Business Systems Modernization

DOD Continues to Improve Institutional Approach, but Further Steps Needed Gao ID: GAO-06-658 May 15, 2006

For decades, the Department of Defense (DOD) has not been successful in repeated attempts to modernize its timeworn business systems and operations. In 1995, we first designated DOD's business systems modernization as "high risk," and we continue to designate it as such today. As our research on successful public and private sector organizations has shown, attempting a large-scale systems modernization program in a large organization such as DOD without, among other things, a well-defined enterprise architecture and the associated investment management controls for implementing it often results in systems that are duplicative, stovepiped, non-integrated, and unnecessarily costly to manage, maintain, and operate. In May 2001, we made recommendations to the Secretary of Defense that provided the means for effectively developing and implementing an enterprise architecture and limiting systems investments until the department had a well-defined architecture and a corporate approach to investment control and decision making. In July 2001, the department initiated a business management modernization program to, among other things, develop a business enterprise architecture and establish the investment controls needed to effectively implement it. This effort was begun as part of the Secretary of Defense's broad initiative to "transform the way the department works and what it works on." Between 2001 and 2005, we reported that the department's business management modernization program was not being effectively managed, concluding in 2005 that hundreds of millions of dollars had been spent on an architecture and investment management structures that had limited use. To assist DOD in addressing these modernization management challenges, Congress included provisions in the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (the Act) that were consistent with our recommendations for developing a business enterprise architecture and associated enterprise transition plan, and establishing and implementing effective information technology (IT) business system investment management structures and processes. More specifically, the Act required the department to, among other things, (1) develop a business enterprise architecture, (2) develop a transition plan to implement the architecture, (3) include systems information in its annual budget submission, (4) establish a system investment approval and accountability structure, (5) establish an investment review process, and (6) approve and certify system modernizations costing in excess of $1 million. The Act further requires that the Secretary of Defense submit an annual report to congressional defense committees on its compliance with certain requirements of the Act not later than March 15 of each year from 2005 through 2009. Additionally, the Act directs us to submit to congressional defense committees--within 60 days of DOD's report submission--an assessment of DOD's actions taken to comply with these requirements. The objectives of our review were to (1) assess the actions by DOD to comply with the requirements of Section 2222 of Title 10, U.S. Code and (2) determine the extent to which DOD has addressed our prior recommendations. To accomplish this, we used our November 2005 report as a baseline of comparison, focusing on the steps the department has taken to address the areas of noncompliance that we cited in that report.

As part of DOD's incremental strategy for developing and implementing its architecture, transition plan, and tiered accountability framework for managing business systems, the department has taken steps over the last 6 months to further comply with the Act and otherwise improve its overall approach to business systems modernization. On March 15, 2006, DOD released a minor update to its business enterprise architecture (version 3.1), developed an updated enterprise transition plan, and issued its annual report to Congress describing steps taken to address the Act's requirements, among other things. The updated architecture and transition plan, as well as the report and related documentation, reflect steps taken to address a number of the areas that we previously reported as falling short of the Act's requirements and related guidance. However, additional steps are needed to fully comply with the Act and relevant guidance.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-06-658, Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed This is the accessible text file for GAO report number GAO-06-658 entitled 'Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed' which was released on May 15, 2006. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. United States Government Accountability Office: GAO: Report to Congressional Committees: May 2006: Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed: GAO-06-658: GAO Highlights: Highlights of GAO-06-658, a report to congressional committees. Why GAO Did This Study: For decades, the Department of Defense (DOD) has not been successful in repeated attempts to modernize its business systems and operations. To assist DOD, Congress included provisions in the Fiscal Year 2005 Ronald W. Reagan National Defense Authorization Act that were consistent with GAO‘s recommendations for developing a business enterprise architecture and associated enterprise transition plan and establishing and implementing effective information technology (IT) business system investment management structures and processes. The Act further requires that the Secretary of Defense submit an annual report to congressional defense committees on its compliance with certain requirements of the Act not later than March 15 of each year from 2005 through 2009. In response to the Act‘s mandate, GAO assessed the actions by DOD to comply with the requirements of the Act and determined the extent to which DOD has addressed GAO‘s prior recommendations. What GAO Found: As part of DOD‘s incremental strategy for developing and implementing its architecture, transition plan, and accountability framework for managing business systems, the department has taken steps over the last 6 months to address a number of the areas that GAO previously reported as falling short of the Act‘s requirements. However, additional steps are needed to fully comply with the Act and relevant guidance. For example: * The architecture identifies an enterprisewide data standard to support financial management and reporting functions. However, the data elements”such as those associated with the planning, programming, and budgeting business process”are not yet part of the architecture. * The enterprise transition plan now includes an initiative aimed at identifying capability gaps between the ’As Is“ and ’To Be“ architectural environments, and DOD continues to validate the inventory of ongoing IT investments that formed the basis for the prior version of the transition plan. However, the plan does not include, among other things, a complete listing of the legacy systems that will not be part of the target architecture, and it does not include system investment information for all of the department‘s agencies and combatant commands. * The department‘s fiscal year 2007 IT budget submission was prepared using a system that was reconciled with DOD‘s single authoritative system inventory. This should improve the reliability of the budget submission. * The IT investment management structures and processes that DOD previously defined are being refined and implemented across the department. However, the investment review board that is to focus on IT infrastructure and information assurance investments has still not been established. DOD has also taken steps to address 29 prior GAO recommendations to strengthen the management of its business systems modernization through the adoption of enterprise architecture and investment management best practices. As a result of DOD‘s actions, 16 of the recommendations have now been implemented and 13 are in the process of being implemented. Notwithstanding DOD‘s incremental strategy for improving its institutional approach to business systems modernization and complying with the Act, the department has yet to create or establish milestones for developing an enterprise architecture program management plan that defines, among other things, what the increments of improvement are, and how and when they will be accomplished, with particular emphasis and clarity around the near-term increments. It is important for the department to develop this plan as soon as possible because without it, the department is less likely to accomplish intended improvements and the Congress does not have the means to measure progress and hold the department accountable for doing so. What GAO Recommends: GAO is recommending that the department submit its enterprise architecture program management plan to defense congressional committees. DOD commented that GAO‘s findings are fair, and it expressed general agreement with GAO‘s recommendations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-658]. To view the full product, including the scope and methodology, click on the link above. For more information, contact Randolph C. Hite at (202) 512-3439 or hiter@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: DOD Is Taking Steps to Address Act's Requirements and Improve Approach to Modernizing Business Systems: DOD Is Implementing Our Prior Recommendations: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Prior Recommendations on DOD's Business Enterprise Architecture and Investment Management: Appendix III: Comments from the Department of Defense: Appendix IV: Summary of Several Architecture Frameworks: Appendix V: GAO Contact and Staff Acknowledgments: Tables: Table 1: Roles and Responsibilities of Governance Entities: Table 2: Business Transformation Agency Divisions: Table 3: Core Business Missions and Associated Principal Staff Assistants: Table 4: Business Enterprise Priorities: Figures: Figure 1: Business Transformation Agency Organization: Figure 2: Interdependent DODAF Views of an Architecture: Abbreviations: ASD(NII)/CIO: Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer: BEA: Business Enterprise Architecture: BTA: Business Transformation Agency: CA: Certification Authority: CIO: Chief Information Officer: DBSMC: Defense Business Systems Management Committee: DITPR: DOD Information Technology Portfolio Repository: DOD: Department of Defense: DODAF: Department of Defense Architecture Framework: ETP: Enterprise Transition Plan: FEA: Federal Enterprise Architecture: FEAF: Federal Enterprise Architecture Framework: FCP: Forward Compatible Payroll: IRB: Investment Review Board: IT: information technology: NCES: Net-Centric Enterprise Services: NSS: National Security Systems: OMB: Office of Management and Budget: SFIS: Standard Financial Information Structure: SNAP-IT: Select and Native Programming Data System- Information Technology: United States Government Accountability Office: Washington, DC 20548: May 15, 2006: Congressional Committees: For decades, the Department of Defense (DOD) has not been successful in repeated attempts to modernize its timeworn business systems[Footnote 1] and operations. In 1995, we first designated DOD's business systems modernization as "high risk," and we continue to designate it as such today.[Footnote 2] As our research on successful public and private sector organizations has shown, attempting a large-scale systems modernization program in a large organization such as DOD without, among other things, a well-defined enterprise architecture[Footnote 3] and the associated investment management controls for implementing it often results in systems that are duplicative, stovepiped, non- integrated, and unnecessarily costly to manage, maintain, and operate. In May 2001, we made recommendations to the Secretary of Defense that provided the means for effectively developing and implementing an enterprise architecture and limiting systems investments until the department had a well-defined architecture and a corporate approach to investment control and decision making.[Footnote 4] In July 2001, the department initiated a business management modernization program to, among other things, develop a business enterprise architecture and establish the investment controls needed to effectively implement it. This effort was begun as part of the Secretary of Defense's broad initiative to "transform the way the department works and what it works on." Between 2001 and 2005, we reported that the department's business management modernization program was not being effectively managed, concluding in 2005 that hundreds of millions of dollars had been spent on an architecture and investment management structures that had limited use.[Footnote 5] To assist DOD in addressing these modernization management challenges, Congress included provisions in the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (the Act)[Footnote 6] that were consistent with our recommendations for developing a business enterprise architecture and associated enterprise transition plan, and establishing and implementing effective information technology (IT) business system investment management structures and processes. More specifically, the Act required the department to, among other things, (1) develop a business enterprise architecture, (2) develop a transition plan to implement the architecture, (3) include systems information in its annual budget submission, (4) establish a system investment approval and accountability structure, (5) establish an investment review process, and (6) approve and certify system modernizations costing in excess of $1 million. The Act further requires that the Secretary of Defense submit an annual report to congressional defense committees on its compliance with certain requirements of the Act not later than March 15 of each year from 2005 through 2009. Additionally, the Act directs us to submit to congressional defense committees--within 60 days of DOD's report submission--an assessment of DOD's actions taken to comply with these requirements. As agreed with your offices, the objectives of our review were to (1) assess the actions by DOD to comply with the requirements of Section 2222 of Title 10, U.S. Code and (2) determine the extent to which DOD has addressed our prior recommendations. To accomplish this, we used our November 2005 report[Footnote 7] as a baseline of comparison, focusing on the steps the department has taken to address the areas of noncompliance that we cited in that report. We performed our work from January through May 2006 in accordance with generally accepted government auditing standards. Details on our objectives, scope, and methodology are contained in appendix I. Results in Brief: As part of DOD's incremental strategy for developing and implementing its architecture, transition plan, and tiered accountability framework for managing business systems, the department has taken steps over the last 6 months to further comply with the Act and otherwise improve its overall approach to business systems modernization. On March 15, 2006, DOD released a minor update to its business enterprise architecture (version 3.1), developed an updated enterprise transition plan, and issued its annual report to Congress describing steps taken to address the Act's requirements, among other things. The updated architecture and transition plan, as well as the report and related documentation, reflect steps taken to address a number of the areas that we previously reported as falling short of the Act's requirements and related guidance. However, additional steps are needed to fully comply with the Act and relevant guidance. The following illustrate steps taken thus far to improve management of the department's business systems modernization effort and where further improvement is needed. * The latest version of the architecture continues to specify DOD's Standard Financial Information Structure (SFIS) as an enterprisewide data standard for categorizing financial information to support financial management and reporting functions. In addition, the architecture now adds greater definition on standard processes, rules, and data for intra-governmental ordering and billing. However, certain SFIS data elements, such as those relating to the planning, programming, and budgeting business process area, have yet to be defined. According to DOD, these data elements will be in the next version of the architecture. The latest version of the architecture also does not yet include a systems standards profile to facilitate data sharing among departmentwide business systems and promote interoperability with departmentwide IT infrastructure systems. Further, military services and defense agencies architectures have yet to be aligned with the departmental architecture. Once such missing scope and content is added, the architecture will be a more sufficient frame of reference to optimally guide and constrain DOD-wide system investment decision making. * The enterprise transition plan now includes an initiative aimed at identifying capability gaps between the "As Is" and "To Be" architectural environments, and DOD continues to validate the inventory of ongoing IT investments that formed the basis for the prior version of the transition plan. Further, the plan provides information on progress on major investments over the last 6 months--including key accomplishments and milestones attained, and more information about the termination of legacy systems. However, it still does not identify, for example, all legacy systems that will not be part of the target architecture, and it does not include system investment information for all of the department's agencies and combatant commands. Once missing content is added and all planned investments are validated by capability gap analyses, the department will be better positioned to sequentially manage the migration and disposition of existing business processes and systems--and the introduction of new ones. * The fiscal year 2007 IT budget submission was prepared using a system that has been reconciled with DOD's single authoritative system inventory. This should improve the completeness and reliability of the budget submission. * The IT investment management structures and processes that DOD previously defined are being refined and implemented across the department. For example, DOD reports that 226 business systems, which represent about $3.6 billion in modernization funding, were approved by the Defense Business Systems Management Committee (DBSMC). Further, it reports that over 290 business systems have been identified for phase- out/elimination. The extent to which these structures and processes will be applied to the department's approximately 3,700 business systems is still evolving. Further, an investment review board required by the Act and DOD policy for IT infrastructure and information assurance investments has yet to be established. The Act's requirements concerning the architecture, transition plan, budgetary disclosure, and investment management structures and processes are consistent with our prior recommendations. In taking steps to further comply with the Act, DOD has either implemented--or is in the process of implementing--these 29 prior recommendations. More specifically, the department has fully implemented 16 of the recommendations and is in the process of implementing the remaining 13. For example, the department has implemented our recommendation to issue a policy governing the development, implementation, and maintenance of an enterprise architecture. However, it has not implemented our recommendation to develop a plan governing the development, maintenance, and implementation of the enterprise architecture. Such a plan would, at a minimum, define what the incremental improvements will be, and how and when they will be accomplished. The plan would also include what (and when) architecture and transition plan scope and content--and architecture compliance criteria--will be added, with particular emphasis and clarity around the near-term increments. It is important for the department to develop this plan as soon as possible because without it, the department is less likely to accomplish intended improvements--and Congress will not have the means to measure progress and hold the department accountable. According to DOD officials, the department is committed to addressing our recommendations but has yet to provide any time frames. To further assist the department in strengthening its business systems modernization efforts, to facilitate congressional oversight, and promote departmental accountability, we are recommending that the department submit its enterprise architecture program management plan to defense congressional committees. In its written comments on a draft of this report, signed by the Deputy Under Secretary of Defense (Business Transformation) and reprinted in appendix III, the department stated that our findings are a fair representation of DOD's efforts to date, and while it does not agree with all of our points, it recognizes that even in areas of disagreement there is opportunity for dialog and learning. In this regard, the department provided additional comments in two areas. First, DOD recognized the importance of addressing our recommendations, and stated that it is important that we make our recommendations sufficiently specific to permit reasonable implementation and that we provide prompt feedback on whether DOD's implementation actions are in line with the recommendations. We agree and will continue to work proactively and constructively with the department to facilitate their implementation. Second, DOD stated that it partially agreed with the recommendation in the draft report, characterizing it as developing a departmentwide enterprise architecture program management plan to gain control of the department's IT environment. According to DOD, such a plan would far exceed the current scope of business systems modernization, and thus addressing it would require more time than our recommendation allowed. We agree that the business enterprise architecture should be departmentwide in scope and should allow the department to gain control of its business IT environment. However, the recommendation in our draft report was only aimed at developing an incremental plan that would show what missing scope and content would be added in each incremental version of the architecture and transition plan to eventually have an architecture and transition plan that addressed the full scope of the department's business IT environment and permitted such control to be gained. It was not intended to be interpreted as actually having this scope and content added to the transition plan in the time frame specified. To further ensure that our recommendation is properly interpreted and implemented, and to address DOD's concern about the time frame that we cited, we have slightly modified the recommendation. Background: DOD is a massive and complex organization. In fiscal year 2005, the department reported that its operations involved $1.3 trillion in assets and $1.9 trillion in liabilities; more than 2.9 million military and civilian personnel; and $635 billion in net cost of operations. For fiscal year 2006, the department received appropriations of about $403 billion.