DOD Business Systems Modernization
Progress in Establishing Corporate Management Controls Needs to Be Replicated Within Military Departments
Gao ID: GAO-08-705 May 15, 2008
In 1995, GAO first designated the Department of Defense's (DOD) business systems modernization program as "high risk," and GAO continues to do so today. To assist in addressing this high-risk area, the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 contains provisions that are consistent with prior GAO investment management and enterprise architecture-related recommendations, and requires the department to submit annual reports to its congressional committees on its compliance with these provisions. The act also directs GAO to review each annual report. In response, GAO assessed the actions taken by DOD to comply with requirements of the act. To do so, GAO leveraged its recent reports on various aspects of the department's modernization management controls, and it reviewed, for example, the latest version of its business enterprise architecture and the associated transition plan and architecture federation strategy. GAO also interviewed key officials.
As part of DOD's continuing efforts to strengthen management of its business systems modernization program, it has taken steps over the last year to build on past efforts and further comply with the National Defense Authorization Act's requirements and related federal guidance. Notwithstanding this progress, aspects of these requirements and relevant guidance have yet to be fully satisfied. In particular, the military departments, under DOD's "federated" and "tiered" approach to establishing institutional modernization management controls, have lagged well behind DOD's corporate efforts, and the corporate efforts are still not yet where they need to be. For example, the latest version of DOD's corporate business enterprise architecture continues to add content needed to improve its completeness, consistency, understandability, and usability. Moreover, its latest architecture federation strategy is more detailed and explicit than the prior version. However, the corporate architecture is still missing important content, such as business rules for, and information flows among, certain business activities. Moreover, the architecture has yet to be federated. Specifically, the military departments, which are the largest members of the federation, do not yet have mature enterprise architecture programs, and the federation strategy aimed at accomplishing this is still evolving. GAO has existing recommendations to address these and other architecture issues. The updated enterprise transition plan, which provides a temporal investment roadmap for transitioning from the current architectural environment to the target environment, continues to identify systems and initiatives that are to fill business capability gaps and address the DOD-wide and component business priorities that are contained in the business enterprise architecture. However, the plan still does not include investments for all components and does not reflect key factors associated with properly sequencing planned investments, such as dependencies among investments and the capability to execute the plan. Furthermore, the military departments, which are the largest members of the business federation, have yet to fully develop their own architecturally-based transition plans. GAO has existing recommendations to address these and other transition plan issues. DOD and the military departments have yet to fully establish key investment review structures and have yet to define related policies and procedures for effectively performing both project-level and portfolio-based investment management. GAO has existing recommendations to address these and other investment issues. Until DOD fully implements GAO's existing recommendations relative to the act and related guidance, its business systems modernization will likely remain a high-risk program.
GAO-08-705, DOD Business Systems Modernization: Progress in Establishing Corporate Management Controls Needs to Be Replicated Within Military Departments
This is the accessible text file for GAO report number GAO-08-705
entitled 'DOD Business Systems Modernization: Progress in Establishing
Corporate Management Controls Needs to Be Replicated Within Military
Departments' which was released on May 15, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
United States Government Accountability Office:
GAO:
May 2008:
DOD Business Systems Modernization:
Progress in Establishing Corporate Management Controls Needs to Be
Replicated Within Military Departments:
GAO-08-705:
GAO Highlights:
Highlights of GAO-08-705, a report to congressional committees.
Why GAO Did This Study:
In 1995, GAO first designated the Department of Defense‘s (DOD)
business systems modernization program as ’high risk,“ and GAO
continues to do so today. To assist in addressing this high-risk area,
the Ronald W. Reagan National Defense Authorization Act for Fiscal Year
2005 contains provisions that are consistent with prior GAO investment
management and enterprise architecture-related recommendations, and
requires the department to submit annual reports to its congressional
committees on its compliance with these provisions. The act also
directs GAO to review each annual report. In response, GAO assessed the
actions taken by DOD to comply with requirements of the act. To do so,
GAO leveraged its recent reports on various aspects of the department‘s
modernization management controls, and it reviewed, for example, the
latest version of its business enterprise architecture and the
associated transition plan and architecture federation strategy. GAO
also interviewed key officials.
What GAO Found:
As part of DOD‘s continuing efforts to strengthen management of its
business systems modernization program, it has taken steps over the
last year to build on past efforts and further comply with the National
Defense Authorization Act‘s requirements and related federal guidance.
Notwithstanding this progress, aspects of these requirements and
relevant guidance have yet to be fully satisfied. In particular, the
military departments, under DOD‘s ’federated“ and ’tiered’ approach to
establishing institutional modernization management controls, have
lagged well behind DOD‘s corporate efforts, and the corporate efforts
are still not yet where they need to be. For example:
* The latest version of DOD‘s corporate business enterprise
architecture continues to add content needed to improve its
completeness, consistency, understandability, and usability. Moreover,
its latest architecture federation strategy is more detailed and
explicit than the prior version. However, the corporate architecture is
still missing important content, such as business rules for, and
information flows among, certain business activities. Moreover, the
architecture has yet to be federated. Specifically, the military
departments, which are the largest members of the federation, do not
yet have mature enterprise architecture programs, and the federation
strategy aimed at accomplishing this is still evolving. GAO has
existing recommendations to address these and other architecture
issues.
* The updated enterprise transition plan, which provides a temporal
investment roadmap for transitioning from the current architectural
environment to the target environment, continues to identify systems
and initiatives that are to fill business capability gaps and address
the DOD-wide and component business priorities that are contained in
the business enterprise architecture. However, the plan still does not
include investments for all components and does not reflect key factors
associated with properly sequencing planned investments, such as
dependencies among investments and the capability to execute the plan.
Furthermore, the military departments, which are the largest members of
the business federation, have yet to fully develop their own
architecturally-based transition plans. GAO has existing
recommendations to address these and other transition plan issues.
* DOD and the military departments have yet to fully establish key
investment review structures and have yet to define related policies
and procedures for effectively performing both project-level and
portfolio-based investment management. GAO has existing recommendations
to address these and other investment issues.
Until DOD fully implements GAO‘s existing recommendations relative to
the act and related guidance, its business systems modernization will
likely remain a high-risk program.
What GAO Recommends:
Because GAO has previously made recommendations to DOD aimed at putting
in place the management controls needed to fully comply with the act
and related federal guidance, it is not making additional
recommendations. DOD provided technical comments that have been
incorporated into the report.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-705]. For more
information, contact Randolph C. Hite at (202) 512-3439 or
hiter@gao.gov.
