilities Transformation Board, (3) Data Management Board, (4) Portfolio Management Board, (5) Change Management Board, and (6) Strategic Management Board. [42] See, for example, GAO-03-584G; and CIO Council, Federal Enterprise Architecture, Version 1.0. [43] GAO-03-458. [44] See, for example, GAO-03-584G; and CIO Council, Federal Enterprise Architecture, Version 1.0. [45] GAO-03-1018. [46] GAO, A Model of Strategic Human Capital Management, GAO-02-373SP (Washington, D.C.: Mar. 15, 2002). [47] GAO-03-584G; and CIO Council, Federal Enterprise Architecture, Version 1.0. [48] Separation of duties requires that key duties and responsibilities be separated among individuals to ensure that effective checks and balances exist to reduce the risk of error, waste, or wrongful acts or to reduce the risk of these issues going undetected. [49] See, for example, GAO-03-584G; CIO Council, Federal Enterprise Architecture, Version 1.0; Electronic Industries Alliance, National Consensus Standard for Configuration Management, ANSI/EIA-649-1998 (August 1998); Institute of Electrical and Electronics Engineers, Standard for Application and Management of the Systems Engineering Process 1200-1998 (Jan. 22, 1999); and the Software Engineering Institute, Capability Maturity Model Integration, Version 1.1 (March 2002). [50] DOD, Military Handbook 61A(SE): Configuration Management Guidance (Feb. 7, 2001). [51] GAO, National Guard: Effective Management Processes Needed for Wide-Area Network, GAO-02-959 (Washington, D.C.: Sept. 24, 2002). [52] The product types are (1) system architect encyclopedias and architecture support products, which include data needed to produce the operational, system, and technical views of the BEA; (2) functional requirements, which include policies and laws that the BEA must comply with; (3) other program deliverables, which include the quality management plan and the data repository maintenance and support plan; and (4) other program work products that are not required by the performance work statement to include program processes, procedures, and user guides. [53] A verification and validation contractor is a neutral third-party contractor who is responsible for conducting architecture compliance evaluations and who provides quality assurance checking on program information, as well as the proper implementation of the architecture methodology. [54] A baseline is a set of specifications or work products (e.g., architecture products) that has been formally reviewed or agreed upon, that thereafter serves as the basis for further development, and that can be changed only through change control procedures to maintain integrity. A baseline represents the assignment of an identifier to a configuration item and its associated entities. [55] See, for example, GAO-03-584G; CIO Council, Federal Enterprise Architecture, Version 1.0; DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (August 2003) and Volume 2 (February 2004); and Institute of Electrical and Electronics Engineers, Standard for Recommended Practice for Architectural Description of Software- Intensive Systems 1471-2000 (Sept. 21, 2000). [56] GAO-03-1018. [57] The other 30 prior recommendations pertain to the "To Be" environment and are discussed in the next section of this report. [58] GAO-03-1018. [59] DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (August 2003) and Volume 2 (February 2004). [60] Increment 1 objectives include (1) achieving unqualified audit opinion for consolidated DOD financial statements and (2) achieving total personnel visibility to include military service members, civilian employees, military retirees, and other U.S. personnel in a theater of operations. [61] See, for example, GAO-03-584G; CIO Council, Federal Enterprise Architecture, Version 1.0; Office of Management and Budget, Federal Enterprise Architecture Business Reference Model, Version 1.0 (2002); and Institute of Electrical and Electronics Engineers, Standard for Recommended Practice for Architectural Description of Software- Intensive Systems 1471-2000 (Sept. 21, 2000). [62] DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (August 2003) and Volume 2 (February 2004). [63] GAO-03-1018. [64] The other 32 prior recommendations pertain to the "As Is" environment and the transition plan and are discussed in the previous section of this report. [65] We reviewed Releases 2.2, 2.2.1, and 2.3 and the March 2005 Update. [66] See, for example, GAO-03-584G; CIO Council, Federal Enterprise Architecture, Version 1.0; Office of Management and Budget, Federal Enterprise Architecture Business Reference Model, Version 1.0 (2002); DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (August 2003) and Volume 2 (February 2004); and Institute of Electrical and Electronics Engineers, Standard for Recommended Practice for Architectural Description of Software-Intensive Systems 1471-2000 (Sept. 21, 2000). [67] IV&V Evaluation Summary Report BEA January 31, 2005, Update, Version 2 (Feb. 1, 2005). [68] See, for example, GAO-03-584G; and CIO Council, Federal Enterprise Architecture, Version 1.0. [69] GAO-03-1018. [70] In March 2005, DOD changed the name of the program office from the Business Modernization and Systems Integration Office to the Transformation Support Office. [71] GAO, Information Technology: A Framework for Assessing and Improving Enterprise Architecture Management (Version 1.1), GAO-03- 584G (Washington, D.C.: April 2003); and Chief Information Officer Council, A Practical Guide to Federal Enterprise Architecture, Version 1.0 (February 2001). [72] Department of Defense, Annual Report to Congressional Defense Committees: Status of the Department of Defense's Business Management Modernization Program (Mar. 15, 2005). [73] We reviewed multiple versions of these documents during this review. For example, we reviewed the August and November 2003 and the April 2004 versions of the configuration management plan, as well as the May and November 2004 versions of the configuration control procedure document. [74] We did not review the January 2005 Update because the department provided this release at the same time it provided the March 2005 Update. As a result, we reviewed the content of the March release. [75] DOD stakeholders include the program office staff, business domains, mission area, military services, and defense agencies. [76] J.A. Zachman, "A Framework for Information Systems Architecture," IBM Systems Journal 26, no. 3 (1987). [77] DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (August 2003) and Volume 2 (February 2004). [78] There are some overarching aspects of architecture that relate to all three of the views. These overarching aspects, such as goals and mission statements and concepts of operations, are captured in the All- view products. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.