[Footnote 8] The department comprises a wide range of organizations, including the military services and their respective major commands and functional activities; numerous defense agencies and field activities; and various combatant and joint operational commands, which are responsible for military operations for specific geographic regions or theaters of operations. In support of its military operations, the department performs an assortment of interrelated and interdependent business functions, including logistics management, procurement, health care management, and financial management. DOD recently reported that, in order to support these business functions, it relies on 3,717 business systems. For fiscal year 2006, DOD received approximately $15.5 billion--and for fiscal year 2007, DOD has requested approximately $16 billion--in appropriated funds to operate, maintain, and modernize its business systems. As we have previously reported,[Footnote 9] DOD's systems environment is overly complex and error prone, and is characterized by (1) little standardization across the department; (2) multiple systems performing the same tasks; (3) the same data stored in multiple systems; and (4) the need for manual data entry into multiple systems. In addition, our reports[Footnote 10] have continually shown that the department's nonintegrated and duplicative systems contribute to fraud, waste, and abuse. Of the 25 areas on our governmentwide high-risk list, 8 are DOD program areas, and the department shares responsibility for 6 other governmentwide high-risk areas.[Footnote 11] DOD's business systems modernization is one of the high-risk areas, and it is an essential enabler to addressing many of the department's other high- risk areas. For example, modernized business systems are integral to the department's efforts to address its financial, supply chain, and information security management high-risk areas. Enterprise Architecture and Information Technology Investment Management Are Critical to Achieving Successful Systems Modernization: Effective use of an enterprise architecture, or a modernization blueprint, is a hallmark of successful public and private organizations. For more than a decade, we have promoted the use of architectures to guide and constrain systems modernization, recognizing them as a crucial means to this challenging goal: agency operational structures that are optimally defined in both the business and technological environments. Congress, the Office of Management and Budget (OMB), and the federal Chief Information Officer (CIO) Council have also recognized the importance of an architecture-centric approach to modernization. We, OMB, and the CIO Council have issued enterprise architecture guidance.[Footnote 12] The Clinger-Cohen Act of 1996[Footnote 13] mandates that an agency's CIO develop, maintain, and facilitate the implementation of an IT architecture. Further, the E- Government Act of 2002[Footnote 14] requires OMB to oversee the development of enterprise architectures within and across agencies. In addition, we and OMB have issued guidance that emphasizes the need for system investments to be consistent with these architectures.[Footnote 15] A corporate approach to IT investment management is also characteristic of successful public and private organizations. Recognizing this, Congress developed and enacted the Clinger-Cohen Act of 1996,[Footnote 16] which requires OMB to establish processes to analyze, track, and evaluate the risks and results of major capital investments in information systems made by executive agencies.[Footnote 17] In response to the Clinger-Cohen Act and other statutes, OMB has developed policy and issued guidance for planning, budgeting, acquisition, and management of federal capital assets.[Footnote 18] We have also issued guidance in this area,[Footnote 19] which defines institutional structures such as IRBs and associated processes, such as common investment criteria. Enterprise Architecture: A Brief Description: An enterprise architecture provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., a federal department) or a functional or mission area that cuts across more than one organization (e.g., financial management). This picture consists of snapshots of both the enterprise's current ("As Is") environment and its target ("To Be") environment. These snapshots consist of "views," which are one or more architecture products (e.g., models, diagrams, matrixes, and text) that provide logical or technical representations of the enterprise. The architecture also includes a transition or sequencing plan, which is based on an analysis of the gaps between the "As Is" and "To Be" environments; this plan provides a temporal roadmap for moving between the two environments, and incorporates such considerations as technology opportunities, marketplace trends, fiscal and budgetary constraints, institutional system development and acquisition capabilities, legacy and new system dependencies and life expectancies, and the projected value of competing investments. The suite of products produced for a given entity's enterprise architecture, including its structure and content, is largely governed by the framework used to develop the architecture. Since the 1980s, various architecture frameworks have been developed. Appendix IV discusses these various frameworks. The importance of developing, implementing, and maintaining an enterprise architecture is a basic tenet of both organizational transformation and systems modernization. Managed properly, an enterprise architecture can clarify and help optimize the interdependencies and relationships among an organization's business operations (and the underlying IT infrastructure and applications) that support these operations. To support effective architecture management in the federal government, we have issued architecture management guidance, as has the federal CIO Council and OMB.[Footnote 20] This guidance recognizes that when an enterprise architecture is employed in concert with other important management controls, such as portfolio- based capital planning and investment control practices, architectures can greatly increase the chances that an organization's operational and IT environments will be configured to optimize mission performance. Our experience with federal agencies has shown that investing in IT without defining these investments in the context of an architecture often results in systems that are duplicative, not well integrated, and unnecessarily costly to maintain and interface.[Footnote 21] IT Investment Management: A Brief Description: IT investment management is a process for linking IT investment decisions to an organization's strategic objectives and business plans. Generally, it includes structures (including decision-making bodies known as IRBs), processes for developing information on investments (such as costs and benefits), and practices to inform management decisions (such as whether a given investment is aligned with an enterprise architecture). The federal approach to IT investment management is based on establishing systematic processes for selecting, controlling, and evaluating investments that provides a systematic way for agencies to minimize risks while maximizing the returns of investments.[Footnote 22] * During the selection phase, the organization (1) identifies and analyzes each project's risks and returns before committing significant funds to any project and (2) selects those IT projects that will best support its mission needs. * During the control phase, the organization ensures that, as projects develop and investment expenditures continue, the project continues to meet mission needs at the expected levels of cost and risk. If the project is not meeting expectations or if problems arise, steps are quickly taken to address the deficiencies. * During the evaluation phase, actual versus expected results are compared once a project has been fully implemented. This is done to (1) assess the project's impact on mission performance, (2) identify any changes or modifications to the project that may be needed, and (3) revise the investment management process based on lessons learned. Consistent with our architecture management framework,[Footnote 23] our investment management framework[Footnote 24] recognizes the importance of an enterprise architecture as a critical frame of reference for organizations making IT investment decisions, stating that only investments that move the organization toward its target architecture- -as defined by its sequencing plan--should be approved, unless a waiver is provided or a decision is made to modify the architecture. Moreover, this framework states that an organization's policies and procedures should describe the relationship between its architecture and its investment decision-making authority. Our experience has shown that mature and effective management of IT investments can vastly improve government performance and accountability, help to avoid wasteful IT spending, and leverage opportunities to improve delivery of services to the public. DOD's Institutional Approach to Business Systems Modernization: DOD's institutional approach to managing its business systems modernization efforts has changed several times since 2001. Most recently, in 2005, the department reassigned responsibility for providing executive leadership for the direction, oversight, and execution of its business transformation and systems modernization efforts to several entities. These entities include the DBSMC, which serves as the highest ranking governance body for business systems modernization activities; the Principal Staff Assistants, who serve as the certification authorities for business system modernizations in their respective core business missions; the IRBs, which form the review and decisionmaking bodies for business system investments in their respective areas of responsibility; and the Business Transformation Agency (BTA),[Footnote 25] which leads and coordinates business transformation efforts across the department. Table 1 lists these entities and their roles and responsibilities. Table 1: Roles and Responsibilities of Governance Entities: Entity: Defense Business Systems Management Committee; Roles and responsibilities: * Provides strategic direction and plans for the business mission area in coordination with the warfighting and enterprise information environment mission areas; * Serves as approving authority for business system modernization; * Approves business mission area transformation plans and coordinates transition planning in a documented program baseline with critical success factors, milestones, metrics, deliverables, and periodic program reviews; * Establishes key metrics and targets by which to track business transformation progress; * Establishes policies and approves the business mission area strategic plan, the transition plan for implementation for business systems modernization, the transformation program baseline, and the business enterprise architecture; * Executes a comprehensive communications strategy; Membership: Chaired by the Deputy Secretary of Defense; Vice Chair is the Under Secretary of Defense for Acquisition, Technology, and Logistics. Includes senior leadership in the Office of the Secretary of Defense, the military services' secretaries, and defense agencies' heads, such as the Assistant Secretary of Defense (Networks and Information Integration)/ Chief Information Officer (ASD(NII)/CIO), the Vice Chairman of the Joint Chiefs of Staff, and the Commanders of the U.S. Transportation Command and Joint Forces Command. Entity: Principal Staff Assistants; Roles and responsibilities: * Support the DBSMC's management of enterprise business IT investments; * Serve as the certification authorities accountable for the obligation of funds for respective business system modernizations within designated core business missions.[A]; * Provide the DBSMC with recommendations for system investment approval; Membership: Officials who report directly to the Secretary or Deputy Secretary of Defense. These include the Under Secretaries of Defense; the Assistant Secretaries of Defense; the General Counsel of the Department of Defense; the Assistants to the Secretary of Defense; and the Directors of the Office of the Secretary of Defense. Entity: Investment Review Boards; Roles and responsibilities: * Serve as the oversight and investment decision-making bodies for those business capabilities that support activities under their designated areas of responsibility; * Assess investments relative to their impact on end-to-end business process improvements supporting warfighter needs; * Certify that all business systems investments costing more than $1 million are integrated and compliant with the business enterprise architecture; Membership: Includes the Deputy Secretary of Defense; the Under Secretary of Defense (Comptroller); Under Secretary of Defense for Acquisition, Technology, and Logistics; Assistant Secretary of Defense (Personnel and Readiness); ASD(NII)/CIO; military services; defense agencies; and combatant commands. Entity: Business Transformation Agency[B]; Roles and responsibilities: * Serves as the day-to-day management entity of the business transformation effort at the DOD enterprise level; * Provides support to the executive governance bodies; * Integrates the work of the Principal Staff Assistants in the areas of business process reengineering, core business mission activities, and IRB matters; Membership: Operates under the authority, direction, and control of the Under Secretary of Defense for Acquisition, Technology, and Logistics- -the vice chair of the DBSMC. The day-to-day direction, management, and oversight is provided cooperatively by the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management). Source: DOD. [A] The five core business missions are described in table 3. [B] The organizational structure of the agency is outlined in figure 1 and the roles and responsibilities of the agency divisions are described in table 2. [End of table] The BTA, established in 2005, is organized into eight divisions, one of which is the office of the Defense Business Systems Acquisition Executive--the component acquisition executive for DOD enterprise-level systems and initiatives.[Footnote 26] Figure 1 outlines the organizational structure of the agency and table 2 shows the roles and responsibilities of the agency divisions. Figure 1: Business Transformation Agency Organization: [See PDF for image] Source: DOD. [A] This role is temporarily filled by the Deputy Under Secretary of Defense for Business Transformation and the Deputy Under Secretary of Defense for Financial Management. [End of figure] Table 2: Business Transformation Agency Divisions: Office: Defense Business Systems Acquisition Executive; Description: * Develops, coordinates, and integrates projects, programs, systems, and initiatives that provide DOD enterprisewide business capabilities to the warfighter; * Exercises acquisition executive oversight for DOD enterprise-level business systems assigned by the DBSMC; * Serves as the milestone decision authority for specific programs as directed by the DBSMC, and as the DOD component acquisition executive for business systems; * Manages resources, including fiscal, personnel, and contracts for assigned systems and programs. Office: Enterprise Integration; Description: * Supports the integration of enterprise-level business capabilities; * Ensures adoption of DOD- wide information and process standards, as defined in the business enterprise architecture (BEA). Office: Transformation Planning and Performance; Description: * Maintains and updates the department's BEA and corresponding enterprise transition plan; * Monitors the performance of enterprise programs and initiatives by ensuring that they meet the milestones documented in the enterprise transition plan; * Includes the Milestone Assurance Team, which monitors the performance of enterprise-level programs and initiatives. Office: Transformation Priorities and Requirements; Description: * Serves as the primary link to the Principal Staff Assistants within the Office of the Secretary of Defense as well as other DOD-level organizations including the US Transportation Command, the Defense Logistics Agency, and the Defense Finance and Accounting Service; * Ensures that the functional priorities and requirements of these organizations are reflected in both the BEA and the enterprise transition plan, as well as in the guidance for business systems investment management; * Comprises a mix of senior leaders from both government and industry that have experience in business processes and systems technology. Office: Investment Management; Description: * Provides leadership in investment management for DOD enterprise-level business systems; * Supports and coordinates IRB processes and actions for certification; * Reports on IRB certification status in congressional reports and DBSMC meetings; * Updates and defines IRB data elements in the DOD Information Technology Portfolio Repository and conducts the systems inventory for OMB. Office: Warfighter Support Office; Description: * Identifies enterprise-level business issues that directly impact the warfighter and works to resolve these issues via systems capability and process improvements; * Engages with joint staff and combatant commands to identify and communicate requirements to the agency; * Monitors business process and system improvement initiatives sponsored by the agency and ensures their progress in accordance with performance objectives. Office: Information and Federation Strategy; Description: * Manages the information strategy, which encompasses integration efforts, strategic planning, change management, and long-term internal and external communications; * Ensures that integrated best industry practices are applied to all areas of strategic planning and communications for the agency. Office: Agency Operations; Description: * Provides centralized support across the agency, such as administrative services, personnel and staffing, contracting, budget, IT, security, and training; * Supports the monthly DBSMC meetings; * Coordinates with external stakeholders; * Establishes and maintains a central repository for records, deliverables, and policies for the agency. Source: DOD. [End of table] DOD's Business Enterprise Architecture: A Brief Description: In 2005, DOD adopted a 6-month incremental approach to developing its enterprise architecture as either a major release or a minor release.