[End of section]
Report to Congressional Committees:
Contents:
Letter:
Results in Brief:
Background:
DOD Is Continuing to Improve Its Approach to Modernizing Business
Systems:
Conclusions:
Recommendations for Executive Action:
Agency Comments:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: DOD Business Systems Modernization Governance Entities' Roles,
Responsibilities, and Composition:
Table 2: DOD Investment Tiers:
Figures:
Figure 1: Simplified DOD Organizational Structure:
Figure 2: The Five ITIM Stages of Maturity with Critical Processes:
Figure 3: Simplified Diagram of DOD's Business Mission Area Federated
Architecture:
Abbreviations:
ASD(NII)/CIO: Assistant Secretary of Defense (Networks and Information
Integration)/Chief Information Officer:
BEA: business enterprise architecture:
BCL: Business Capability Lifecycle:
BTA: Business Transformation Agency:
CIO: chief information officer:
CMO: chief management officer
DBSMC: Defense Business Systems Management Committee:
DOD: Department of Defense:
EGB: Enterprise Guidance Board:
ETP: enterprise transition plan
GIG: global information grid:
IRB: Investment Review Board:
IT: information technology:
ITIM: Information Technology Investment Management framework:
IV&V: independent verification and validation:
NCES: Net-Centric Enterprise Services:
OMB: Office of Management and Budget:
SOA: service-oriented architecture:
USD(AT&L): Under Secretary of Defense (Acquisition, Technology, and
Logistics):
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
May 15, 2008:
Congressional Committees:
For decades, the Department of Defense (DOD) has been challenged in
modernizing its timeworn business systems.[Footnote 1] In 1995, we
designated DOD's business systems modernization program as high risk,
and we continue to designate it as such today.[Footnote 2] As our
research on public and private sector organizations shows, two
essential ingredients to a successful systems modernization program are
having a well-defined enterprise architecture[Footnote 3] and an
effective institutional approach to managing information technology
(IT) investments.
Accordingly, we made recommendations to the Secretary of Defense in May
2001 that included the means for effectively developing an enterprise
architecture and establishing a corporate, architecture-centric
approach to investment control and decision making.[Footnote 4] Between
2001 and 2005, we reported that the department's business systems
modernization program continued to lack both of these, concluding in
2005 that hundreds of millions of dollars had been spent on a business
enterprise architecture (BEA) and investment management structures that
had limited value.[Footnote 5] Accordingly, we made more explicit
architecture and investment management-related recommendations.
To further assist DOD in addressing these modernization management
challenges, Congress included provisions in the Ronald W. Reagan
National Defense Authorization Act for Fiscal Year 2005 [Footnote 6]
that were consistent with our recommendations. More specifically, the
act required the department to, among other things, (1) develop a BEA,
(2) develop a transition plan to implement the architecture, (3)
identify systems information in its annual budget submission, (4)
establish a system investment approval and accountability structure,
(5) establish an investment review process, and (6) certify and approve
any system modernizations costing in excess of $1 million. The act
further requires that the Secretary of Defense submit an annual report
to congressional defense committees on DOD's compliance with certain
requirements of the act not later than March 15 of each year from 2005
through 2009. Additionally, the act directs us to submit to these
congressional committees--within 60 days of DOD's report submission--an
assessment of DOD's actions to comply with these requirements.
As agreed with your offices, the objective of our review was to assess
the actions taken by DOD to comply with requirements of section 2222 of
Title 10, U.S. Code. To accomplish this, we used our prior annual
report under the act[Footnote 7] as a baseline, analyzing whether the
department had taken actions to comply with those provisions of the
act, related guidance, and our prior recommendations that we had
previously identified as not yet addressed. In doing this, we also
relied on the results of relevant reports that we have issued since our
prior annual report.[Footnote 8] We conducted this performance audit at
DOD headquarters in Arlington, Virginia, from March to May 2008, in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. Details on our
objectives, scope, and methodology are contained in appendix I.
Results in Brief:
DOD continues to take steps to comply with legislative requirements and
related guidance pertaining to its business systems modernization high-
risk area. In particular, on March 14, 2008, DOD released a new version
of its BEA and issued its annual report to congressional defense
committees describing steps taken and planned relative to the act's
requirements, among other things. The steps address several of the
missing elements that we previously identified relative to the
legislative provisions and related best practices concerning the BEA,
enterprise transition plan, and investment management, and continue to
address the act's requirements relative to business system budgetary
disclosure and certification and approval of systems costing in excess
of $1 million. However, additional steps are needed to fully comply
with the act and relevant guidance:
* The latest version of the BEA resolves several of the architecture
gaps associated with the prior version, such as adding business rules
and data attributes. However, like the previous version, its focus is
largely on DOD-wide corporate policies, capabilities, rules, and
standards. While these are essential to meeting the act's requirements,
this version has yet to be augmented by the DOD component
organizations' subsidiary architectures that also are essential to
meeting the act's requirements and the department's goal of having a
federated family of architectures. DOD has taken some steps toward
extending its architecture through its recently updated federation
strategy, however the military departments' architecture programs
remain immature, particularly those of the Army and the Navy. To
address these challenges, we have existing recommendations that DOD has
agreed to implement.[Footnote 9] Once these challenges are addressed,
the federated BEA should provide a more sufficient frame of reference
to optimally guide and constrain DOD-wide system investments.
* The updated transition plan continues to identify more systems and
initiatives that are to fill business capability gaps and address DOD-
wide and component business priorities. Further, the plan continues to
provide a range of information for each identified system and
initiative (e.g., budget information, performance metrics, and
milestones), and it identifies legacy systems that will not be part of
DOD's target architectural environment. However, this latest transition
plan still does not include system investment information for all
organizational components (e.g., defense agencies). Moreover, the plan
does not yet sequence the planned investments based on a range of
relevant factors, such as technology opportunities, marketplace trends,
institutional system development and acquisition capabilities, legacy
and new system dependencies and life expectancies, and the projected
value of competing investments. Finally, the plan is not augmented by
military department enterprisewide transition plans that are based on
analyses of the gaps between their respective current and target
architectures. Thus, component-unique investments may not have been
chosen based on an enterprisewide strategy, and thus may not represent
the optimal investment mix and sequence. We have existing
recommendations aimed at addressing these issues that DOD has agreed to
implement.[Footnote 10] Once they are addressed, the department will be
better positioned to effectively and efficiently migrate to a more
modernized systems environment.
* The department's fiscal year 2009 budget submission provides a range
of information on its approximately 3,000 business systems, of which
273 are listed as development/modernization investments. Consistent
with the act, the types of information provided include system name,
designated approval authority, and funding development/modernization
versus operations/maintenance activities.
* The department has established and begun implementing most of the
investment review structures and processes that are consistent with the
act. However, it has yet to establish one of the five investment review
boards that are required pursuant to the act, and has not defined
related investment management policies and procedures in a manner that
is consistent with relevant guidance. In particular, the Enterprise
Information Environment Mission Area review board has not been
chartered, although DOD officials told us that the department
anticipates issuing a policy shortly that, among other things, will
establish an information technology infrastructure guidance board that
will meet the act's requirement. In addition, neither DOD nor the
military departments have defined the full range of project-level and
portfolio-based IT investment management policies and procedures that
are necessary to meet the investment selection and control provisions
of the Clinger-Cohen Act of 1996. To address these investment
management limitations, we have previously made recommendations that
DOD has agreed to implement.[Footnote 11] In this regard, the
department reports that it is defining missing policies and procedures
in its new business capability lifecycle methodology. However, this
methodology has not been approved and released. Moreover, based on a
draft of the methodology, it may not address all the investment
management policy and procedure gaps that our recommendations address.
Until DOD and the military departments have well-defined investment
management processes, its business systems and portfolios of systems
will continue to risk being inconsistently and improperly selected and
controlled.
* The department continues to certify and approve business systems as
directed by the act. As of September 30, 2007, the department reported
that its highest investment review and decision-making body, the
Defense Business System Management Committee, had approved 314 systems
that had been certified by DOD's Investment Review Boards. According to
DOD, the 314 systems represent the total number of certified and
approved systems since the act became effective and includes all
modernization investments that involved at least $1 million in
obligations through fiscal year 2007. Since then, the department
reports that it has certified and approved 39 additional investments
during fiscal year 2008.
Notwithstanding the progress that DOD continues to make in meeting the
business systems modernization provisions of the act and related
federal guidance, more needs to be accomplished, particularly with
respect to the institutionalization of modernization management
controls by the department's largest component organizations--the
military departments. In this regard, we have made a number of
recommendations that provide an effective roadmap for progress. As a
result, we are not making additional recommendations at this time, but
would add that until DOD fully implements our existing modernization
management-related recommendations, its business systems modernization
will likely remain a high-risk program.
In comments on a draft of this report, signed by the Deputy Under
Secretary of Defense (Business Transformation), the department stated
that it appreciated our support in advancing its business
transformation efforts. It also provided several technical comments
that we have incorporated throughout the report, as appropriate.
Background:
DOD is a massive and complex organization. The department reported that
its fiscal year 2007 operations involved approximately $1.5 trillion in
assets and $2.1 trillion in liabilities; more than 2.9 million military
and civilian personnel; and $544 billion in net cost of operations. For
fiscal year 2008, the department has received discretionary budget
authority for about $546 billion and reports total obligations of about
$492 billion to support ongoing operations and activities related to
the Global War on Terrorism. Organizationally, the department includes
the Office of the Secretary of Defense, the Chairman of the Joint
Chiefs of Staff, the military departments, numerous defense agencies
and field activities, and various unified combatant commands that are
either responsible for specific geographic regions or specific
functions. (See fig. 1 for a simplified depiction of DOD's
organizational structure.)
Figure 1: Simplified DOD Organizational Structure:
[See PDF for image]
The simplified DOD organizational structure is illustrated as follows:
Top Level:
Secretary of Defense;
* Deputy Secretary of Defense;
Second level:
* Department of the Army;
* Department of the Navy;
* Department of the Air Force;
* Office of the Secretary of Defense;
- DOD Field Activities;
- Defense Agencies;
* Inspector General;
* Joint Chiefs of Staff;
* Combatant Commands[A].
Source: GAO based on DOD documentation.
[A] The Chairman of the Joint Chiefs of Staff serves as the spokesman
for the commanders of the combatant commands, especially on the
administrative requirements of the commands.
[End of figure]
In support of its military operations, the department performs an
assortment of interrelated and interdependent business functions,
including logistics management, procurement, health care management,
and financial management. As we have previously reported,[Footnote 12]
the DOD systems environment that supports these business functions is
overly complex and error prone, and is characterized by (1) little
standardization across the department, (2) multiple systems performing
the same tasks, (3) the same data stored in multiple systems, and (4)
the need for data to be entered manually into multiple systems.
Moreover, the department recently reported that this systems
environment is comprised of approximately 3,000 separate business
systems. For fiscal year 2007, Congress appropriated approximately
$15.7 billion to DOD, and for fiscal year 2008, the department has
requested about $15.9 billion in appropriated funds to operate,
maintain, and modernize these business systems and associated IT
infrastructure.
As we have previously reported,[Footnote 13] the department's
nonintegrated and duplicative systems impair its ability to combat
fraud, waste, and abuse. In fact, DOD currently bears responsibility,
in whole or in part, for 15 of our 27 high-risk areas.[Footnote 14]
Eight of these areas are specific to the department,[Footnote 15] while
it shares responsibility for seven other governmentwide high-risk
areas.[Footnote 16] DOD's business systems modernization is one of the
high-risk areas, and it is an essential enabler to addressing many of
the department's other high-risk areas. For example, modernized
business systems are integral to the department's efforts to address
its financial, supply chain, and information security management high-
risk areas.
Enterprise Architecture and IT Investment Management Controls Are
Critical to Achieving Successful Systems Modernization:
Effective use of an enterprise architecture--a modernization blueprint-
-is a hallmark of successful public and private organizations. For more
than a decade, we have promoted the use of architectures to guide and
constrain systems modernization, recognizing them as a crucial means to
this challenging goal: optimally defined operational and technological
environments. Congress, the Office of Management and Budget (OMB), and
the federal Chief Information Officer's (CIO) Council also have
recognized the importance of an architecture-centric approach to
modernization. The Clinger-Cohen Act of 1996[Footnote 17] mandates that
an agency's CIO develop, maintain, and facilitate the implementation of
an information technology architecture. Further, the E-Government Act
of 2002[Footnote 18] requires OMB to oversee the development of
enterprise architectures within and across agencies. In addition, we,
OMB, and the CIO Council have issued guidance that emphasizes the need
for system investments to be consistent with these
architectures.[Footnote 19]
A corporate approach to IT investment management is characteristic of
successful public and private organizations. Recognizing this, Congress
enacted the Clinger-Cohen Act of 199[Footnote 20]6, which requires OMB
to establish processes to analyze, track, and evaluate the risks and
results of major capital investments in IT systems made by executive
agencies.[Footnote 21] In response to the Clinger-Cohen Act and other
statutes, OMB has developed policy and issued guidance for planning,
budgeting, acquisition, and management of federal capital
assets.[Footnote 22] We also have issued guidance in this area.
[Footnote 23]
Enterprise Architecture: A Brief Description:
An enterprise architecture provides a clear and comprehensive picture
of an entity, whether it is an organization (e.g., a federal
department) or a functional or mission area that cuts across more than
one organization (e.g., financial management). This picture consists of
snapshots of both the enterprise's current ("As Is") environment and
its target ("To Be") environment. These snapshots consist of "views,"
which are one or more interdependent and interrelated architecture
products (e.g., models, diagrams, matrixes, and text) that provide
logical or technical representations of the enterprise. The
architecture also includes a transition or sequencing plan, which is
based on an analysis of the gaps between the "As Is" and "To Be"
environments; this plan provides a temporal road map for moving between
the two environments and incorporates such considerations as technology
opportunities, marketplace trends, fiscal and budgetary constraints,
institutional system development and acquisition capabilities, legacy
and new system dependencies and life expectancies, and the projected
value of competing investments.
The suite of products produced for a given entity's enterprise
architecture, including its structure and content, is largely governed
by the framework used to develop the architecture. Since the 1980s,
various architecture frameworks have been developed, such as John A.