[Footnote 27] DOD released version 3.0 of the business enterprise architecture on September 28, 2005, describing it as the initial baseline. According to DOD, this version was intended to provide a blueprint to help ensure near-term delivery of the right capabilities, resources, and materiel to the warfighter. To do so, this version focused on six business enterprise priorities--which DOD states are short-term objectives to achieve immediate results, within DOD's five core business missions--to be addressed through identification of corporate business needs and analysis of capability gaps (see table 3). The core business missions transcend DOD's various functional areas (e.g., planning, budgeting, IT, procurement, and maintenance) and are intended to be the means through which end-to-end warfighter support is delivered. Responsibility for the core business missions is assigned to specific Principal Staff Assistants. Table 3: Core Business Missions and Associated Principal Staff Assistants: DOD core business mission: Human Resources Management; Description: This mission includes all human resources-related processes necessary to recruit, train, and prepare personnel for warfighter organizations. It also includes providing trained, healthy, and ready personnel to combatant and combat support organizations, and ensures timely and accurate access to compensation and benefits for all DOD personnel; Principal Staff Assistants: Under Secretary of Defense (Personnel and Readiness). DOD core business mission: Weapon System Lifecycle Management; Description: This mission includes full life-cycle management of defense acquisition of weapons systems and automated information systems, including requirements, technology, development, production, and sustainment; Principal Staff Assistants: Under Secretary of Defense for Acquisition, Technology, and Logistics. DOD core business mission: Materiel Supply and Service Management; Description: This mission includes the management of supply chains of materiel supply and services to maintain the readiness of non-deployed and deployed warfighters to support operations. It also includes all aspects associated with acquiring, storing, and transporting all classes of supplies; Principal Staff Assistants: Under Secretary of Defense for Acquisition, Technology, and Logistics. DOD core business mission: Real Property and Installations Lifecycle Management; Description: This mission includes the provision of installations and facilities to house military forces, to store and maintain military equipment, and to serve as training and deployment platforms for dispatching warfighter units; Principal Staff Assistants: Under Secretary of Defense for Acquisition, Technology, and Logistics. DOD core business mission: Financial Management; Description: This mission includes the provision of accurate and reliable financial information in support of the planning, programming, budgeting, and execution process to ensure adequate financial resources for warfighting mission requirements. It also includes providing information to reliably cost the conduct, output, and performance of DOD operations and missions, and the programs to support them; Principal Staff Assistants: Under Secretary of Defense (Comptroller). Source: DOD. [End of table] Table 4 provides descriptions of the business enterprise priorities. According to the department, these business enterprise priorities will evolve and expand in future versions of the architecture. Table 4: Business Enterprise Priorities: Business Enterprise Priority: Personnel Visibility; Description: Providing access to reliable, timely, and accurate personnel information for warfighter mission planning. Business Enterprise Priority: Acquisition Visibility; Description: Providing transparency and access to acquisition information that is critical to supporting life-cycle management of the department's processes for delivering weapons systems and automated information systems. Business Enterprise Priority: Common Supplier Engagement; Description: Aligning and integrating policies, processes, data, technology, and people to simplify and standardize the methods that DOD uses to interact with commercial and government suppliers. Business Enterprise Priority: Materiel Visibility; Description: Improving supply chain performance. Business Enterprise Priority: Real Property Accountability; Description: Acquiring access to real-time information on DOD real property assets. Business Enterprise Priority: Financial Visibility; Description: Providing immediate access to accurate and reliable financial information that will enhance efficient and effective decision making. Source: DOD. [End of table] In addition to focusing the scope of version 3.0 of the architecture on these priorities within the five core business missions, the extent to which each priority was to be addressed, according to DOD, was limited to answering four key groups of questions: * Who are our people, what are their skills, and where are they located? * Who are our industry partners, and what is the state of our relationship with them? * What assets are we providing to support the warfighter, and where are these assets deployed? * How are we investing our funds to best enable the warfighting mission? To produce a version of the architecture within this scope, DOD created 12 of the 26 recommended products included in the DOD Architecture Framework--the structural guide that the department has established for developing an architecture[Footnote 28]--including 7 products that the framework designates as "essential." For example, one essential product is the Operational Node Connectivity Description--a graphic showing "operational nodes" (organizations), including a depiction of each node's information exchange needs. On March 15, 2006, DOD released version 3.1 of the business enterprise architecture. According to program officials and our review of program documentation, version 3.1 is a minor release and--similar to version 3.0--addresses enterprise-level business and strategic plans, goals, objectives, and strategies. Program officials also noted that version 3.1 continues to be an outcome-based architecture that is focused on six business enterprise priorities within DOD's five core business missions, and that this version was developed following the same methodology and architectural framework as version 3.0. Program officials stated that the next release (version 4.0) will be similar to version 3.1, because it will also be a minor release. Fiscal Year 2005 National Defense Authorization Act Requirements: Congress included six provisions in the Act[Footnote 29] that are aimed at ensuring DOD's development of a well-defined business enterprise architecture and associated enterprise transition plan, as well as the establishment and implementation of effective investment management structures and processes. The requirements are as follows: (1) Develop a business enterprise architecture that: * includes an information infrastructure that, at a minimum, would enable DOD to: - comply with all federal accounting, financial management, and reporting requirements; - routinely produce timely, accurate, and reliable financial information for management purposes; - integrate budget, accounting, and program information and systems; and: - provide for the systematic measurement of performance, including the ability to produce timely, relevant, and reliable cost information; - includes policies, procedures, data standards, and system interface requirements that are to be applied uniformly throughout the department; and: - is consistent with OMB policies and procedures. (2) Develop a transition plan for implementing the architecture that includes: * an acquisition strategy for new systems needed to complete the enterprise architecture; * a list and schedule of legacy business systems to be terminated; * a list and strategy of modifications to legacy business systems; and: * time-phased milestones, performance metrics, and a statement of financial and non-financial resource needs. (3) Identify each business system proposed for funding in DOD's fiscal year budget submissions and include: * information on each business system proposed for funding in that budget; * funds for current services and for business systems modernization; and: * the designated approval authority for each business system. (4) Delegate the responsibility for business systems to designated approval authorities within the Office of the Secretary of Defense. (5) Require each approval authority to establish investment review structures and processes, including a hierarchy of IRBs--each with appropriate representation from across the department. The review process must cover: * review and approval of each business system by an IRB before funds are obligated; * at least an annual review of every business system investment; * use of threshold criteria to ensure an appropriate level of review and accountability; * use of procedures for making architecture compliance certifications; * use of procedures consistent with DOD guidance; and: * incorporation of common decision criteria. (6) Effective October 1, 2005, DOD may not obligate appropriated funds for a defense business system modernization with a total cost of more than $1 million unless the approval authority certifies that the business system modernization: * complies with the business enterprise architecture; * is necessary to achieve a critical national security capability or address a critical requirement in an area such as safety or security; or: * is necessary to prevent a significant adverse effect on an essential project in consideration of alternative solutions, and the certification is approved by the DBSMC. Recent Review Indicates DOD Has Begun to Address Long-standing Weaknesses in Institutional Approach to Business Systems Modernization: Between May 2001 and July 2005, we have reported on DOD's efforts to develop an architecture and to establish and implement effective investment management structures and processes.[Footnote 30] These reports identified serious problems and concerns about the department's architecture program, the quality of the architecture and the transition plan, and the lack of an investment management structure and controls to implement the architecture. To address these concerns, we made 34 recommendations to ensure that the architecture was well- defined, managed, and implemented. In response to our recommendations and requirements in the Act and as described in the previous section, in 2005 DOD fundamentally changed its institutional approach to architecture development, management, and implementation. Consistent with our recommendations, DOD has also adopted an incremental approach to developing a purpose-driven and standards-based enterprise architecture, and it has established a tiered accountability structure through a hierarchy of investment oversight and decision-making entities for reviewing and approving business system investments. In November 2005,[Footnote 31] we reviewed DOD's efforts to satisfy the six requirements cited in the Act. In our report and in testimony,[Footnote 32] we stated that DOD had partially satisfied the four legislative requirements relating to architecture development, transition plan development, budgetary disclosure, and investment review; it had satisfied the provision concerning designated approval authorities; and it was in the process of satisfying the provision for certification and approval of modernizations costing in excess of $1 million. We concluded that the department had made important progress in establishing the kind of fundamental management structures and processes that are needed to correct the long-standing and pervasive IT management weaknesses that have led to our designation of DOD business systems modernization as a high-risk program, and that this progress provided a foundation on which to build. However, we also concluded that much more remained to be accomplished to fully satisfy the Act's requirements and address the department's IT management weaknesses, particularly with regard to sufficiently developing the enterprise architecture and transition plan and ensuring that investment review and approval processes are institutionally implemented. DOD Is Taking Steps to Address Act's Requirements and Improve Approach to Modernizing Business Systems: DOD continues to take incremental steps to comply with the remaining five requirements of the Act and improve its business systems modernization approach. On March 15, 2006, DOD released a minor update to its business enterprise architecture (version 3.1), developed an updated enterprise transition plan, and issued its annual report to Congress describing steps taken and planned relative to the Act's requirements, among other things. These steps address several of the missing elements we previously identified relative to the legislative provisions concerning the architecture, transition plan, budgetary disclosure, investment review, and the reviews of systems costing in excess of $1 million. DOD officials told us that additional steps are intended to fully implement the Act's requirements and address our prior concerns. According to program officials, this continued progress is a reflection of DOD leadership's commitment to effective business systems modernization. While this progress better positions the department to address the business systems modernization high-risk area, sustained leadership is essential to further improve its modernization approach, fully address the Act's requirements, and ultimately acquire and implement modernized business systems. DOD Continues to Address Limitations in Prior Version of Architecture: Version 3.1 of the business enterprise architecture, according to DOD's most recent annual report to Congress, resolves several of the architecture gaps identified in the prior version and introduces several other minor improvements, but it does not include major content changes. This version reflects steps taken by DOD to address some of the missing elements, inconsistencies, and usability issues that we identified in our prior report[Footnote 33] related to the Act's requirements and related architecture guidance. According to DOD officials, they are committed to incrementally evolving the architecture's scope, content, internal alignment, and usability. Until they do, however, the architecture's utility will be limited. With regard to complying with federal accounting, financial management, and reporting requirements, the architecture has much of the information needed to achieve compliance with the Department of the Treasury's United States Standard General Ledger,[Footnote 34] such as the data elements or attributes that are needed to facilitate information sharing and reconciliation with the Treasury. In addition, the SFIS,[Footnote 35] which includes a standard accounting classification structure, can allow DOD to standardize financial data elements necessary to support budgeting, accounting, cost management, and external reporting; it also incorporates many of the Standard General Ledger's attributes. Further, version 3.1 provides new business rules for intra-governmental transactions[Footnote 36] that can be automated to enforce compliance with federal accounting, financial management, and reporting requirements. For example, version 3.1 includes the intra-governmental transactions business rule "ENT_Available_Reimbursable_Authority"[Footnote 37] to enforce compliance with a Generally Accepted Accounting Principle standard that funds to be paid can be received. Business rules are important because they explicitly translate important business policies and procedures into specific, unambiguous rules that govern what can and cannot be done. However, version 3.1 does not yet address the locations where specified activities are to occur and where the systems are to be located. Program officials agreed; however, they stated that the architecture is not intended to include this level of detail because it is capabilities- based rather than solutions-based, and they said that this information will be contained either within the department's Global Information Grid[Footnote 38] or in individual systems' program documentation. As previously reported,[Footnote 39] we do not agree that information pertaining to locations is only germane to the solutions-based architectures, and the explicit linkage between the business enterprise architecture and Global Information Grid is not apparent. The identification of operationally significant and strategic business locations, as well as the need for a business logistics model, is a generally accepted best practice for defining the business operations of an architecture.[Footnote 40] This is because the cost and performance of implemented business operations and technology solutions are affected by the location and therefore need to be examined, assessed, and decided on in an enterprise context rather than in a piecemeal, systems-specific fashion. In addition, the architecture does not provide for compliance with all federal accounting, financial, and reporting requirements. For example, it does not apply the concept of tiered accountability to identify which laws, policies, and regulations are relevant at the enterprise level. Until it does, the department cannot effectively identify overlaps in IT spending by the components[Footnote 41] and programs for common functions or enterprise requirements. In addition, some business rules are at inconsistent levels of detail within the architecture. For example, some business rules are defined in high-level conceptual terms (e.g., "ENT_Cost_Reporting") while others are defined more specifically at an operational level (e.g., "ENT_DOD_Obligations_Against"). Until standard enterprise-level operational rules are defined and developed, DOD components will continue to implement operational procedures that are inconsistent because they are based on their own unique interpretations of the laws, policies, and regulations. With regard to timely, accurate, and reliable financial information for management purposes, we reported in November 2005[Footnote 42] that SFIS had not been completed or implemented and that the architecture had yet to include standard definitions of key terms in the architecture--such as all enterprise-level terms. Since then, the department has completed phase I of the SFIS initiative, which is focused on standardizing general ledger and external financial reporting requirements, and has incorporated associated definitions in the architecture. In addition, the department continues to evolve the integrated dictionary and include definitions and descriptions of many terms used in the architecture. For example, the integrated dictionary in version 3.1 includes a business enterprise priority dictionary from which it is easy to find descriptions of business priorities such as "acquisition visibility," "common supplier engagement," and "financial visibility." Further, version 3.1 provides additional compliance based on modifications to intra-governmental transaction concepts (e.g., a standard capability for creating and routing requisitions, purchase orders, billings, payments, and collections) to provide enhanced visibility to buying and selling transactions between entities of the federal government. This enhanced visibility facilitates easy access to information about intra-governmental transactions, thereby supporting the requirement to routinely produce timely information. However, additional SFIS definition efforts remain under way, and the department plans to further define key data elements and attributes that are not yet in the architecture. For example, according to program officials, data elements--such as those relating to the planning, programming, and budgeting business process area--have yet to be defined. According to DOD, these data elements will be in the next version of the architecture. Further, although the integrated dictionary contains definitions of many terms (e.g., business capabilities, data objects, and system functions), it has yet to contain definitions of key accounting and budget terms such as "balance forwarded" and "receipt balances" that are used in the description of the data object termed "Receipt Account Trial Balance and Ledgers." According to DOD's architecture framework, the integrated dictionary should enable the set of architecture products to stand alone, allowing them to be read and understood with minimum reference to outside resources. Program officials agreed and stated that both the SFIS and the integrated dictionary will evolve and be incorporated into future releases. Moreover, version 3.1 does not identify and explicitly define all business rules that would enable the financial information to be verified and validated on the basis of timeliness, accuracy, and reliability. For example, although a United States Standard General Ledger transaction library[Footnote 43] was developed, its use as a business rule in a business process model--or an enabler to an operational activity to verify and validate the accuracy of transaction postings (or the relationships among transactions)--is not explicitly defined and identified in version 3.1. In addition, architectural elements that are identified and intended to address this requirement are not always well defined. For example, "review and certify financial statement" is identified as a process in the integrated dictionary, but depicted as an operational event in the process labeled "perform financial reporting" in the operational event-trace description product, which indicates when activities are to occur within operational processes. In addition, "perform financial reporting" is identified as both an event and a process in the integrated dictionary. Beyond these definitional ambiguities, identified business rules are not always allocated to specific systems in the architecture. For example, business rules are not allocated to the Business Enterprise Information Services--an enterprise-level automated reporting system intended to provide timely, accurate, and reliable business information across the department to support auditable financial statements and provide detailed financial information visibility for management in support of the warfighter; and to integrate budget, accounting, and program information that is widely dispersed among systems and organizations across the department. Such limitations constrain the utility and effectiveness of the architecture in guiding and constraining system development. With regard to the integration of budgeting, accounting, and programming information and systems, we reported in November 2005[Footnote 44] that the architecture did not include certain elements--such as a fully defined and implemented SFIS--and all systems needed to achieve integration. According to DOD, version 3.1 incorporates 59 SFIS phase 1 data elements and 109 business rules. In addition, this version provides content relevant to the integration of intra-governmental transaction functionality for reimbursable orders, which is important in addressing the financial visibility and common supplier engagement business enterprise priorities. This functional integration can lead to the simplification of system and data integration. Nevertheless, version 3.1 does not specify all systems needed to achieve integration, as evidenced by instances in which the architecture provides "placeholders" or generic references for yet-to- be-defined systems (e.g., Financial Management System Entity). Program officials agreed and stated that these systems would be added as solutions are defined to address identified capability gaps. In addition, although version 3.1 includes separate entity relationship diagrams for the accounting, budget, and cost functional areas, it does not describe the relationships of entities across the planning, programming, budgeting, and execution process. According to the architecture's overview and summary information, this overall business process has yet to be fully developed, including definition around the interdependencies that currently exist in the "As Is" planning, programming, budgeting, and execution process. As a result, the architecture does not yet support effective development of planning, programming, budgeting, and execution systems. With respect to the systematic measurement of performance--including the ability to produce timely, relevant, and reliable cost information- -version 3.1 adds features linking the architecture business capabilities to systems and initiatives in the transition plan. For example, the architecture indicates that the business capability termed "financial reporting" will be enabled by the Business Enterprise Information Services system. These linkages provide an alignment of system investments with the architecture and thus can be used to establish business performance measures for system investments. In addition, the department has developed an initial baseline of capability metrics in the updated transition plan, which according to program officials will be used to measure progress towards achieving capability outcomes. However, version 3.1 still does not provide for the systematic measurement of