Zachman's "A Framework for Information Systems Architecture"[Footnote
24] and the DOD Architecture Framework.[Footnote 25]
The importance of developing, implementing, and maintaining an
enterprise architecture is a basic tenet of both organizational
transformation and systems modernization. Managed properly, an
enterprise architecture can clarify and help optimize the
interdependencies and relationships among an organization's business
operations (and the underlying IT infrastructure and applications) that
support these operations. Moreover, when an enterprise architecture is
employed in concert with other important management controls, such as
portfolio-based capital planning and investment control practices,
architectures can greatly increase the chances that an organization's
operational and IT environments will be configured to optimize mission
performance. Our experience with federal agencies has shown that
investing in IT without defining these investments in the context of an
architecture often results in systems that are duplicative, not well
integrated, and unnecessarily costly to maintain and
interface.[Footnote 26]
One approach to structuring an enterprise architecture is referred to
as a federated enterprise architecture. Such a structure treats the
architecture as a family of coherent but distinct member architectures
that conform to an overarching architectural view and rule set. This
approach recognizes that each member of the federation has unique goals
and needs as well as common roles and responsibilities with the levels
above and below it. Under a federated approach, member architectures
are substantially autonomous, although they also inherit certain rules,
policies, procedures, and services from higher-level architectures. As
such, a federated architecture enables component organization autonomy
while ensuring enterprisewide linkages and alignment where appropriate.
Where commonality among components exists, there also are opportunities
for identifying and leveraging shared services.
A service-oriented architecture (SOA) is an approach for sharing
business capabilities across the enterprise by designing functions and
applications as discrete, reusable, and business-oriented services. As
such, service orientation permits sharing capabilities that may be
under the control of different component organizations. As we have
previously reported,[Footnote 27] such capabilities or services need to
be, among other things, (1) self-contained, meaning that they do not
depend on any other functions or applications to execute a discrete
unit of work; (2) published and exposed as self-describing business
capabilities that can be accessed and used; and (3) subscribed to via
well-defined and standardized interfaces. A SOA approach is thus not
only intended to reduce redundancy and increase integration, but also
to provide the kind of flexibility needed to support a quicker response
to changing and evolving business requirements and emerging conditions.
IT Investment Management: A Brief Description:
IT investment management is a process for linking IT investment
decisions to an organization's strategic objectives and business plans
that focuses on selecting, controlling, and evaluating investments in a
manner that minimizes risks while maximizing the return of
investment.[Footnote 28]
* During the selection phase, the organization (1) identifies and
analyzes each project's risks and returns before committing significant
funds to any project and (2) selects those IT projects that will best
support its mission needs.
* During the control phase, the organization ensures that, as projects
develop and investment expenditures continue, they continue to meet
mission needs at the expected levels of cost and risk. If the project
is not meeting expectations or if problems arise, steps are quickly
taken to address the deficiencies.
* During the evaluation phase, actual versus expected results are
compared once a project has been fully implemented. This is done to (1)
assess the project's impact on mission performance, (2) identify any
changes or modifications to the project that may be needed, and (3)
revise the investment management process based on lessons learned.
Consistent with this guidance, our IT Investment Management framework
(ITIM)[Footnote 29] consists of five progressive stages of maturity for
any given agency relative to selecting, controlling, and evaluating its
investment management capabilities. (See fig. 2 for the five ITIM
stages of maturity.) Stage 2 critical processes lay the foundation by
establishing successful, predictable, and repeatable investment control
processes at the project level. Stage 3 is where the agency moves from
project-centric processes to portfolio-based processes and evaluates
potential investments according to how well they support the agency's
missions, strategies, and goals. Organizations implementing these
Stages 2 and 3 practices have in place selection, control, and
evaluation processes that are consistent with the Clinger-Cohen
Act.[Footnote 30] Stages 4 and 5 require the use of evaluation
techniques to continuously improve both investment processes and
portfolios in order to better achieve strategic outcomes.
Figure 2: The Five ITIM Stages of Maturity with Critical Processes:
[See PDF for image]
This figure is an illustration of the five ITIM Stages of Maturity with
Critical Processes. Each stage builds upon the previous stage. The
following information is illustrated:
Maturity stage: Stage 1: Creating investment awareness;
Critical processes: IT spending without disciplined investment
processes.
Maturity stage: Stage 2: Building the investment foundation;
Critical processes:
- Instituting the investment board;
- Meeting business needs;
- Selecting an investment;
- Providing investment oversight;
- Capturing investment information.
Maturity stage: Stage 3: Developing a complete investment portfolio;
Critical processes:
- Defining the portfolio criteria;
- Creating the portfolio;
- Evaluating the portfolio;
- Conducting post-implementation reviews.
Maturity stage: Stage 4: Improving the investment process;
Critical processes:
- Improving the portfolio's performance;
- Managing the succession of information systems.
Maturity stage: Stage 5: Leveraging IT for strategic outcomes;
Critical processes:
- Optimizing the investment process;
- Using IT to drive strategic business change.
Source: GAO.
[End of figure]
The overriding purpose of the framework is to encourage investment
selection, control, and evaluate processes that promote business value
and mission performance, reduce risk, and increase accountability and
transparency. We have used the framework in several of our
evaluations,[Footnote 31] and a number of agencies have adopted it.
With the exception of the first stage, each maturity stage is composed
of "critical processes" that must be implemented and institutionalized
in order for the organization to achieve that stage. Each ITIM critical
process consists of "key practices"--to include organizational
structures, policies, and procedures--that must be executed to
implement the critical process. Our research shows that agency efforts
to improve investment management capabilities should focus on
implementing all lower stage practices before addressing higher stage
practices.
DOD's Institutional Approach to Business Systems Modernization:
In 2005, the department reassigned responsibility for providing
executive leadership for the direction, oversight, and execution of its
business systems modernization efforts to several entities. These
entities and their responsibilities include the Defense Business
Systems Management Committee (DBSMC), which serves as the highest
ranking investment review and decision-making body for business systems
modernization activities; the Principal Staff Assistants, who serve as
the certification authorities for business system modernizations in
their respective core business missions; the Investment Review Boards
(IRB), which are chaired by the certifying authorities and form the
review and decision-making bodies for business system investments in
their respective areas of responsibility; and the Business
Transformation Agency (BTA), which is responsible for supporting the
DBSMC and the IRBs, and for leading and coordinating business
transformation efforts across the department. DOD's component
organizations, to varying degrees, have leveraged existing, and
established new, business system governance bodies to support their
respective investment precertification responsibilities.
Table 1 lists these entities and provides greater detail on their
roles, responsibilities, and composition.
Table 1: DOD Business Systems Modernization Governance Entities' Roles,
Responsibilities, and Composition:
Entity: DBSMC;
Roles and responsibilities:
* Provides strategic direction and plans for the business mission
area[A] in coordination with the warfighting and enterprise information
environment mission areas;
* Recommends policies and procedures required to integrate DOD business
transformation and attain cross-department, end-to-end interoperability
of business systems and processes;
* Serves as approving authority for business system modernization;
* Establishes policies and approves the business mission area[A]
strategic plan, the enterprise transition plan for implementation for
business systems modernization, the transformation program baseline,
and the BEA;
Composition: Chaired by the Deputy Secretary of Defense; Vice Chair is
the Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)). Includes senior leadership in the Office of the
Secretary of Defense, the military departments' secretaries, and
defense agencies' heads, such as the Assistant Secretary of Defense
(Networks and Information Integration)/Chief Information Officer
(ASD(NII)/CIO), the Vice Chairman of the Joint Chiefs of Staff, and the
Commanders of the U.S. Transportation Command and Joint Forces Command.
Entity: Principal Staff Assistants/Certification Authorities;
Roles and responsibilities:
* Support the DBSMC's management of enterprise business IT investments;
* Serve as the certification authorities accountable for the obligation
of funds for respective business system modernizations within
designated core business missions[B];
* Provide the DBSMC with recommendations for system investment
approval;
Composition: Under Secretaries of Defense for Acquisition, Technology,
and Logistics; Comptroller; and Personnel and Readiness.
Entity: IRBs;
Roles and responsibilities:
* Serve as the oversight and investment decision-making bodies for
those business capabilities that support activities under their
designated areas of responsibility;
* Recommend certification for all business systems investments costing
more than $1 million that are integrated and compliant with the BEA;
Composition: Includes the Principal Staff Assistants; Joint Staff;
ASD(NII)/CIO; core business mission area representatives; military
departments; defense agencies; and combatant commands.
Entity: Component Pre-Certification Authority;
Roles and responsibilities:
* Ensures component-level investment review processes integrate with
the Investment Management system;
* Identifies those component systems that require IRB certification and
prepare, review, approve, validate and transfer investment
documentation as required;
* Assesses and precertifies architecture compliance of component
systems submitted for certification and annual review;
* Acts as the component's principal point of contact for communication
with the IRBs;
Composition: Includes the Chief Information Officer from Air Force, the
Principal Director of Governance, Acquisition, and Chief Knowledge
Office from the Army; the Chief Information Officer from the Navy; and
comparable representatives from other defense agencies.
Entity: BTA;
Roles and responsibilities:
* Operates under the authority of the USD(AT&L) under the direction of
the Deputy Under Secretary of Defense for Business Transformation and
the Deputy Under Secretary of Defense for Financial Management;
* Maintains and updates the department's BEA and enterprise transition
plan;
* Ensures that functional priorities and requirements of various
defense components, such as the Army and Defense Logistics Agency are
reflected in the architecture;
* Ensures adoption of DOD-wide information and process standards as
defined in the architecture;
* Serves as the day-to-day management entity of the business
transformation effort at the DOD enterprise level;
* Provides support to the DBSMC and IRBs;
Composition: Comprised of eight directorates (Chief of Staff, Defense
Business Systems Acquisition Executive, Enterprise Integration,
Enterprise Planning and Investment, Priorities and Requirements
Financial Management, Priorities and Requirements Human Resource
Management, Priorities and Requirements Supply Chain Management, and
Warfighter Support Office).
Source: DOD.
[A] According to DOD, the business mission area is responsible for
ensuring that capabilities, resources, and materiel are reliably
delivered to the warfighter. Specifically, the business mission area
addresses areas such as real property and human resources management.
[B] DOD has five core business missions: Human Resources Management,
Weapon System Lifecycle Management, Materiel Supply and Service
Management, Real Property and Installations Lifecycle Management, and
Financial Management.
[End of table]
Tiered Accountability:
In 2005, DOD reported that it had adopted a "tiered accountability"
approach to business transformation. Under this approach,
responsibility and accountability for business architectures and
systems investment management are assigned to different levels in the
organization. For example, the BTA is responsible for developing the
corporate BEA (i.e., the thin layer of corporate policies,
capabilities, standards, rules), and the associated enterprise
transition plan (ETP). The components are responsible for defining a
component-level architecture and transition plans associated with their
own tier of responsibility and for doing so in a manner that is aligned
with (i.e., does not violate) the corporate BEA. Similarly, program
managers are responsible for developing program-level architectures and
plans and ensuring alignment with the architectures and transition
plans above them. This concept is to allow for autonomy while also
ensuring linkages and alignment from the program level through the
component level to the enterprise level. Table 2 describes the four
investment tiers and identifies the associated reviewing and approving
entities.
Table 2: DOD Investment Tiers:
Tier description:
Tier 1; MDAP[A] or MAIS[B];
Reviewing/Approving entities: IRB and DBSMC.
Tier description:
Tier 2; Exceeding $10 million in total development/modernization costs,
but not designated as a MAIS or MDAP;
Reviewing/Approving entities: IRB and DBSMC.
Tier description:
Tier 3; Exceeding $1 million and up to $10 million in total
development/modernization costs;
Reviewing/Approving entities: IRB and DBSMC.
Tier description:
Tier 4; Investment funding required up to $1 million;
Reviewing/Approving entities: Component-level review only (unless the
system or line of business it supports is designated as special
interest by the Certification Authority).
Source: DOD.
[A] A MDAP is an acquisition program so designated by the Under
Secretary of Defense for Acquisition, Technology, and Logistics or that
is estimated to require an eventual total expenditure for research,
development, and test and evaluation of more than $365 million (fiscal
year 2000 constant dollars) or, for procurement, of more than $2.190
billion (fiscal year 2000 constant dollars).
[B] A MAIS is a program or initiative that is so designated by the
Assistant Secretary of Defense (Networks and Information
Integration)/Chief Information Officer or that is estimated to require
program costs in any single year in excess of $32 million (fiscal year
2000 constant dollars), total program costs in excess of $126 million
(fiscal year 2000 constant dollars), or total life-cycle costs in
excess of $378 million (fiscal year 2000 constant dollars).
[End of table]
Summary of Fiscal Year 2005 National Defense Authorization Act
Requirements:
Congress included six provisions in the fiscal year 2005 National
Defense Authorization Act[Footnote 32] that are aimed at ensuring DOD's
development of a well-defined BEA and associated ETP, as well as the
establishment and implementation of effective investment management
structures and processes. The requirements are as follows:
1. Develop a BEA that includes an information infrastructure that, at a
minimum, would:
* comply with all federal accounting, financial management, and
reporting requirements;
* routinely produce timely, accurate, and reliable financial
information for management purposes;
* integrate budget, accounting, and program information and systems;
* provide for the systematic measurement of performance, including the
ability to produce timely, relevant, and reliable cost information;
* include policies, procedures, data standards, and system interface
requirements that are to be applied uniformly throughout the
department; and:
* be consistent with OMB policies and procedures.
2. Develop an ETP for implementing the architecture that includes:
* an acquisition strategy for new systems needed to complete the
enterprise architecture;
* a list and schedule of legacy business systems to be terminated;
* a list and strategy of modifications to legacy business systems; and:
* time-phased milestones, performance metrics, and a statement of
financial and non-financial resource needs.