performance (i.e., the means by which the department can measure the intended mission value to be delivered by the portfolio of programs in the architecture). The architecture also does not include standard methods to collect and evaluate performance data and SFIS data elements that support systematic measurement of performance have yet to be developed. Program officials acknowledged this missing content and stated that they plan to include measurements and targets in future releases. In addition, version 3.1 does not describe business performance shortfalls to be addressed based on a capability gap analysis between the "As Is" and the "To Be" environments. Program officials stated that such performance shortfalls, such as the inability to properly eliminate intra-governmental transactions, are being identified through a variety of sources (e.g., Inspector General and DOD Performance and Accountability reports along with our own reports). However, they agreed that there is a need to synthesize and prioritize these inputs so that a better understanding can be obtained on the performance shortfalls that have to be addressed through the "To Be" solutions. With respect to policies, procedures, data standards, and system interface requirements, version 3.1 requires that SFIS be established as an enterprisewide data standard for categorizing financial information along several dimensions (e.g., appropriation account, budget program, organizational, transactional, trading partner, and cost accounting) to support financial management and reporting functions. Further, version 3.1 adds greater definition on standard processes, rules, and data for intra-governmental ordering and billing. However, as stated earlier, SFIS data elements have not been completely defined and continue to evolve. In addition, the architecture has yet to include a systems standards profile to facilitate data sharing among departmentwide business systems and interoperability with departmentwide IT infrastructure systems. Program officials acknowledged that the architecture does not include a systems standards profile and stated that they are working with the Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer (ASD(NII)/CIO) to address this in future versions. With regard to OMB policies and procedures, similar to version 3.0, the latest version does not include a depiction of the "As Is" architecture, which is essential to performing a gap analysis to identify capability and system performance shortfalls that the transition plan is to address. Also, it does not include either an "As Is" or "To Be" depiction of all business processes, such as key aspects of the planning, programming, budgeting, and execution processes; the technology infrastructure; and security architecture. In response, program officials stated that "As Is" environment analyses and definitions have occurred and are planned on in an "as needed" and "just enough" basis. For example, they described "As Is" analysis and definition that has occurred at the system level for several of the enterprise-level systems (e.g., DOD Real Property Information Systems), and work under way to further understand the interdependencies that exist in the current planning, programming, budgeting, and execution business process as an essential part of developing the "To Be" description of this process. While the "As Is" description is not included in versions 3.0 and 3.1, according to a program official, the "As Is" work is in fact now being used to perform a business capability gap analysis and guide transformation based on the current set of priorities. In our view, the issue is not whether each architecture release includes all of the elements of an "As Is" environment, but that the releases disclose at a minimum the "As Is" analyses that have and that have not been performed. It is also in our view that DOD should describe in the architecture releases the importance or irrelevance of "As Is" analyses to the systems and initiatives in the enterprise transition plan and the operational activities and business processes in the target architecture. In addition to these areas, version 3.1 has also yet to address other limitations we previously reported. Specifically: * Version 3.1 products are not yet fully integrated. For example, the operational event-trace description product--which indicates when activities are to occur within operational processes--is decomposed to a greater level of detail than the corresponding operational activity model, which shows the operational activities (or tasks) that are to occur and the input and output process flows among these activities. Program officials acknowledged this and stated that they are working to improve the operational activity models for several business enterprise priorities (e.g., Personnel Visibility and Financial Visibility). In particular, the updated transition plan identifies business capability outcome metrics for additional operational activities, such as "Manage Vacancy Recruiting." * Version 3.1 is not yet adequately linked to the component architectures and transition plans, which is particularly important given the department's federated approach to developing and implementing the architecture. As we previously reported, a federated architecture is composed of a set of coherent but distinct entity architectures. The members of the federation collaborate to develop an integrated enterprise architecture that conforms to the enterprise view and to the overarching rules of the federation. In its March 15, 2006, report to Congress, the department stated that integration will be an ongoing goal. To accomplish this goal, program officials told us that a federation strategy is being developed and will be implemented in future versions of the architecture and transition plan. However, they did not have an enterprise architecture development management plan containing this strategy. As we previously reported, the department has taken a 6-month incremental approach to developing the business enterprise architecture and meeting the Act's requirements. DOD officials told us that, as a minor release, version 3.1 was not intended to include new priorities or capabilities; but instead was intended to provide extension and "clean up" of the preceding release. They further stated that this approach of developing minor releases provides the department the means by which to balance architecture maintenance and implementation. We support DOD taking an incremental approach to developing the business enterprise architecture, recognizing that adopting such an approach is a best practice that we have advocated. In addition, we believe that version 3.1 provides an improved foundation on which to continue to build a more complete architecture. However, although the department agreed to develop a near-term plan it has not yet developed or established milestones for developing a near- or a long-term plan that will provide details on what will be included in these incremental architecture developments and what will not be included, with particular emphasis and clarity around the near-term increments. Without such a plan, the department is less likely to accomplish intended improvements. In addition, once the missing scope, content, and related shortcomings described is added, the architecture will be a more sufficient frame of reference to optimally guide and constrain DOD-wide system investment decision making. DOD Has Made and Intends to Make More Improvements to Transition Plan: According to the department's most recent annual report to Congress, the March 15, 2006, version of its enterprise transition plan provides information on progress on major investments over the last 6 months-- including key accomplishments and milestones attained, as well as new information on near-term activities (i.e., within the next 6 months) at both the enterprise and component levels. DOD also reports that this latest version of the transition plan indicates which of the limitations and gaps that we identified in the earlier plan have been addressed. DOD has taken a number of steps to improve its enterprise transition plan and address some of the missing elements that we previously identified[Footnote 45] relative to the Act's requirements and related transition planning guidance. With respect to the development of an acquisition strategy, the March 2006 transition plan refines and updates the September 2005 transition plan. As we previously reported, the September 2005 transition plan was largely based on a bottom-up planning process in which ongoing programs were examined and categorized in the plan around business enterprise priorities and capabilities, including a determination as to which programs would be designated and managed as DOD-wide programs versus component programs. To improve on this plan, the department defines an initiative that is based on shortfalls of current business capabilities. For example, version 3.1 of the architecture includes an initiative--referred to as the intra-governmental transactions initiative--that was based on a current "As Is" business capability shortfall relative to DOD's ability to properly eliminate intra- governmental transactions. This shortfall was highlighted as a material weakness in DOD's Fiscal Year 2005 Performance and Accountability Report. DOD continues to validate the inventory of ongoing IT investments that formed the basis for the prior version of the transition plan. Specifically, DOD intends future updates to the plan to continue to introduce the results of ongoing and planned analyses of gaps between its "As Is" and "To Be" architectural environments, in which capability and performance shortfalls are described and investments (such as transformation initiatives and systems) that are to address these shortfalls are clearly identified. In fact, DOD officials stated that they anticipate the scope and funding of some on-going programs in the plan--such as the Defense Integrated Military Human Resources System and the intra-governmental transactions initiative--to be revised to align them to achieve a desired business capability. Program officials stated that this evolution of the plan will be driven by (1) identifying gaps between the architecture requirements and currently planned program activities and (2) planning new systems and initiatives to address gaps identified in priorities, capabilities, and existing program activities. In particular, DOD plans to identify gaps (i.e., shortfalls) in the performance of its business capabilities in the next version of the architecture and, as transformation efforts mature, DOD will introduce a more top-down, capability-based approach. With respect to the identification of legacy systems that will and will not be part of the "To Be" architectural environment, including modifications to these systems, the prior plan identified some, but not all, of these systems. To address this limitation, the current plan identifies a number of additional legacy systems that will be terminated and thus will not be part of the target environment. For example, the plan now includes a number of recently determined termination dates for systems such as the Cash Reconciliation System, Financial Reporting System, and Navy Prompt Payment Interest. Furthermore, in its annual report to Congress, DOD noted that the military services collectively have identified over 290 legacy systems for elimination. DOD also indicated that this number is expected to change over time as more systems come in for certification and enterprise solutions are identified and refined. Moreover, the plan now reflects legacy systems identified to date for enterprise and component priorities and, according to officials, the list will continue to evolve as investment decisions are made via the tiered accountability investment review structure. For example, the Air Force has reassessed the systems migrating to the target Expeditionary Combat Support System, and this is reported in the March 2006 plan. Program officials noted that this number will fluctuate as the scope of the Expeditionary Combat Support System changes. The March 2006 transition plan, however, does not yet include a number of the elements we have previously identified. * It does not include a complete listing of the legacy systems that will not be part of the target architecture. In particular, the termination dates for many legacy systems remain unknown, making it unclear whether or not they will be part of the target environment. For example, the plan does not provide specific dates for terminating legacy systems such as the Personnel Records Management System, Defense Departmental Reporting System, and Base Accounts Receivable System. * The plan does not include system and budget information for 13 of its 15 defense agencies[Footnote 46] and for 8 of its 9 combatant commands.[Footnote 47] Program officials told us that information for these defense agencies and combatant commands is not included because, similar to the September plan, it was focused on the largest business- focused organizations in DOD, which they defined as those meeting tier 1 and tier 2 IRB certification criteria.[Footnote 48] According to the officials, the majority of these organizations do not have investments that meet the threshold criteria. Nevertheless, they appended that additional components will be added as appropriate when they have large business system investments planned. They also stated that the Defense Information Systems Agency's IT infrastructure investments will not be reflected in the enterprise transition plan because the capabilities that these investments are intended to deliver are reflected in the Global Information Grid rather than in the business enterprise architecture. As we previously reported,[Footnote 49] exclusion of Defense Information Systems Agency investments is particularly limiting, given that this agency and its investments provide the infrastructure services that business systems depend on to operate. Without including information on the timing and content of these investments, the critical relationship between infrastructure and systems becomes blurred in many ways. For example, it becomes unclear whether a new business system will be able to reuse existing infrastructure components or services--thereby leveraging established capabilities--or whether it will have to introduce duplicative capabilities as part of the business system investment. * The plan does not include a complete listing of the legacy systems that will be part of the target architecture, nor does it include explicit strategies for modifying those legacy systems identified in the plan's system migration diagrams. In particular, the plan identifies those legacy systems for which some of its functionality will be migrated; however, it does not indicate whether or not these systems will still be operational in the "To Be" environment or will eventually be terminated. For example, although the plan identifies the Cargo Movement Operations System as one where the functionality will only be partially migrated, neither the plan nor version 3.1 of the architecture indicate whether this system will continue to be a part of the target environment. With respect to milestones, performance metrics, and resource needs, the plan identifies incremental milestones and resource needs for major investments and performance metrics for certain investments. The plan also identifies progress against program milestones that were depicted in the September 2005 plan. For example, in an effort to improve visibility into personnel activities, DOD reported that, for the Defense Civilian Personnel Data System, it met the milestone to deploy a data warehouse capability to facilitate data sharing. It also reported that, for this system, it has set a September 2008 milestone for developing an implementation strategy for integrating modules supporting functionality that is currently provided by stand-alone applications. However, it does not include other important information needed to understand the sequencing of these business investments. In particular, it does not include such information as organizational, process, and technology improvements required to achieve identified milestones. In addition, if an investment is dependent on Net-Centric Enterprise Services (NCES)[Footnote 50] for its core services, it should include the above information in establishing its deployment milestone and detail any issue associated with the incremental deployment of the NCES program. Beyond these areas, the March 2006 plan has yet to completely define specific business capabilities that are needed to support the business enterprise priorities. For example, according to DOD, the Materiel Visibility business enterprise priority requires additional capabilities related to the supply chain planning process, but neither these capabilities nor associated investments were in the plan. Program officials agreed and stated that future versions of the architecture and the transition plan will address the supply chain planning process, as well as other yet-to-be-identified process requirements (i.e., capability gaps). As we previously reported, the department is taking an incremental approach to developing its enterprise transition plan. In doing so, the department's latest plan improves on the prior plan, and program officials stated that many of the missing elements that we identified will be included in future iterations of the plan. This incremental approach is both a best practice and is consistent with our previous recommendation. However, the latest plan is still missing important content and the department has yet to develop or establish milestones for developing a near-or a long-term plan that will provide details on what will be included in each incremental iteration of the enterprise transition plan, with particular emphasis and clarity focused on the near-term increments. Without such a plan, the department is less likely to accomplish intended improvements. A transition plan is to be an acquisition strategy that recognizes timing and technological dependencies among planned systems investments, as well as other considerations, such as market trends and return on investment. The plan should enable the department to affirm that the set of programs in the plan are the appropriate ones to fill the gap between where it is now architecturally and where it wants to be. In addition, the plan should not only define schedule milestones but also include commitments for system capabilities and associated outcomes. Once missing content is added and all planned investments are validated by capability gap analyses, the department will be better positioned to sequentially manage the migration and disposition of existing business processes and systems--and the introduction of new ones. DOD Is Addressing Issues Related to Reporting Business Systems: DOD has taken steps to meet the Act's requirements[Footnote 51] relative to the identification of all business systems in its IT budget request. In particular, program officials told us that the DOD Information Technology Portfolio Repository (DITPR) has been established as the authoritative repository for certain information about DOD's systems, such as system names and the responsible DOD components. Further, this repository is being expanded to contain information required for the certification, approval, and annual reviews of these business system investments. To ensure consistency of DOD's fiscal year 2007 IT budget submission with this authoritative inventory, DOD has reconciled (and intends to continue reconciling) DITPR with the database that it uses to prepare its IT budget submissions, referred to as Select and Native Programming Data System- Information Technology (SNAP-IT). According to program and military service officials, DOD is taking steps to ensure that each system investment is entered in DITPR and SNAP-IT, as appropriate, and it is continually reconciling the information between the two to ensure consistency. To further improve the completeness and reliability of the fiscal year 2007 IT budget request, program officials told us that business system investments greater than $1 million were broken out individually, but that more needs to be done before smaller systems--those with modernization funding less than $1 million over the future years' defense program (fiscal years 2006-2011)--are individually visible in the budget. DOD's steps should help ensure the completeness and reliability of its IT budget submissions, and increase compliance with the Act's requirements relative to DOD's IT budgetary disclosure. DOD Has Efforts Under Way to Control its Business System Investments: The Act specifies two basic requirements, effective October 1, 2005, for obligation of funds for business system modernizations costing more than $1 million. First, it requires that these modernizations be certified by a designated "approval authority"[Footnote 52] as meeting specific criteria.[Footnote 53] Second, it requires that the DBSMC approve each certification. The Act also states that failure to do so before the obligation of funds for any such modernization constitutes a violation of the Anti-deficiency Act.