3. Identify each business system proposed for funding in DOD's fiscal
year budget submissions and include:
* description of the certification made on each business system
proposed for funding in that budget;
* funds, identified by appropriations, for current services and for
business systems modernization; and:
* the designated approval authority for each business system.
4. Delegate the responsibility for business systems to designated
approval authorities within the Office of the Secretary of Defense.
5. Require each approval authority to establish investment review
structures and processes, including a hierarchy of IRBs--each with
appropriate representation from across the department. The review
process must cover:
* review and approval of each business system by an IRB before funds
are obligated;
* at least an annual review of every business system investment;
* use of threshold criteria to ensure an appropriate level of review
and accountability;
* use of procedures for making architecture compliance certifications;
* use of procedures consistent with DOD guidance; and:
* incorporation of common decision criteria.
6. Effective October 1, 2005, DOD may not obligate appropriated funds
for a defense business system modernization with a total cost of more
than $1 million unless the approval authority certifies that the
business system modernization:
* complies with the BEA and:
* is necessary to achieve a critical national security capability or
address a critical requirement in an area such as safety or security;
or is necessary to prevent a significant adverse effect on an essential
project in consideration of alternative solutions, and the
certification is approved by the DBSMC.
Summary of Recent GAO Reviews of DOD's Business Systems Modernization
and Business Transformation Efforts:
In November 2005,[Footnote 33] May 2006,[Footnote 34] and May 2007,
[Footnote 35] we reported that DOD had partially satisfied four of the
six business system modernization requirements in the fiscal year 2005
National Defense Authorization Act[Footnote 36] relative to
architecture development, transition plan development, budgetary
disclosure, and investment review. In addition, we reported that it had
fully satisfied the requirement concerning designated approval
authorities and it was in the process of satisfying the last
requirement for certification and approval of modernizations costing in
excess of $1 million. As a result, each report concluded that the
department had made important progress in defining and beginning to
implement institutional management controls (i.e., processes,
structures, and tools). However, each report also concluded that much
remained to be accomplished relative to the act's requirements and
relevant guidance. Among other things, this included developing
component architectures that are aligned with the corporate BEA and
ensuring that investment review and approval processes are fully
developed and institutionally implemented across all organizational
levels.
Notwithstanding this progress on business systems modernization, we
previously reported[Footnote 37] and more recently testified in
February 2008[Footnote 38] that two items remained to be done before
DOD's overall business transformation efforts, which include business
systems modernization, would be on a sustainable path to success.
First, DOD had yet to establish a strategic planning process that
results in a comprehensive, integrated, and enterprisewide plan or set
of plans that would guide transformation. Second, DOD had yet to
designate a senior official who could provide full-time attention and
oversight to the business transformation effort. Subsequently, the
National Defense Authorization Act for Fiscal Year 2008 designated the
Deputy Secretary of Defense as the department's Chief Management
Officer (CMO), created a Deputy CMO position, and designated the
undersecretaries of each military department as CMOs for their
respective departments.[Footnote 39] The act also required the
Secretary of Defense, acting through the CMO, to develop a strategic
management plan that, among other things, is to include a detailed
description of performance goals and measures for improving and
evaluating the overall efficiency and effectiveness of the business
operations of the department. According to DOD, steps have been taken
and are ongoing to address these provisions.
We also testified in February 2008 that DOD continues to take steps to
comply with key business systems modernization legislative
requirements, but that much remained to be accomplished before the full
intent of this legislation would be achieved. In particular, we stated
that DOD's BEA, while addressing several issues previously reported by
us, was still not sufficiently complete to effectively and efficiently
guide and constrain business system investments across all levels of
the department. Most notably, the BEA did not yet include well-defined
architectures for DOD's components, and DOD's strategy for "federating"
or extending its architecture to the military departments and defense
agencies was still evolving and had yet to be implemented. In addition,
the scope and content of the department's ETP still did not address
DOD's complete portfolio of IT investments. We also testified that
while the department had established and begun to implement
legislatively mandated corporate investment review structures and
processes, neither DOD nor the military departments had done so in a
manner that was fully consistent with relevant guidance.
DOD Is Continuing to Improve Its Approach to Modernizing Business
Systems:
DOD continues to take steps to comply with the requirements of the act
and to satisfy relevant systems modernization management guidance. In
particular, on March 14, 2008, DOD released an update to its BEA
(version 5.0) and ETP, and issued its annual report to Congress
describing steps that have been taken and are planned relative to the
act's requirements, among other things. Collectively, these steps
address several legislative provisions and best practices concerning
the BEA, transition plan, budgetary disclosure, and investment review
of systems costing in excess of $1 million. However, additional steps
are needed to fully comply with the act and relevant guidance. Most
notably, the department has yet to extend and evolve its corporate BEA
to the department's component organizations' (military departments and
defense agencies) architectures and fully define IT investment
management policies and procedures at the corporate and component
levels. BTA officials agree that additional steps are needed to fully
implement the act's requirements and our related recommendations.
According to these officials, DOD leadership is committed to fully
addressing these areas and efforts are planned and under way to do so.
DOD Continues to Improve Its Corporate BEA, but Component Architectures
Remain a Challenge:
Among other things, the act requires DOD to develop a BEA that would
cover all defense business systems and the functions and activities
supported by defense business systems and enable the entire department
to (1) comply with all federal accounting, financial management, and
reporting requirements, (2) routinely produce timely, accurate, and
reliable financial information for management purposes, and (3) include
policies, procedures, data standards, and system interface requirements
that are to be applied throughout the department. As such, the act
provides for an architecture that extends to all defense organizational
components. In 2006, the department adopted an incremental and
federated approach to developing such an architecture. Under this
approach, the department committed to releasing new versions of its BEA
every 6 months that would include a corporate BEA that was augmented by
a coherent family of component architectures. As we have previously
reported, such an approach is consistent with best practices and
appropriate given the DOD's scope and size.
In 2007,[Footnote 40] we reported that the then current version of the
BEA (version 4.1) resolved several of the architecture gaps associated
with the prior version and added content proposed by DOD
stakeholders,[Footnote 41] but that gaps still remained. On March 14,
2008, DOD released BEA 5.0 which addresses some of these remaining
gaps. For example, it improves the Financial Visibility business
enterprise area by expanding the Standard Financial Information
Structure data elements (i.e., types of data) associated with
information exchanges among operational nodes (e.g., organizational
units or system functions) to include data attributes (characteristics
of data elements). In addition, the latest version introduces data
standards for the Enterprise Funds Distribution initiative. Together,
these additions bolster the department's efforts to standardize
financial data across DOD so that information is available to inform
corporate decision making.
Version 5.0 of the BEA also addresses, to varying degrees, missing
elements, inconsistencies, and usability issues that we previously
identified. Examples of these improvements and remaining issues are
summarized below.
* The latest version includes performance metrics for the business
capabilities within enterprise priority areas, including actual
performance relative to performance targets that are to be met. For
example, it states that 62 percent of DOD assets are now using the
Department of the Treasury's United States Standard General
Ledger[Footnote 42] compliant formats, as compared to a target of 100
percent. Further, this version provides actual baseline performance for
operational activities (e.g., "Manage Audit and Oversight of
Contractor"). As we previously reported,[Footnote 43] performance
models are an essential part of any architecture because having defined
performance baselines to measure actual performance against provides
the means for knowing whether the intended mission value to be
delivered by each business process is actually being realized.
* The latest version includes important "As Is" information (e.g.,
current capability problems and limitations that enterprise priorities
are to address and their root causes) for all six business enterprise
priorities. As we previously reported, such "As Is" content is
essential for analyzing capability gaps that in turn inform the plan
for transitioning from the "As Is" to the "To Be" environments.
* The latest version includes 1,201 new business rules. As we
previously reported, business rules are important because they
explicitly translate business policies and procedures into specific,
unambiguous rules that govern what can and cannot be done. As such,
they facilitate consistent implementation of policies and procedures.
Examples of new business rules are that (1) each request for commercial
export of DOD technology must be processed within 30 days of request
from the Department of State or the Department of Commerce and (2) DOD
must first seek to acquire commercial items before developing military
unique material. In addition to adding business rules, Version 5.0
reflects the deletion of 1,046 business rules that were no longer
applicable and thus obsolete.
Notwithstanding these additions and deletions, BEA 5.0 still does not
provide business rules for all business processes. For example, there
are no business rules for the "Perform Acceptance Procedures for Other
Goods and Services" business process under the Common Supplier
Engagement enterprise priority area. Also, business rules are defined
at inconsistent levels of detail. For example, the Travel Authorization
business rule states that each travel authorization must be processed
in accordance with the Allowance Law, however, it does not identify the
specific conditions that must be met. In contrast, the Trial Balance
Reporting business rule is more explicitly defined, specifically citing
the conditions under which actions are to be taken. Without well-
defined business rules, policies and procedures can be implemented
inconsistently because they will be interpreted differently by
different organizations.
* The latest version includes updates on the information that flows
among operational nodes (i.e., organizations, business operations, and
system elements). Information flows are important because they define
what information is needed and where and how the information moves to
and from operational entities. In particular, Version 5.0 adds 240 new
information exchanges (e.g., Accounts Payable) among business
operations and 28 data exchanges (e.g., Acknowledge Inter-governmental
Order) among system elements. However, it still does not provide
information flows for all organizational units. For example, it does
not identify information exchanges among the organizations that support
the Human Resources Management enterprise priority area, and continues
to lack information flows among DOD corporate and components
organizations. Without such information exchanges, a common
understanding of the semantic meaning of the information moving among
these organizations does not exist. Moreover, Version 5.0 contains
information exchanges (e.g., Accounts Payable Account) that are not
attached or linked to any operational nodes. Further, this version's
information-related architecture products contain inconsistencies. For
example, "Acceptance Results" is identified as a new information
exchange in the integrated dictionary, but it is not in the operational
information exchange product.
* The latest version expands on the operational activities that are or
will be performed at each location and by each organization. For
example, it now identifies the Defense Logistics Agency as one of the
organizations involved in the "Authorize Return or Disposal" activity.
However, as was the case with BEA Version 4.1, not all operational
activities are assigned to an organization. For example, the "Manage
Capabilities Based Acquisition" activity is not assigned. In addition,
BEA 5.0 still does not include the roles and responsibilities of
organizations performing the same operational activity, which is
important because not doing so can result in either duplicative
organizational efforts or gaps in activity coverage. Moreover, BEA 5.0
still does not include the Foreign Military Sales operational activity,
which affects multiple DOD business missions and organizations.
* The latest version continues to lack important security architecture
content. For example, while DOD officials told us that the Enterprise
Information Environment Mission Area will provide infrastructure
information assurance services (e.g., secure, reliable messaging) for
business systems and applications, this information is not reflected in
the latest version. Also, this version still does not describe relevant
information assurance requirements contained in laws, regulations, and
policies, or provide a reference to where these requirements are
described. Such information is essential to adequately reflect security
in the BEA, and thereby ensure that designs for business systems,
applications, and services comply with applicable information assurance
requirements.
Beyond the above discussed limitations, Version 5.0 also continues to
represent only the thin layer of corporate architectural policies,
capabilities, rules, and standards that apply DOD-wide (i.e., to all
DOD federation members). This means that Version 5.0 appropriately
focuses on addressing a limited set of enterprise-level (DOD-wide)
priorities, and providing the overarching and common architectural
context that the distinct and substantially autonomous member (i.e.,
component) architectures inherit. However, this also means that Version
5.0 does not provide the total federated family of DOD parent and
subsidiary architectures for the business mission area that are needed
to comply with the act.
To produce the federated BEA, the BTA released an update to its
federation strategy in January 2008. (See fig. 3 for a simplified
diagram of DOD's federated BEA.) In April 2007,[Footnote 44] we
reported on the prior version of this strategy, concluding that while
it provided a foundation on which to build and align DOD's parent BEA
with its subsidiary architectures, it lacked sufficient details to
permit effective and efficient execution. Accordingly, we made
recommendations to improve the strategy.
The updated strategy, along with the associated global information grid
[Footnote 45] (GIG) strategy,[Footnote 46] partially addresses our
recommendations. For example, the strategies now provide high-level
roles and responsibilities for federating the architecture and
additional definition around the tasks needed to achieve alignment
among DOD and component architectures. In particular, the strategy for
the business mission area provides for conducting pilot programs across
the components to demonstrate the technical feasibility of architecture
federation. BTA and CIO officials described the strategy for federating
DOD's architectures as still evolving. They added that lessons learned
from the pilots will be used to improve and update the strategies. They
also noted that subsequent releases of the corporate BEA will reflect
the evolving federation strategy by, for example, defining enforceable
interfaces to ensure interoperability and information sharing.
Figure 3: Simplified Diagram of DOD's Business Mission Area Federated
Architecture:
[See PDF for image]
This figure is an diagram of DOD's Business Mission Area Federated
Architecture, as follows:
DOD-Enterprise Layer:
* DOD BEA and Enterprise Transition Plan;
* Enterprise Shared Services and System Capabilities;
* Enterprise Rules and Standards for Interoperability.
[BTA is comprised of the above layer, as well as the component layer]
Component Layer: Military departments and example defense agencies:
* Army: Architectures; Transition Plans; Systems Solutions;
* Navy: Architectures; Transition Plans; Systems Solutions;
* Air Force: Architectures; Transition Plans; Systems Solutions;
* Defense Logistics Agency: Architectures; Transition Plans; Systems
Solutions;
* Defense Finance and Accounting Service: Architectures; Transition
Plans; Systems Solutions;
* United States Transportation Command: Architectures; Transition
Plans; Systems Solutions;
Program Layer: Example programs:
* Army: General Fund Enterprise Business System; Single Army Financial
Enterprise;
* Navy: Navy Enterprise Resource Planning; Navy Tactical Command
Support System;
* Air Force: Expeditionary Combat Support System; Technical Training
Management System;
* Defense Logistics Agency: Business Systems Modernization;
Distribution Planning Management System;
* Defense Finance and Accounting Service: Automated Disbursing System;
Defense Joint Military Pay System;
* United States Transportation Command: Defense Enterprise Accounting
and Management System; Defense Personal Property System.