[Footnote 54] In this regard, the department reported in September 2005 that the DBSMC had approved 166 business system modernizations, and in March 2006 that an additional 60 business systems were approved by the DBSMC. According to DOD, these 226 business systems represent about $3.6 billion in modernization investment funding. A key element of the department's approach to reviewing and approving business systems investments is the use of what it refers to as "tiered accountability." DOD's tiered accountability approach involves an investment control process that begins at the component level and works its way through a hierarchy of review and approval authorities, depending on the size and significance of the investment. In our discussions with Army, Navy, and Air Force officials, they emphasized that the success of the process depends on them to perform a thorough analysis of each business system before it is submitted for higher- level review and approval. According to the department's March 2006 report, the investment review and approval process has identified over 290 systems for phase-out/ elimination. Furthermore, in January 2006, the department eliminated further development of the Forward Compatible Payroll System (FCP). According to the department's fiscal year 2007 budget request selected capital investment report, FCP was intended to address the military pay problems that are generated by the existing obsolete military pay system. However, in reviewing the program status, it was determined that FCP would duplicate the functionality contained in the Defense Integrated Military Human Resources System. Therefore, it was unnecessary to continue investing in two military payroll systems. According to the department's fiscal year 2007 IT budget request, approximately $33 million was sought for fiscal year 2007 and about $31 million was estimated for fiscal year 2008 for FCP. Eliminating this duplicative system will enable DOD to use this funding for other priorities. The funding of multiple systems that perform the same function is one reason the department has thousands of business systems. Identifying and eliminating duplicative systems helps optimize mission performance and accountability and supports the department's transformation goals. The department's March 2006 report to congressional defense committees also notes that the investment review process has identified approximately 40 business systems for which the requested funding was reduced and the funding availability periods were shortened to less than the number of years requested. Based on information provided by the BTA program officials, there was a reduction of funding and the number of years that funding will be available for 14 Army business systems, 8 Air Force business systems, and 8 Navy business systems. More specifically, the Army's Future Combat Systems Advanced Collaborative Environment program requested funding of $100 million for fiscal years 2006 to 2011, but the amount approved was reduced to approximately $51 million for fiscal years 2006 to 2008. Similarly, Navy's Military Sealift Command Human Resources Management System requested funding of about $19 million for fiscal years 2006 to 2011, but the amount approved was approximately $2 million for the first 6 months of fiscal year 2006. According to Navy officials, this system initiative will be reviewed to ascertain whether it has some of the same functionality as the Defense Civilian Personnel Data System. Funding system initiatives for shorter time periods can help reduce the financial risk by providing additional opportunities for monitoring a project's progress against established milestones and help ensure that the investment is properly aligned with the architecture and the department's overall goals and objectives. Besides limiting funding as part of the investment review and approval process, this process is also resulting in conditions being place on system investments. These conditions identify specific actions that must be taken and the specific time frames attached to when the actions must be completed. For example, in the case of the Army's Logistics Modernization Program, a system initiative that we have previously reported on, one of the noted conditions was that the Army had to address the issues discussed in our report.[Footnote 55] In our May 2004 report, we recommended that the department establish a mechanism that provides for tracking all business systems modernization conditional approvals to provide reasonable assurance that all specific actions are completed on time.[Footnote 56] The department's action is consistent with the intent of our recommendation. Further, the military service officials indicated that the tracking systems will be one of the "tools" they will use as part of the required statutory annual system reviews. In the case of the Army, officials noted that they had requested an update on the status of each condition by April 7, 2006. Notwithstanding the above described efforts to control the department's business system investments, formidable challenges remain. In particular, military service officials told us that the review of those business systems that have modernization funding of less than $1 million represents the majority of the department's reported 3,717 business systems, and that reviews of these systems are only now being started on an annual basis. In April 2006, the department issued guidance entitled "Investment Certification and Annual Review Process User Guidance," which complements the department's May 2005 guidance on its IRB process. According to Air Force officials, the additional guidance is intended to help ease the administrative burden associated with performing the system reviews and further instill consistency among the DOD components. However, the extent to which the structures and processes will be applied to the department's 3,717 business systems is still evolving. Given the large number of systems involved, it is important that the system review and approval process be effectively implemented for all systems. For example, we reported in April 2005,[Footnote 57] that the Army, the Navy, and the Air Force have 193; 1,512; and 166 logistics systems, respectively. Such large numbers of systems indicate a real possibility for eliminating unnecessary duplication and avoiding unnecessary spending. DOD Has Not Established All Required Investment Review Boards: The Act directs that DOD establish five IRBs, each responsible and accountable for controlling certain business system investments to ensure compliance and consistency with the business enterprise architecture. Four of the five designated IRBs have been established, the exception being an IRB chaired by the ASD(NII)/CIO. According to the Act and the Deputy Secretary of Defense's March 19, 2005, memorandum, the ASD(NII)/CIO-chaired IRB is responsible and accountable for any business system that primarily supports IT infrastructure or information assurance activities. According to ASD(NII)/CIO officials, this IRB has not been established because the CIO does not have direct control and accountability over any business systems, thus making this IRB unnecessary. These officials further noted that if there is specific infrastructure that would be necessary for a given business system, a representative of the ASD(NII)/CIO office is a participant in each of the other four IRBs. The Act's requirement that modernizations costing more than $1 million must be certified by a designated "approval authority" and subsequently approved by the DBSMC prior to funds being obligated not only applies to any business systems that constitute functional area applications but also to any infrastructure that constitutes a business system. Our analysis of the department's detailed fiscal year 2007 budget request documents disclosed approximately $47 million of infrastructure modernizations costing more than $1 million that are designated by DOD in those documents as in support of the business mission area. Investment in infrastructure is an integral part of both an enterprise architecture and transition plan, and should, therefore, be subject to the same investment management structures and processes as the application systems that they support. DOD Is Implementing Our Prior Recommendations: The Act's requirements concerning the architecture, transition plan, budgetary disclosure, and investment management structures and processes--as discussed earlier--are consistent with our prior recommendations. Over the last 5 years, we have made 34 recommendations to assist the department in developing a well-defined and useful business enterprise architecture and using it to gain control over its ongoing business system investments. (See app. II for details on the status of our recommendations.) DOD agreed with our recommendations and stated its commitment to implement them. Of the 34 recommendations, DOD had taken steps to fully implement 4 and 29 of our recommendations were still open as of November 2005, meaning that DOD had yet to fully implement them.[Footnote 58] In its March 15, 2006, annual report to Congress, DOD restated its commitment to address each of the remaining 29 open recommendations. It also reported that it had fully implemented 23 of the open recommendations and was in the process of implementing 6. In taking steps to further comply with the Act, DOD has also taken (and continues to take) actions to implement our open recommendations. Of the 29 remaining recommendations, DOD has taken steps to fully implement 16 and is in the process of implementing the remaining 13. For example, DOD has fully acted on our recommendations to: * issue a policy that directs the development, implementation, and maintenance of an architecture and: * establish a hierarchy of IRBs to gain control over ongoing IT investments. DOD is also taking steps related to, for example, our recommendations to develop an architecture program management plan and adopt a strategic approach to meeting the program's human capital needs. However, additional steps are needed to fully implement these recommendations. * The department included a high-level, notional description of steps it plans to take over the next year related to architecture development, maintenance, and implementation. Program officials also described in broad terms these plans orally to us. In particular, the department intends to define and implement a metrics framework to measure results in terms of operational performance improvement, add scope and content to the architecture in 6-month increments, and define and use criteria to gauge investment compliance with the architecture. However, the department has yet to develop an enterprise architecture program management plan to describe, among other things, what the architecture and transition plan increments individually or collectively will include and not include, and how the quality and utility of these increments will be determined. * Program officials told us that they have begun analyzing the architecture program's workforce needs and capabilities using a three- phase approach. Phase I--which according to DOD is complete--resulted in the development of a knowledge and skills model for the program's architecture and transition plan staff. The second phase is in progress--according to DOD--and involves identifying and assessing the knowledge and skills of the existing architecture and transition plan staff. According to program officials, this phase will set overall program needs and provide the basis for identifying gaps and recommendations for filling the gaps. Phase III will implement the recommendations. According to DOD, it has not yet established milestones for Phase III. Program officials, including the Special Assistant to the Deputy Under Secretary of Defense (Business Transformation) and the Director of Transformation Planning and Performance, stated that the department is committed to addressing all of our open recommendations. However the department has yet to establish milestones for addressing all our recommendations. It is important that the department move swiftly in doing so because these recommendations are aimed at strengthening architecture management activities, adding missing content to architecture products, and controlling ongoing and planned business system investments. Until it does, the department will not be able to effectively guide and constrain its business modernization efforts and move away from non-integrated business systems development efforts. Conclusions: Since our last report, DOD has continued to make important progress in defining and implementing institutional management controls (i.e., processes, structures, and tools), but much remains to be accomplished relative to the National Defense Authorization Act for Fiscal Year 2005 requirements and relevant guidance. In particular, the business enterprise architecture and the enterprise transition plan are still missing important content and the business system investment process is not yet fully established and institutionalized at all organizational levels. DOD recognizes this and has stated its commitment to incrementally improve its business systems modernization controls relative to most of these areas. It is critically important that DOD swiftly implement our open recommendations, including developing a well- defined enterprise architecture program management plan, as we have previously noted and recommended, and the department has agreed to do so. However, the department has yet to develop this plan or establish milestones for developing it. Until it does, the likelihood of sustained incremental improvement to its modernization management controls will be diminished and the means of holding the department accountable for such improvement will be missing. Even with this plan and the associated management control improvements, however, the more formidable challenge facing the department is how well it can implement these controls over the years ahead on each and every business system investment. While not a guarantee, institutionalization of well-defined modernization management controls can go a long way in addressing this longer-term challenge. Recommendations for Executive Action: To further assist the department in institutionalizing well-defined business systems modernization management controls, to facilitate congressional oversight, and promote departmental accountability, we recommend that the Secretary of Defense direct the Deputy Secretary of Defense, as the chair of the DBSMC, to submit an enterprise architecture program management plan to defense congressional committees. At a minimum, the plan should define what the department's incremental improvements to the architecture and transition plan will be, and how and when they will be accomplished, including what (and when) architecture and transition plan scope and content and architecture compliance criteria will be added into which versions. In addition, the plan should include an explicit purpose and scope for each version of the architecture, along with milestones, resource needs, and performance measures for each planned version, with particular focus and clarity on the near-term versions. Agency Comments and Our Evaluation: In its written comments on a draft of this report, signed by the Deputy Under Secretary of Defense (Business Transformation) and reprinted in appendix III, the department stated that it appreciated our analysis of its plans and activities and our associated recommendations, adding that we continue to be a constructive player in the department's efforts to transform its business operations and that it welcomes our insights and looks forward to our future participation in its transformation efforts. The department also stated that our assessment and findings are a fair representation of DOD's efforts to date, and while it does not agree with all of our points, it recognizes that even in areas of disagreement there is opportunity for dialog and learning. In this regard, the department provided additional comments in two areas. First, DOD recognized the importance of addressing our recommendations, and stated that it has moved aggressively over the past year to do so. It also stated that it is important that we make recommendations that are sufficiently specific to permit reasonable implementation and that we provide prompt feedback on whether DOD's implementation actions are in line with the recommendations. We agree and will continue to work proactively and constructively with the department to facilitate the implementation of the recommendations in the future. Second, DOD stated that it partially agreed with the recommendation in the draft report, characterizing it as developing a departmentwide enterprise architecture program management plan to gain control of the department's IT environment. According to DOD, such a plan would far exceed the current scope of business systems modernization, and thus addressing it would require it to first explore the feasibility of such a departmentwide approach and more time than our recommended July 31, 2006 date for providing the plan to defense congressional committees. Accordingly, DOD stated that it would issue a formal position on our recommendation by September 30, 2006. We agree that the business enterprise architecture should be departmentwide in scope and that its content should address, and thus allow it to gain control of, the department's business IT environment, which would include both business systems and supporting IT infrastructure and shared services (e.g., information security). However, the recommendation in our draft report was not aimed at adding this scope and content to the architecture and transition plan by July 31, 2006. Rather, it was aimed at developing an incremental plan that would show what missing scope and content would be added in each incremental version of the architecture and transition plan to eventually have an enterprise architecture that addressed the full scope of the department's business IT environment. The exploration activities that DOD identifies in its comments would thus be one aspect of what would be done under this incremental program management plan. Further, as we recommended, this plan would be much clearer and more precise with respect to the purpose, scope, and content of the next version of the architecture and transition plan, as well as the time frames and resources for producing it, and understandably more notional with respect to the later versions that perhaps require exploration activities and further thought. Because the plan that we recommended is fundamental to the continued improvement of the architecture and transition plan and congressional oversight, we believe that it needs to be developed and provided to defense congressional committees expeditiously. However, to further ensure that the intent of our recommendation is properly interpreted, and to address DOD's concern about the time needed to address it, we have slightly modified the recommendation to add clarifying language and to exclude a date for the plan's submission to defense congressional committees. We are sending copies of this report to interested congressional committees; the Director, Office of Management and Budget; the Secretary of Defense; the Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Under Secretary of Defense (Comptroller); the Assistant Secretary of Defense (Networks and Information Integration)/Chief Information Officer; the Under Secretary of Defense (Personnel and Readiness); and the Director, Defense Finance and Accounting Service. This report will also be available at no charge on our Web site at [Hyperlink, http://www.gao.gov]. If you or your staff have any questions on matters discussed in this report, please contact me at (202) 512-3439 or hiter@gao.gov, or McCoy Williams at (202) 512-9095 or williamsm1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix V. Signed By: Randolph C. Hite: Director: Information Technology Architecture and Systems Issues: Signed By: McCoy Williams: Director: Financial Management Assurance: List of Committees: The Honorable John Warner: Chairman: The Honorable Carl Levin: Ranking Minority Member: Committee on Armed Services: United States Senate: The Honorable Ted Stevens: Chairman: The Honorable Daniel K. Inouye: Ranking Minority Member: Subcommittee on Defense: Committee on Appropriations: United States Senate: The Honorable Duncan L. Hunter: Chairman: The Honorable Ike Skelton: Ranking Minority Member: Committee on Armed Services: House of Representatives: The Honorable C.W. Bill Young: Chairman: The Honorable John P. Murtha: Ranking Minority Member: Subcommittee on Defense: Committee on Appropriations: House of Representatives: [End of section] Appendix I: Objectives, Scope, and Methodology: Our objectives were to (1) assess the actions by the Department of Defense (DOD) to comply with the requirements of Section 2222 of Title 10, U.S. Code[Footnote 59] and (2) determine the extent to which DOD has addressed our prior recommendations. Consistent with the Act and as agreed with the staffs of congressional defense committees, we used our November 2005 report (GAO-06-219) as a baseline and evaluated DOD's efforts relative to the remaining five requirements in the Act: (1) development of an enterprise architecture that includes an information infrastructure enabling DOD to support specific capabilities, such as data standards and system interface requirements; (2) development of a transition plan for implementing the enterprise architecture that includes specific elements, such as the acquisition strategy for new systems; (3) inclusion of business systems information in DOD's budget submission; (4) establishment of business systems investment review processes and structures; and (5) approval of defense business systems investments in excess of $1 million. To determine whether the architecture addressed the requirements specified in the Act, we reviewed version 3.1 of the business enterprise architecture, which was released on March 15, 2006. This review included analyzing the scope and content of version 3.1 architecture products to determine whether they addressed the missing elements we identified in our November 2005 report. In addition, we requested a traceability matrix demonstrating where in the architecture each of the elements was addressed and interviewed program officials to validate the information in this matrix. In reviewing the products, we focused on the changes from version 3.0 and the traceability matrix prepared by DOD. In addition, we interviewed key program officials, including the Director of Transformation Planning and Performance; Special Assistant to the Deputy Under Secretary of Defense (Business Transformation); Chief Architect; and the Enterprise Transition Plan Team lead, to obtain an understanding of the steps taken and planned to address the missing elements we previously reported and to ascertain the relationship between the architecture and the plan. To determine whether the enterprise transition plan addressed the requirements specified in the Act, we reviewed the updated enterprise transition plan released on March 15, 2006, and included in DOD's March 15, 2006, annual report to Congress. This review included determining whether the transition plan addressed the missing elements identified in our November 2005 report, such as an acquisition strategy for new systems and a statement of financial and non-financial resource needs. Specifically, we requested a traceability matrix demonstrating where in the transition plan each of the elements was addressed and interviewed program officials to validate the information in this matrix. In reviewing the plan, we focused on the changes from the September 30, 2005, version and the traceability matrix prepared by DOD. We interviewed program officials, including the Director of Transformation Planning and Performance; Special Assistant to the Deputy Under Secretary of Defense (Business Transformation); Chief Architect; and the Enterprise Transition Plan Team lead to obtain an understanding of the steps taken and planned to address the missing elements we previously reported, and to ascertain the relationship between the plan and the architecture. To determine whether DOD's fiscal year 2007 information technology (IT) budget submission was prepared in accordance with the criteria set forth in the Act, we reviewed and analyzed DOD's fiscal year 2007 IT budget request. As part of our analysis, we determined the portion of the budget request that related to the department's business systems and related infrastructure. We reviewed the accompanying budget exhibits and selected capital investment reports to obtain additional information on specific business systems. To determine whether DOD has established investment review structures and processes and issued a standard set of investment review and decision-making criteria, we reviewed applicable policies and procedures issued by the department. In this regard, we interviewed program officials to determine whether the one investment review board (IRB) that we reported as not being established in our November 2005 report had since been established, and if not, the reasons why. We also examined process documents to see whether they provide for key requirements in the Act, such as annual reviews of every investment and use of business enterprise architecture compliance criteria. To determine whether the department was reviewing and approving business system investments exceeding $1 million, we obtained from DOD the list of business system investments certified by the IRBs and approved by the Defense Business Systems Management Committee. Because of time constraints, we selectively verified the information provided by the department with the certification and approval information in the budget request to identify any anomalies. We also analyzed the fiscal year 2006 column of the fiscal year 2007 budget request to ascertain the specific number of business systems earmarked for modernization funding in excess of $1 million. We selected systems from our analysis of the IT budget with DOD's list of systems to ascertain if the business systems were certified and approved as stipulated by the Act. For these selected systems, we obtained and reviewed documentation related to the certification and approval process as specified in the Act and outlined in the department's tiered accountability concept. Furthermore, we met with representatives from the Army, the Navy, and the Air Force to ascertain the specific actions that were taken (or planned to be taken) in order to perform the annual systems reviews as required by the Act. To determine the extent to which DOD has addressed our open recommendations, we met with program officials, including the Director of Transformation Planning and Performance, Chief Architect, and the Enterprise Transition Plan Team lead, to obtain an understanding of the steps taken and planned to address our recommendations. We obtained and analyzed documentation that described the specific corrective actions taken. We reviewed program documentation, such as the March 15, 2006, annual report, updated transition plan, and version 3.1 of the architecture to determine whether DOD addressed our recommendations related to architecture scope and content. We used our Enterprise Architecture Management Maturity Framework, which describes the stages of management maturity, to update the status of key elements of architecture management best practices that DOD had not adopted. To make this determination, we reviewed program documentation, such as program policies and procedures, configuration and communications plans, and charters for the governance bodies; and we compared them to the elements in the framework. We also reviewed documentation regarding DOD verification and validation activities in the architecture development process. In addition, we reviewed the guidance establishing the IRBs and describing the investment management process. We did not independently validate the reliability of the cost and budget figures provided by DOD, because the specific amounts were not relevant to our findings. We conducted our work at DOD headquarters offices in Arlington, Virginia, from January through May 2006 in accordance with generally accepted government auditing standards. [End of section] Appendix II: Prior Recommendations on DOD's Business Enterprise Architecture and Investment Management: GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (1) The Secretary of Defense immediately designate DOD financial management modernization a departmental priority and accordingly direct the Deputy Secretary of Defense to lead an integrated program across the department for modernizing and optimizing financial management operations and systems; Implemented?: Yes: check; GAO assessment: Previously implemented. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (2) The Secretary immediately issue a DOD policy that directs the development, implementation, and maintenance of an enterprise architecture (EA); Implemented?: Yes: check; GAO assessment: The Deputy Secretary of Defense issued a memorandum on February 7, 2005, establishing the Defense Business Systems Management Committee (DBSMC), whose responsibilities, among other things, include the approval of the business enterprise architecture (BEA) and the enterprise transition plan (ETP). On October 7, 2005, the Deputy Secretary of Defense also issued a memorandum establishing the Business Transformation Agency (BTA), which is responsible for maintaining and updating the BEA and the ETP. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (3) The Secretary immediately modify the Senior Financial Management Oversight Council's charter to; * designate the Deputy Secretary of Defense as the Council Chair and the Under Secretary of Defense (Comptroller) as the Council Vice-Chair; * empower the Council to serve as DOD's EA steering committee, giving it the responsibility and authority to ensure that a DOD EA is developed and maintained in accordance with the DOD Architecture Framework; * empower the Council to serve as DOD's financial management investment review board, giving it the responsibility and authority to (1) select and control all DOD financial management investments and (2) ensure that its investment decisions treat compliance with the EA as an explicit condition for investment approval that can be waived only if justified by a compelling written analysis; and; * expand the role of the Council's System Compliance Working Group to include supporting the Council in determining the compliance of each system investment with the enterprise architecture at key decision points in the system's development or acquisition life cycle; Implemented?: Yes: check; GAO assessment: In February 2005, the Deputy Secretary of Defense established the DBSMC, as the highest ranking governance body responsible for overseeing DOD business systems modernization efforts and; * designated the Deputy Secretary of Defense as the Chair and the Under Secretary of Defense for Acquisition, Technology, and Logistics as Vice- Chair; * assigned the committee the responsibility of reviewing and approving all major releases of the BEA and ETP and assigned the BTA the responsibility for maintaining and updating the BEA in accordance with DOD Architecture Framework; * delegated, on March 19, 2005, the authority for the review, approval, and oversight of the planning, design, acquisition, deployment, operation, maintenance, and modernization of defense business systems to the designated approval authority for each business area; [A] and; * issued criteria for reviewing all business systems annually and for certifying business system modernizations over $1 million. The department's guidance recognizes that one of the key elements in evaluating its business system investments is the importance of being consistent with the BEA. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (4) The Secretary immediately make the Assistant Secretary of Defense (Command, Control, Communications, & Intelligence), in collaboration with the Under Secretary of Defense (Comptroller), accountable to the Senior Financial Management Oversight Council for developing and maintaining a DOD enterprise architecture; In fulfilling this responsibility, the Assistant Secretary appoint a chief architect for DOD business management modernization and establish and adequately staff and fund an enterprise architecture program office that is responsible for developing and maintaining a DOD-wide EA in a manner that is consistent with the framework defined in the Chief Information Officer (CIO) Council's published guide for managing enterprise architectures. In particular, the Assistant Secretary should take appropriate steps to ensure that the Chief Architect; * obtains executive buy-in and support; * establishes architecture management structure and controls; * defines the architecture process and approach; * develops the baseline architecture, the target architecture, and the sequencing plan; * facilitates the use of the architecture to guide business management modernization projects and investments; and; * maintains the architecture; Implemented?: Yes: check; GAO assessment: The BTA, whose management and oversight is provided cooperatively by the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management) briefs the DBSMC monthly on, among other things, the status of the BEA. The Assistant Secretary of Defense (Networks and Information Integration)/DOD Chief Information Officer (ASD(NII)/CIO) is a member of the DBSMC; In fulfilling this responsibility, the department has appointed a Chief Architect under the BTA, and developed a position description that outlines the roles and responsibilities of the chief architect. In addition, in July 2001, it established a program office and according to program officials, the department has adequate staff and funding for developing and maintaining the architecture. Moreover, the department has taken steps to; * obtain executive buy-in and support, as evidence by the establishment of the DBSMC; * establish the architecture management structure and controls- -such as establishing one division under the BTA to oversee architecture development and maintenance, and another to oversee the long-term internal and external communication activities; * define the process and approach for developing the current version of the architecture; * develop the target or "To Be" architecture and the transition plan, and intend to incorporate an "As Is" strategy in the next version of the architecture; * use the architecture to guide its business modernization projects and investments; and; * assign the BTA the responsibility for maintaining the architecture. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (5) The ASD(NII)/CIO report at least quarterly to the Senior Financial Management Oversight Council on the Chief Architect's progress in developing an EA, including the Chief Architect's adherence to enterprise architecture policy and guidance from the Office of Management and Budget (OMB), the CIO Council, and DOD; Implemented?: Yes: check; GAO assessment: In February 2005, the Deputy Secretary of Defense established the DBSMC. As mentioned earlier, the DBSMC is comprised of senior executives from across DOD, including the ASD(NII)/ CIO and is chaired by the Deputy Secretary of Defense; As stated earlier, the BTA, whose management and oversight is provided cooperatively by the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management), briefs the DBSMC monthly on--among other things--the status of DOD's efforts to develop, implement, and maintain the architecture and the transition plan, including adherence to relevant policies and guidance. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (6) The Senior Financial Management Oversight Council report to the Secretary of Defense every 6 months on progress in developing and implementing an EA; Implemented?: Yes: check; GAO assessment: In February 2005, the Deputy Secretary of Defense established the DBSMC. As mentioned earlier, the DBSMC is chaired by the Deputy Secretary of Defense, who is briefed monthly on the progress of the architecture's development and implementation. According to the DBSMC charter, the chair will report to the Secretary of Defense, as appropriate. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (7) The Secretary reports every 6 months to the congressional defense authorizing and appropriating committees on progress in developing and implementing an EA; Implemented?: Yes: check; GAO assessment: Previously implemented. GAO report information and recommendation: GAO-01-525: Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, May 17, 2001: (8) Until an enterprise architecture is developed and the Council is positioned to serve as DOD's financial management investment review board as recommended, the Secretary of Defense limit DOD components' financial management investments to the deployment of systems that have already been fully tested and involve no additional development or acquisition costs; stay- in-business maintenance needed to keep existing systems operational; management controls needed to effectively invest in modernized systems; and new systems or existing system changes that are congressionally directed or are relatively small, cost effective, and low risk and can be delivered in a relatively short time frame; Implemented?: In Process: check; GAO assessment: On June 2, 2005, the Under Secretary of Defense for Acquisition, Technology, and Logistics set forth guidance that identified the processes to establish and operate IRBs for the purpose of reviewing all business system investments at least annually and for certifying business system modernizations over $1 million as required by the Fiscal Year 2005 National Defense Authorization Act. Furthermore, in April 2006, the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management) issued BEA compliance guidance. Since the April 2006 guidance was issued after completion of our field work, we have not had the opportunity to assess the guidance to ascertain if it addresses the recommendation. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (1) The Secretary of Defense ensure that the enterprise architecture executive committee members are singularly and collectively made explicitly accountable to the Secretary for the delivery of the enterprise architecture, including approval of each version of the architecture; Implemented?: Yes: check; GAO assessment: Previously implemented. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (2) The Secretary of Defense ensure that the enterprise architecture program is supported by a proactive marketing and communication program; Implemented?: In Process: check; GAO assessment: Under the BTA, the department has established an Information and Federation Strategy office whose responsibilities include internal and external communications. In February 2006, this office developed a communication strategy and communications plan; Based on the best practices defined by the CIO Council's A Practical Guide to Federal Enterprise Architecture, we found that the communications plan adhered to some of the guidelines--such as identifying key audiences, purpose, scope and function and identifying communication tools and a number of outreach programs to be used when conveying the message to the targeted audiences; However, the department's plan and strategy does not fully adhere to the criteria set forth by best practices. In particular, the plan lacked an explanation of roles and responsibilities and does not include details regarding evaluation, metrics, and feedback. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (3) The Secretary of Defense ensure that the quality assurance function includes the review of adherence to process standards and reliability of reported program performance, is made independent of the program management function, and is not performed by subject matter experts involved in the development of key architecture products; Implemented?: Yes: check; GAO assessment: The department has established a quality assurance function, which is an embedded process within the overall architecture development. This function includes the review of adherence to process standards, as appropriate, and it reports to a BTA division that is independent of the division responsible for developing and maintaining the architecture. It is also authorized to elevate issues to the Under Secretary of Defense for Acquisition, Technology, and Logistics. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (4) The Secretary gain control over ongoing IT investments by establishing a hierarchy of investment review boards, each responsible and accountable for selecting and controlling investments that meet defined threshold criteria, and each composed of the appropriate level of executive representatives, depending on the threshold criteria, from across the department; Implemented?: Yes: check; GAO assessment: On March 19, 2005, the Deputy Secretary of Defense delegated the authority for the review, approval, and oversight of the planning, design, acquisition, deployment, operation, maintenance, and modernization of defense business systems to the designated approval authority for each business area. Additionally, on June 2, 2005, the Under Secretary of Defense for Acquisition, Technology, and Logistics set forth guidance that identified the processes to establish and operate IRBs for the purpose of reviewing all business system investments. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (5) The Secretary gain control over ongoing IT investments by establishing a standard set of criteria to include (a) alignment and consistency with the DOD enterprise architecture and (b) our open recommendations governing limitations in business systems investments pending development of the architecture; Implemented?: Yes: check; GAO assessment: As noted above, the Under Secretary of Defense for Acquisition, Technology, and Logistics has issued criteria for reviewing all business system investments. The guidance points out that one of the key elements in evaluating the department's business system investments is the importance of being consistent with the BEA. Furthermore, in April 2006, the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management) issued BEA compliance guidance. GAO report information and recommendation: GAO-03-458: DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, February 28, 2003: (6) The Secretary gain control over ongoing IT investments by directing these boards to immediately apply these criteria in completing reviews of all ongoing IT investments and to not fund investments that do not meet these criteria unless they are otherwise justified by explicit criteria waivers; Implemented?: Yes: check; GAO assessment: As noted above, the Under Secretary of Defense for Acquisition, Technology, and Logistics has issued criteria for reviewing all business system investments. The guidance points out that one of the key elements in evaluating the department's business system investments is the importance of being consistent with the BEA. Furthermore, in April 2006, the Deputy Under Secretary of Defense (Business Transformation) and the Deputy Under Secretary of Defense (Financial Management) issued BEA compliance guidance, which the IRBs have been directed to use. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (1) The Secretary of Defense or his appropriate designee define and implement an effective investment management process to proactively identify, control, and obtain DOD Comptroller review and approval of expenditures for new and ongoing business systems investments exceeding $1 million while the architecture is being developed and after it is completed, and which includes clearly defined domain owners' roles and responsibilities for selecting and controlling ongoing and planned system investments; Implemented?: Yes: check; GAO assessment: On June 2, 2005, the Under Secretary of Defense for Acquisition, Technology, and Logistics set forth guidance that is to be used in reviewing all business system investments at least annually and for certifying business system modernizations over $1 million as required by the Fiscal Year 2005 National Defense Authorization Act. In its March 15, 2006, report to congressional defense committees, the department reported that the DBSMC had certified a total of 226 systems, which represents about $3.6 billion in modernization funding. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (2) The Secretary of Defense or his appropriate designee implement the core elements in our Enterprise Architecture Framework for Assessing and Improving Enterprise Architecture Management that we identify in this report as not satisfied, including ensuring that minutes of the meetings of the executive body charged with directing, overseeing, and approving the architecture are prepared and maintained; Implemented?: In Process: check; GAO assessment: DOD has taken some actions to address the 31 elements identified in GAO's Enterprise Architecture Framework for assessing and improving enterprise architecture management. DOD has addressed 17 of the 31 elements. For example, the BEA is an integral component of the IT investment management process and the quality of the BEA products is measured and reported. DOD has begun to address 7 additional elements. For example, although the BEA plans call for developing metrics for measuring progress, quality, and compliance, it does not call for developing metrics for return on investment. DOD has yet to begin addressing the remaining 7 elements. For example, architecture descriptions have yet to address security and return on architecture investment is not measured and reported. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (3) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include the 340 Joint Financial Management Improvement Program requirements that our report identified as omitted or not fully addressed; Implemented?: Yes: check; GAO assessment: Previously implemented. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (4) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include the 29 key elements governing the "As Is" architectural content that our report identified as not being fully satisfied; Implemented?: In Process: check; GAO assessment: Program officials stated that "As Is" environment analyses and definitions have occurred--and are planned on in an "as needed" and "just enough" basis. For example, they described "As Is" analysis and definition that has occurred at the system level for several of the enterprise-level systems (e.g., DOD Real Property Information Systems), and work under way to further understand the interdependencies that exist in the current planning, programming, budgeting, and execution business process as an essential part of developing the "To Be" description of this process. While not included in versions 3.0 and 3.1, according to an official, the "As Is" work is in fact now being used to perform a business capability gap analysis and guide transformation based on the current set of priorities; However, DOD has yet to disclose, at a minimum, the "As Is" analyses that have and that have not been performed in the architecture releases. In addition, DOD has yet to describe in the architecture releases the importance and/or irrelevance of "As Is" analyses to the systems and initiatives in the enterprise transition plan, and the operational activities and business processes in the target architecture. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (5) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include the 30 key elements governing the "To Be" architectural content that our report identified as not being fully satisfied; Implemented?: In Process: check; GAO assessment: DOD issued BEA version 3.1 on March 15, 2006, which addressed some limitations in the prior version that we reported. However, version 3.1 is still missing certain scope and content. For example, this version continues to specify DOD's Standard Financial Information Structure (SFIS) as an enterprisewide data standard for categorizing financial information to support financial management and reporting functions. In addition, it adds greater definition on standard processes, rules, and data for intra-governmental ordering and billing. However, certain SFIS data elements, such as those relating to the planning, programming, and budgeting business process area have yet to be defined. In addition, the architecture has yet to include a systems standards profile to facilitate data sharing among departmentwide business systems and promote interoperability with departmentwide IT infrastructure systems. Further, military services and defense agencies architectures have yet to be aligned with this departmental architecture. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (6) The Secretary of Defense or his appropriate designee update version 1.0 to ensure that "To Be" architecture artifacts are internally consistent, to include addressing the inconsistencies described in this report as well as including user instructions or guidance for easier architecture navigation and use; Implemented?: Yes: check; GAO assessment: Version 3.1 of the architecture provides significant improvements with regard to navigation and use and addresses the internal consistency of the architecture artifacts that we previously described. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (7) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to include (a) the 3 key elements governing the transition plan content that our report identified as not being fully satisfied and (b) those system investments that will not become part of the "To Be" architecture, including time frames for phasing out those systems; Implemented?: In Process: check; GAO assessment: DOD issued an updated enterprise transition plan on March 15, 2006. This plan provides information on progress on major investments over the last 6 months, including key accomplishments and milestones attained. Further, the plan builds on the prior plan by defining an initiative aimed at identifying capability gaps between the "As Is" and "To Be" architectural environments, and DOD continues to validate the inventory of ongoing IT investments that formed the basis for the prior version of the transition plan. However, while the plan includes more information about the termination of legacy systems, it still does not identify, for example, all legacy systems that will not be part of the target architecture--and it does not include system investment information for all of the department's agencies and combatant commands. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (8) The Secretary of Defense or his appropriate designee update version 1.0 of the architecture to address comments made by the verification and validation contractor; Implemented?: In Process: check; GAO assessment: According to the verification and validation contractor, of the 157 comments from version 3.0, 123 were deemed potentially in scope for version 3.1. Of these 123 comments, they stated that 85 were deferred to the next architecture release and 38 were to be addressed in version 3.1. The verification and validation contractor is currently reviewing version 3.1 and has yet to report on whether the 38 comments were addressed in version 3.1. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (9) The Secretary of Defense or his appropriate designee develop a well- defined, near-term plan for extending and evolving the architecture and ensure that this plan includes addressing our recommendations, defining roles and responsibilities of all stakeholders involved in extending and evolving the architecture, explaining dependencies among planned activities, and defining measures of activity progress; Implemented?: In Process: check; GAO assessment: The department included a high-level, notional description of steps it plans to take over the next year related to architecture development, maintenance, and implementation in its most recent annual report to Congress. In particular, the department intends to define and implement a metrics framework to measure results in terms of operational performance improvement, add scope and content to the architecture in 6-month increments, and define and use criteria to gauge investment compliance with the architecture. However, the department has yet to develop a plan to describe, among other things, what the architecture and transition plan increments individually or collectively will include and not include, with particular emphasis and clarity on near-term increments, the resources needed to produce the increments, who will be responsible for producing them, and how the quality and utility of these increments will be determined. GAO report information and recommendation: GAO-03-1018: DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, September 19, 2003: (10) The Secretary of Defense or his appropriate designee limit the pilot projects to small, low-cost, low-risk prototype investments that are intended to provide knowledge needed to extend and evolve the architecture, and are not to acquire and implement production version system solutions or to deploy an operational system capability; Implemented?: In Process: check; GAO assessment: According to program officials, the Office of the Under Secretary of Defense for Business Transformation has prepared a draft policy on initiatives that will serve to define a pilot project in terms of size and scope, and detail the process for obtaining approval and funding. GAO report information and recommendation: GAO-04-615: DOD Business Systems Modernization: Billions Continue to Be Invested with Inadequate Management Oversight and Accountability, May 27, 2004: (1) The Secretary of Defense direct the Under Secretary of Defense (Comptroller) and the Assistant Secretary of Defense for Networks and Information Integration to develop a standard definition for DOD components to use to identify business systems; Implemented?: Yes: check; GAO assessment: This recommendation was absorbed into GAO-05-381 recommendation #2. GAO report information and recommendation: GAO-04-615: DOD Business Systems Modernization: Billions Continue to Be Invested with Inadequate Management Oversight and Accountability, May 27, 2004: (2) The Secretary of Defense direct the Assistant Secretary of Defense for Networks and Information Integration to expand the existing IT Registry to include all business systems; Implemented?: Yes: check; GAO assessment: On July 13, 2004, the ASD(NII)/CIO directed establishment of the DOD Information Technology Portfolio Repository (DITPR). According to BTA officials, all identified business systems have been entered into the DITPR. As of April 2006, the department reported that it had 3,717 business systems. GAO report information and recommendation: GAO-04-615: DOD Business Systems Modernization: Billions Continue to Be Invested with Inadequate Management Oversight and Accountability, May 27, 2004: (3) The Secretary of Defense direct the Under Secretary of Defense (Comptroller) to establish a mechanism that provides for tracking all business systems modernization conditional approvals to provide reasonable assurance that all specific actions are completed on time; Implemented?: Yes: check; GAO assessment: The DITPR is being used to track and monitor investment decisions. For example, if the DBSMC notes that a business system must show how it is compliant with the SFIS, that action is maintained in the DITPR and, on completion, the completion date is entered into DITPR. GAO report information and recommendation: GAO-05-381: DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, April 29, 2005: (1) The Secretary of Defense direct that the DOD CIO, in consultation with the domains, review the 56 systems reclassified from business systems to national security systems to determine how these should be properly reported in the fiscal year 2007 IT budget request; Implemented?: Yes: check; GAO assessment: The department has appropriately classified the 56 systems in its fiscal year 2007 IT budget request. GAO report information and recommendation: GAO-05-381: DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, April 29, 2005: (2) The Secretary of Defense direct that the Defense Business Systems Management Committee work with the investment review boards to review the reported business systems inventory so systems are defined in accordance with the definition specified in the Fiscal Year 2005 Defense Authorization Act; Implemented?: Yes: check; GAO assessment: The department's business systems are reported in its fiscal year 2007 budget request in accordance with the criteria specified in the Act. GAO report information and recommendation: GAO-05-381: DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, April 29, 2005: (3) The Secretary of Defense direct that the DBSMC develop a comprehensive plan that addresses implementation of our previous recommendations related to the BEA and the control and accountability over business systems investments (at a minimum, the plan should assign responsibility and estimated time frames for completion); Implemented?: In Process: check; GAO assessment: DOD has documented a series of actions that address our recommendations. In its March 15, 2006, report to Congress, DOD stated that it had fully implemented our 23 open recommendations and was in the process of implementing 6. We agree that DOD has taken actions to implement our open recommendations, with 16 being implemented and 13 in the process of being implemented. However, while DOD included a high- level summary in its March 15, 2006 annual report to Congress, it did not include information such as responsibilities, time frames, and actions planned to address all of the recommendations that have yet to be fully implemented. GAO report information and recommendation: GAO-05-381: DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, April 29, 2005: (4) The Secretary of Defense direct that the comprehensive plan we recommend be incorporated into the department's second annual report due March 15, 2006, to defense congressional committees, as required by the Fiscal Year 2005 Defense Authorization Act to help facilitate congressional oversight; Implemented?: In Process: check; GAO assessment: In its March 15, 2006, annual report to Congress, the department included a high-level summary that outlines the status of our recommendations. However, as noted above, it did not fully satisfy our recommendation. GAO report information and recommendation: GAO-05-702: DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, July 22, 2005: (1) The Secretary of Defense should direct the Deputy Secretary of Defense, as the chair of DBSMC and in collaboration with DBSMC members, to immediately fully disclose the state of its BEA program to DOD's congressional authorization and appropriations committees, including its limited progress and results to date, as well as specific plans and commitments for strengthening program management and producing measurable results that reflect the department's capability to do so; Implemented?: Yes: check; GAO assessment: In its March 15, 2006, annual report to Congress, DOD disclosed the current state of the BEA program by including key milestones for fiscal years 2006 and 2007, accomplishments since September 2005, and limitations of and gaps in the architecture and transition plan. For example, in an effort to improve visibility into personnel activities, in fiscal year 2006, DOD reported that it has deployed a civilian personnel data warehouse to facilitate data sharing. In addition, the department reported that termination and migration dates had yet to be determined for a number of systems. GAO report information and recommendation: GAO-05-702: DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, July 22, 2005: (2) The Secretary of Defense should direct the Deputy Secretary of Defense, as the chair of the DBSMC and in collaboration with DBSMC members, to ensure that each of our recommendations related to the BEA management and content are reflected in the plans and commitments; Implemented?: In Process: check; GAO assessment: In its March 15, 2006, annual report to Congress, the department included a high-level summary that outlines the status of our recommendations. However, it did not include information such as responsibilities, time frames, and actions planned to address all of the recommendations that have yet to be fully implemented. GAO report information and recommendation: GAO-05-702: DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, July 22, 2005: (3) The Secretary of Defense should direct the Deputy Secretary of Defense, as the chair of the DBSMC and in collaboration with DBSMC members, to ensure that plans and commitments provide for effective BEA workforce planning, including assessing workforce knowledge and skills needs, determining existing workforce capabilities, identifying gaps, and filling these gaps; Implemented?: In Process: check; GAO assessment: Program officials told us that they have begun analyzing the architecture program's workforce needs and capabilities using a three-phase approach. Phase I, which according to DOD is complete, resulted in the development of a knowledge and skills model for the program's architecture and transition plan staff. The second phase, which according to DOD is in progress, involves identifying and assessing the knowledge and skills of the existing architecture and transition plan staff. According to program officials, this phase will set overall program needs and provide the basis for identifying gaps and recommendations for filling the gaps. Phase III will implement the recommendations. According to DOD, it has not yet established milestones for Phase III. Source: GAO. [A] Approval authorities include the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Under Secretary of Defense (Comptroller); the Under Secretary of Defense for Personnel and Readiness; and the Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer of the Department of Defense. These approval authorities are responsible for the review, approval, and oversight of business systems and must establish investment review processes for systems under their cognizance. [B] DOD defines the Global Information Grid as the globally interconnected, end-to-end set of information, capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. [C] Department of Defense Fiscal Year 2007 IT/NSS President's Budget, Report on Defense Business Systems Modernization FY2005 National Defense Authorization Act, Section 332 February 2006. [End of table] [End of section] Appendix III: Comments from the Department of Defense: Office Of The Under Secretary Of Defense: 3000 Defense Pentagon: Washington, DC 20301-3000: Acquisition Technology And Logistics: Mr. Randolph C. Hite: Director: Information Technology Architecture and Systems Issues: U.S. Government Accountability Office: 441 G Street, N. W. Washington, DC 20548: Dear Mr. Hite: This is the Department of Defense (DoD) response to the GAO draft report, "Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed," dated April 28, 2006, (GAO Code 310616/GAO-06-658). GAO continues to be a constructive partner in the Department's efforts to transform internal business operations. Analysis of our plans and activities, as well as recommendations for refinement, provide important learning on best practices as we move forward. We especially appreciate the support and recognition for the Department's continued progress in laying the groundwork for success. We believe the GAO's assessments and findings represent a fair representation of the Department's efforts to date. We do not agree on all points, yet even in areas of disagreement, we recognize the opportunity for dialog and learning on both sides. There are two points, detailed below, on which we would like to comment: Responsiveness to addressing GAO concerns: As noted by GAO, it is vitally important that the Department move quickly to institutionalize the changes, policies and procedures that have been recently instituted in order to maximize the potential for overall success in transforming business operations. To that end, the Department moved aggressively over the past year to address not only GAO's recommendations, but also innumerable other challenges and barriers encountered along the way. While it is important that DoD respond to GAO's recommendations, it is equally important that GAO make recommendations sufficiently specific in scope that they can be reasonably implemented and that GAO provide prompt feedback on whether our efforts are in line with their concerns. New GAO Recommendation: Regarding the GAO's new recommendation that the Department develop a department-wide enterprise architecture program management plan to gain greater control of the Department's IT environment, this far exceeds the scope of business systems modernization. The Department will explore the feasibility of a department-wide approach to this issue, and publish a formal position on this recommendation by September 30, 2006. Our response to this recommendation is enclosed. The Department made important progress over the last year in reshaping its approach to modernizing its business operations. With the development of the Business Enterprise Architecture and Enterprise Transition Plan, we now have the important tools necessary to guide our transformation effort. With the implementation and institutionalization of the Defense Business Systems Management Committee and Investment Review Boards, we have brought the issues of business transformation to the forefront of senior leadership attention across the Department. Now, with the Business Transformation Agency in place, the Department's focus is on delivering the promise that these important tools and processes represent. We welcome GAO's insights and look forward to their participation in our future efforts. Signed By: Paul A. Brinkley: Deputy Under Secretary of Defense: (Business Transformation): Enclosure: As Stated: Gao Draft Report - Dated April 28, 2006 GAO CODE 310616/GAO-06-658: "Business Systems Modernization: Dod Continues To Improve Institutional Approach, But Further Steps Needed" Department Of Defense Comments To The Recommendation: Recommendation 1: The GAO recommended that the Secretary of Defense direct the Deputy Secretary of Defense to submit an enterprise architecture program management plan to defense congressional committees by July 31, 2006. (p. 52/GAO Draft Report): DOD Response: Partially Concurs. The Department will need time to explore the feasibility of a Department-wide approach to this issue, and will publish a formal position on this recommendation by September 30, 2006. [End of section] Appendix IV: Summary of Several Architecture Frameworks: [End of section] Various enterprise architecture frameworks are available for organizations to follow. Although these frameworks differ in their nomenclatures and modeling approaches, they consistently help define an enterprise's operations in both (1) logical terms, such as interrelated business processes and business rules, information needs and flows, and work locations and users; and (2) technical terms, such as hardware, software, data, communications, and security attributes and performance standards. The frameworks help define these perspectives for both the enterprise's current, or "As Is," environment and its target, or "To Be," environment--as well as a transition plan for moving from the "As Is" to the "To Be" environment. For example, John A. Zachman developed a structure or framework for defining and capturing an architecture.[Footnote 60] This framework describes six windows or "perspectives" from which to view the enterprise: those of (1) the strategic planner, (2) system user, (3) system designer, (4) system developer, (5) subcontractor, and (6) system itself. Zachman also proposed six models that are associated with each of these perspectives; these models describe (1) how the entity operates, (2) what the entity uses to operate, (3) where the entity operates, (4) who operates the entity, (5) when entity operations occur, and (6) why the entity operates. Zachman's framework provides a conceptual schema that can be used to identify and describe an entity's existing and planned components and their relationships to one another before beginning the costly and time-consuming efforts associated with developing or transforming the entity. Since Zachman introduced his framework, a number of other frameworks have been proposed. In August 2003, the department released version 1.0 of the DOD Architecture Framework (DODAF).[Footnote 61] The DODAF defines the type and content of the architectural products, as well as the relationships among the products that are needed to produce a useful architecture. Briefly, it decomposes an architecture into three primary views: operational, systems, and technical standards[Footnote 62] (see fig. 2). According to DOD, the three interdependent views are needed to ensure that IT systems support operational needs and that they are developed and implemented in an interoperable and cost- effective manner. Figure 2: Interdependent DODAF Views of an Architecture: [See PDF for image] Source: DOD Architecture Framework Version 1.0, Volume 1. [End of figure] In September 1999, the federal CIO's Council published the Federal Enterprise Architecture Framework (FEAF), which is intended to provide federal agencies with a common construct on which to base their respective architectures and to facilitate the coordination of common business processes, technology insertion, information flows, and system investments among federal agencies. FEAF describes an approach, including models and definitions, for developing and documenting architecture descriptions for multiorganizational functional segments of the federal government. Similar to most frameworks, FEAF's proposed models describe an entity's business, the data necessary to conduct the business, applications to manage the data, and technology to support the applications. In addition, the OMB established the Federal Enterprise Architecture (FEA) Program Management Office to develop a federated enterprise architecture in the context of five "reference models, and a security and privacy profile that overlays the five models." * The Business Reference Model is intended to describe the federal government's businesses, independent of the agencies that perform them. This model consists of four business areas: (1) services for citizens, (2) mode of delivery, (3) support delivery of services, and (4) management of government resources. It serves as the foundation for the Federal Enterprise Architecture. The OMB expects agencies to use this model as part of their capital planning and investment control processes to help identify opportunities to consolidate information technology investments across the federal government. Version 2.0 of this model was released in June 2003. * The Performance Reference Model is intended to describe a set of performance measures for major information technology initiatives and their contribution to program performance. According to OMB, this model will help agencies produce enhanced performance information; improve the alignment and better articulate the contribution of inputs, such as technology, to outputs and outcomes; and identify improvement opportunities that span traditional organizational boundaries. Version 1.0 of this model was released in September 2003. * The Service Component Reference Model is intended to identify and classify information technology service (i.e., application) components that support federal agencies and promote the reuse of components across agencies. This model is intended to provide the foundation for the reuse of applications, application capabilities, components (defined as "a self-contained business process or service with predetermined functionality that may be exposed through a business or technology interface"), and business services. According to OMB, this model is a business-driven, functional framework that classifies service components with respect to how they support business or performance objectives. Version 1.0 of this model was released in June 2003. * The Data Reference Model is intended to describe, at an aggregate level, the types of data and information that support program and business line operations and the relationships among these types. This model is intended to help describe the types of interactions and information exchanges that occur across the federal government. Version 2.0 of this model was released in November 2005. * The Technical Reference Model is intended to describe the standards, specifications, and technologies that collectively support the secure delivery, exchange, and construction of service components. Version 1.1 of this model was released in August 2003. * The Security and Privacy Profile is intended to provide guidance on designing and deploying measures that ensure the protection of information resources. OMB has released version 1.0 of the profile. [End of section] Appendix V: GAO Contact and Staff Acknowledgments: GAO Contact: Randolph C. Hite, (202) 512-3439 or hiter@gao.gov: McCoy Williams, (202) 512-9095 or williamsm1@gao.gov: Acknowledgments: In addition to the contacts named above, key contributors to this report were Darby Smith, Assistant Director; Neelaxi Lakhmani, Acting Assistant Director; and Susan Czachor, Francis Dymond, Eric Essig, Nancy Glover, Anh Le, John Martin, Mai Nguyen, Debra Rucker, and Andrea Smith. Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548: According to DOD, major releases are to have substantially new architecture content that incorporates emerging enterprise priorities and capabilities in support of DOD enterprise systems and initiatives and the IRBs. Minor releases are not to contain new enterprise priorities or business capabilities, but instead are to provide extension and "clean up" of the preceding releases. FOOTNOTES [1] Business systems are information systems that include financial and non-financial systems and support DOD's business operations, such as civilian personnel, finance, health, logistics, military personnel, procurement, and transportation. See 10 U.S.C. § 2222 (j) (2). [2] GAO, High-Risk Program, GAO-06-497T (Washington, D.C.: Mar. 15, 2006). [3] An enterprise architecture, or modernization blueprint, provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., federal department or agency) or a functional or mission area that cuts across more than one organization (e.g., financial management). This picture consists of snapshots of the enterprise's current "As Is" operational and technological environment and its target or "To Be" environment, as well as a capital investment roadmap for transitioning from the current to the target environment. These snapshots further consist of "views," which are basically one or more architecture products that provide conceptual or logical representations of the enterprise. [4] GAO, Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, GAO-01-525 (Washington, D.C.: May 17, 2001). [5] See, for example, GAO-01-525; DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, GAO-03-458 (Washington, D.C.: Feb. 28, 2003); Information Technology: Observations on Department of Defense's Draft Enterprise Architecture, GAO-03-571R (Washington, D.C.: Mar. 28, 2003); Business Systems Modernization: Summary of GAO's Assessment of the Department of Defense's Initial Business Enterprise Architecture, GAO- 03-877R (Washington, D.C.: July 7, 2003); DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, GAO-03-1018 (Washington, D.C.: Sept. 19, 2003); DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments, GAO-04-731R (Washington, D.C.: May 17, 2004); DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, GAO-05-381 (Washington, D.C.: April 29, 2005); DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, GAO-05-702 (Washington, D.C.: July 22, 2005). [6] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [7] GAO, DOD Business Systems Modernization: Important Progress Made in Establishing Foundational Architecture Products and Investment Management Practices, but Much Work Remains, GAO-06-219 (Washington, D.C.: Nov. 23, 2005). [8] This amount does not include an additional $50 billion for military operations in Iraq and Afghanistan. [9] GAO, DOD Business Systems Modernization: Important Progress Made in Establishing Foundational Architecture Products and Investment Management Practices, but Much Work Remains, GAO-06-219 (Washington, D.C.: Nov. 23, 2005). [10] See, for example, GAO, Defense Inventory: Opportunities Exist to Improve Spare Parts Support Aboard Deployed Navy Ships, GAO-03-887 (Washington, D.C.: Aug. 29, 2003); Military Pay: Army National Guard Personnel Mobilized to Active Duty Experienced Significant Pay Problems, GAO-04-89 (Washington, D.C.: Nov. 13, 2003); and DOD Travel Cards: Control Weaknesses Resulted in Millions of Dollars of Improper Payments, GAO-04-576 (Washington, D.C.: June 9, 2004). [11] GAO-06-497T. The eight specific DOD high-risk areas are: (1) approach to business transformation, (2) business systems modernization, (3) contract management, (4) financial management, (5) personnel security clearance, (6) supply chain management, (7) support infrastructure management, and (8) weapon systems acquisition. The six governmentwide high-risk areas are (1) disability programs, (2) interagency contracting, (3) information systems and critical infrastructure, (4) information sharing for homeland security, (5) human capital, and (6) real property. [12] CIO Council, A Practical Guide to Federal Enterprise Architecture, Version 1.0 (Feb. 2001). [13] The Clinger-Cohen Act of 1996, 40 U.S.C. § 11312 and 11315(b)(2). [14] The E-Government Act of 2002, Public Law 107-347 (Dec. 17, 2002). [15] OMB Capital Programming Guide, Version 1.0 (July 1997) and GAO, Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity, GAO-04-394G (Washington, D.C.: March 2004). [16] The Clinger-Cohen Act of 1996, 40 U.S.C. sections 11101-11704. This Act expanded the responsibilities of OMB and the agencies that had been set under the Paperwork Reduction Act with regard to IT management. See 44 U.S.C. 3504(a)(1)(B)(vi) (OMB); 44 U.S.C. 3506(h)(5) (agencies). [17] We have made recommendations to improve OMB's process for monitoring high-risk IT investments; see GAO, Information Technology: OMB Can Make More Effective Use of Its Investment Reviews, GAO-05-276 (Washington, D.C.: April 15, 2005). [18] This policy is set forth and guidance is provided in OMB Circular No. A-11 (Nov. 2, 2005) (section 300), and in OMB's Capital Programming Guide, which directs agencies to develop, implement, and use a capital programming process to build their capital asset portfolios. [19] GAO-04-394G. [20] GAO, Information Technology: A Framework for Assessing and Improving Enterprise Architecture Management (Version 1.1), GAO-03-584G (Washington, D.C.: April 2003); and A Practical Guide to Federal Enterprise Architecture, Version 1.0. [21] See, for example, GAO, Homeland Security: Efforts Under Way to Develop Enterprise Architecture, but Much Work Remains, GAO-04-777 (Washington, D.C.: Aug. 6, 2004); DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments, GAO-04- 731R (Washington, D.C.: May 17, 2004); Information Technology: Architecture Needed to Guide NASA's Financial Management Modernization, GAO-04-43 (Washington, D.C.: Nov. 21, 2003); DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, GAO-03-1018 (Washington, D.C.: Sept. 19, 2003); Business Systems Modernization: Summary of GAO's Assessment of the Department of Defense's Initial Business Enterprise Architecture, GAO- 03-877R (Washington, D.C.: July 7, 2003); Information Technology: DLA Should Strengthen Business Systems Modernization Architecture and Investment Activities, GAO-01-631 (Washington, D.C.: June 29, 2001); and Information Technology: INS Needs to Better Manage the Development of Its Enterprise Architecture, GAO/AIMD-00-212 (Washington, D.C.: Aug. 1, 2000). [22] GAO, Executive Guide: Improving Mission Performance Through Strategic Information Management and Technology, GAO/AIMD-94-115 (Washington, D.C.: May 1994); Office of Management and Budget, Evaluating Information Technology Investments, A Practical Guide (Washington, D.C.: Nov. 1995); GAO, Assessing Risks and Returns: A Guide for Evaluating Federal Agencies' IT Investment Decision-making, GAO/AIMD-10.1.13 (Washington, D.C.: Feb. 1997); and GAO-04-394G. [23] GAO-03-584G. [24] GAO-04-394G. [25] The Business Management Modernization Program's mission for advancing departmentwide business transformation efforts, particularly with regard to business systems modernization, has been absorbed into the BTA. [26] An enterprise-level system supports cross-organizational requirements, rather than a single group or component within an agency or organization. A DOD-wide system refers to a system for all of DOD. For example, the Defense Civilian Personnel Data System is the system that standardizes civilian human resource processes and promotes efficiency of service delivery for all DOD civilian personnel. An enterprise-level initiative refers to an initiative of an enterprise, rather than a group or component within an agency or organization. At DOD, an enterprise-level initiative can be an enterprise system, program, project, activity, or a family of enterprise systems. [27] According to DOD, major releases are to have substantially new architecture content that incorporates emerging enterprise priorities and capabilities in support of DOD enterprise systems and initiatives and the IRBs. Minor releases are not to contain new enterprise priorities or business capabilities, but instead are to provide extension and ’clean up“ of the preceding releases. [28] DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (Aug. 2003) and Volume 2 (Feb. 2004). [29] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [30] GAO, Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, GAO-01-525 (Washington, D.C.: May 17, 2001); DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, GAO-03-458 (Washington, D.C.: Feb. 28, 2003); Information Technology: Observations on Department of Defense's Draft Enterprise Architecture, GAO-03-571R (Washington, D.C.: Mar. 28, 2003); Business Systems Modernization: Summary of GAO's Assessment of the Department of Defense's Initial Business Enterprise Architecture, GAO-03-877R (Washington, D.C.: July 7, 2003); DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, GAO-03-1018 (Washington, D.C.: Sept. 19, 2003); DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments, GAO-04-731R (Washington, D.C.: May 17, 2004); DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, GAO-05-381 (Washington, D.C.: April 29, 2005); DOD Business Systems Modernization: Long-standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, GAO-05-702 (Washington, D.C.: July 22, 2005). [31] GAO-06-219. [32] GAO-06-219; and Defense Management: Foundational Steps Being Taken to Manage DOD Business Systems Modernization, but Much Remains to be Accomplished to Effect True Business Transformation, GAO-06-234T (Washington, D.C.: Nov. 9, 2005). [33] GAO-06-219. [34] The United States Standard General Ledger provides a uniform chart of accounts and technical guidance used in standardizing federal agency accounting. [35] SFIS is the department's common financial business language. [36] Intra-governmental transactions involve sales, services, or transfers between two entities of the federal government. [37] The ENT designation represents all business enterprise priorities. [38] DOD defines the Global Information Grid as the globally interconnected, end-to-end set of information, capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. [39] GAO-06-219. [40] See, for example, J. A. Zachman, "A Framework for Information Systems Architecture," IBM Systems Journal 26, no. 3 (1987); Paula Hagan, "Relating Elements of the Zachman Framework, Spewak's Enterprise Architecture Planning, and DOD Products" (June 18, 2002); and B. Craig Meyers and Patricia Oberndorf, "Managing Software Acquisition Open Systems and COTS Products" (Addison-Wesley, 2001). [41] DOD "components" include the military services, combatant commands, defense agencies, and DOD field activities. [42] GAO-06-219. [43] This is a library of DOD standard accounting transactions that result from specific business events (e.g., ordering depot-level repair parts). It can be used as a baseline to institutionalize the United States Standard General Ledger across components; and along with SFIS, it provides a standard for DOD to update existing (and deploy new) business systems. [44] GAO-06-219. [45] GAO-06-219. [46] DOD included system and budget information for the Defense Financial and Accounting Service and Defense Logistics Agency in the transition plan. DOD did not include this information for the following defense agencies: (1) Ballistic Missile Defense Organization, (2) Defense Advanced Research Projects Agency, (3) Defense Commissary Agency, (4) Defense Contract Audit Agency, (5) Defense Contract Management Agency, (6) Defense Information Systems Agency, (7) Defense Intelligence Agency, (8) Defense Legal Services Agency, (9) Defense Security Cooperation Agency, (10) Defense Security Service, (11) Defense Threat Reduction Agency, (12) National Imagery and Mapping Agency, and (13) National Security Agency. [47] DOD included system and budget information for the Transportation Command in the transition plan. DOD did not include this information for the (1) Central Command, (2) Joint Forces Command, (3) Pacific Command, (4) Southern Command, (5) Space Command, (6) Special Operations Command, (7) European Command, and (8) Strategic Command. [48] As defined in the department's Investment Review Process Overview and Concept of Operations for Investment Review Boards, tier 1 systems include all systems that are classified as a "major automated information system" or a "major defense acquisition program." A major automated information system is a program or initiative that is so designated by the ASD(NII)/CIO or that is estimated to require program costs in any single year in excess of $32 million (fiscal year 2000 constant dollars), total program costs in excess of $126 million (fiscal year 2000 constant dollars), or total life-cycle costs in excess of $378 million (fiscal year 2000 constant dollars). A major defense acquisition program is so designated by the Secretary of Defense, or it is a program estimated by the Secretary of Defense to require an eventual total expenditure for research, development, test, and evaluation of more than $300 million (fiscal year 1990 constant dollars) or an eventual total expenditure for procurement of more than $1.8 billion (fiscal year 1990 constant dollars). Tier 2 systems include those with modernization efforts of $10 million or greater but that are not designated as a major automated information system or a major defense acquisition program, or programs that have been designated as IRB interest programs because of their impact on DOD transformation objectives. The tier system includes another tier in addition to these two: tier 3 systems are modernization efforts that have anticipated costs greater than $1 million but less than $10 million. [49] GAO-06-219. [50] NCES is intended to provide capabilities that are key to enabling ubiquitous access to reliable decision-quality information. NCES capabilities can be packaged into four product lines: service-oriented architecture foundation (e.g., security and information assurance), collaboration (e.g., application sharing), content discovery and delivery (e.g., delivering information across the enterprise), and portal (e.g., user-defined Web-based presentation). [51] The Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 specifies information that the department is to incorporate in its budget request for fiscal year 2006 and each fiscal year thereafter. Specifically, the Act states that each budget request must include information on (1) each defense business system for which funding is being requested; (2) all funds, by appropriation, for each such business system, including funds by appropriation specifically for current services (operation and maintenance) and systems modernization; and (3) the designated approval authority for each business system. [52] Approval authorities, including the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Under Secretary of Defense (Comptroller); the Under Secretary of Defense for Personnel and Readiness; the Assistant Secretary of Defense for Networks and Information Integration/Chief Information Officer of the Department of Defense; and the Deputy Secretary of Defense or an Under Secretary of Defense, as designated by the Secretary of Defense, are responsible for the review, approval, and oversight of business systems and must establish investment review processes for systems under their cognizance. [53] A key condition identified in the Act includes certification by designated approval authorities that the defense business system modernization is (1) in compliance with the enterprise architecture; (2) necessary to achieve critical national security capability or address a critical requirement in an area such as safety or security; or (3) necessary to prevent a significant adverse effect on a project that is needed to achieve an essential capability, taking into consideration the alternative solutions for preventing such an adverse effect. [54] 31 U.S.C. § 1341(a) (1) (A); see 10 U.S.C. § 2222(b). [55] GAO-04-615 and Army Depot Maintenance: Ineffective Oversight of Depot Maintenance Operations and System Implementation Efforts, GAO-05- 441 (Washington, D.C.: June 30, 2005). [56] GAO-04-615. [57] GAO-05-381. [58] One of our recommendations was absorbed into another recommendation, which resulted in a total of 29 remaining open recommendations. [59] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Public Law 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [60] J.A. Zachman, "A Framework for Information Systems Architecture," IBM Systems Journal 26, no. 3 (1987). [61] DOD, Department of Defense Architecture Framework, Version 1.0, Volume 1 (Aug. 2003) and Volume 2 (Feb. 2004). [62] There are some overarching aspects of architecture that relate to all three of the views. These overarching aspects--such as goals, mission statements, and concepts of operations--are captured in the All- view products. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.