Source: GAO analysis of DOD data.
[End of figure]
To help assist the department in its BEA federation efforts, we have
made a number of recommendations. While DOD agreed with these
recommendations, it did not implement one related to its latest annual
report. Specifically, we previously recommended that DOD include in its
annual report, required under the National Defense Authorization Act
for Fiscal Year 2005, the results of its BEA independent verification
and validation (IV&V) contractor's assessment of the completeness,
consistency, understandability, and usability of the federated family
of architectures. However, its latest annual report does not include
this information. According to BTA officials, this is because the
contractor's report was not finalized in time to include the results.
While we have yet to receive either the contractor's statement of work
or the results of the contractor's assessments, BTA officials provided
us with a report dated April 11, 2008, that summarizes selected IV&V
contractor observations and recommendations relative to the Version
5.0's ability to provide a foundation for BEA federation. Overall, the
summary confirms our findings by stating that while the BEA provides a
foundation for federation, much remains to be done before the
department will have a complete family of architectures. In this
regard, it provides several recommendations, such as having BTA track,
measure, and report on the adoption of shared vocabularies and
standards within the component architectures. However, the summary does
not demonstrate that the IV&V contractor is being used to address the
full scope of our recommendation. For example, the summary does not
address the extent to which the department's federated family of
architectures, including the related transition plan(s), are complete,
consistent, understandable, and useable.
The challenges that the department faces in federating its BEA, and the
importance of disclosing to congressional defense committees the state
of its federation efforts, are amplified by our recent report on the
current state of the military departments' enterprise architecture
programs. Specifically, we reported in May 2008,[Footnote 47] that none
of the three military departments could demonstrate through verifiable
documentation that it had established all of the core foundational
commitments and capabilities needed to effectively manage the
development, maintenance, and implementation of an architecture,
although in relative terms the state of the Air Force's architecture
efforts was well ahead of those of the Navy and Army. Examples of their
architecture limitations are discussed below.
* None of the military departments had fully defined its "As Is" and
"To Be" architecture environments and associated transition plans. This
is important because without a full understanding of architecture-based
capability gaps, the departments would not have an adequate basis for
defining and sequencing its ongoing and planned business system
investments.
* None of the military departments had fully addressed security as part
of its respective "As Is" and "To Be" environments. This is important
because security is relevant and essential to every aspect of an
organization's operations, and therefore the nature and substance of
institutionalized security requirements, controls, and standards should
be embedded throughout the architecture, and reflected in each system
investment.
* None of the military departments was using an IV&V agent to help
ensure the quality of its architecture products. IV&V is a proven means
for obtaining unbiased insight into such essential architecture
qualities as completeness, understandability, usability, and
consistency.
* None of the military departments had established a committee or group
with representation from across the enterprise to direct, oversee, and
approve its architecture. This is significant because the architecture
is a corporate asset that needs to be enterprisewide in scope and
endorsed by senior leadership if it is to be leveraged for optimizing
operational and technology change.
* None of the military departments could demonstrate that its IT
investments were actually in compliance with its architectures. This is
relevant because the benefits from using an architecture, such as
improved information sharing, increased consolidation, enhanced
productivity, and lower costs, cannot be fully realized unless
individual investments are actually in compliance with, among other
things, architectural rules and standards.
To address these limitations, we have made recommendations aimed at
improving the management and content of these architectures. DOD agreed
with our recommendations. Until DOD has a well-defined family of
architectures for its business mission area, it will not fully satisfy
the requirements of the act and it will remain challenged in its
ability to effectively manage its business system modernization
efforts.
DOD Continues to Expand and Update Its Enterprise Transition Plan, but
Important Elements and Component Plans Are Still Missing:
Among other things, the act requires DOD to develop an ETP for
implementing its BEA that includes listings of the legacy systems that
will and will not be part of the target business systems environment
and specific time-phased milestones and performance metrics for each
business system investment.
In 2007,[Footnote 48] we reported that the then version of the ETP
addressed several of the missing elements that we previously identified
relative to the act's requirements and relevant guidance. However, we
also reported that the ETP was limited in several ways. On March 15,
2008, DOD released the latest version of its ETP, which provides
required information on 102 programs (systems and initiatives) that are
linked to key transformational objectives. For example, it includes
specific time-phased milestones[Footnote 49] for about 90 business
system programs and performance metrics for about 75 of these. Further,
the latest version of the ETP discusses progress made on business
system investments over the last 6 months, as well as descriptions of
planned near-term activities (i.e., next 6 months).
* The Defense Integrated Military Human Resources System program
completed all interface designs required for system deployment to the
Army and to defense agencies, and over half of the interface designs
required for deployment to the Air Force. It also states that system
interface testing and operational testing for the Army deployment will
be completed in the next 6 months.[Footnote 50]
* The Contractor Performance Assessment Reporting System was fully
implemented following replacement of a proprietary software product
with an open source product and rehosting of this product to a new
facility. As a result, improvements in system performance, reliability,
and security were attained.
This version also partially addresses issues that we identified in our
prior report.[Footnote 51] Examples of improvements and remaining
issues are summarized here.
* The latest version contains the results of analyses of gaps between
its "As Is" and "To Be" architectural environments, in which capability
and performance shortfalls are described and investments (such as
transformation initiatives and systems) that are to address these
shortfalls are identified. It also discusses planned and ongoing gap
analyses. For example, it relates the DOD Electronic Mall investment to
the Common Supplier Engagement business enterprise priority area and
describes how it will address business capability gaps by providing
access to off-the-shelf finished goods and services from both
commercial and government sources. It also describes how related
performance shortfalls will be addressed through shorter logistics
response time, improved visibility of sources of supplies, one-stop
tracking of order status, and improved ability to shop for best price.
As we stated, determining how business capability gaps between the
baseline and target architecture are to be addressed for all priority
areas is key to the department's transition plan's ability to support
informed investment selection and control decisions.
* The latest version provides a range of information for the 102
systems and initiatives identified, such as 3 years of budget
information for 67 of these systems and initiatives. However, as we
reported last year,[Footnote 52] the plan has yet to address our prior
finding for including system and budget information for investments by
13 of DOD's 15 agencies[Footnote 53] and for eight of its nine
combatant commands.[Footnote 54] At that time, BTA officials stated
that information for these defense agencies and combatant commands was
excluded because the ETP focused on those business-related
organizations having the majority of the tier 1 and 2 business
investments, and the majority of the defense agencies and combatant
commands do not have investments that meet this threshold criteria.
However, not all DOD components have developed subordinate transition
plans. For example, we recently reported that only one military
department, the Air Force, had developed a transition plan and that
this plan was limited because it did not include an analysis of the gap
in capabilities between the military departments' "As Is" and "To Be"
environments. This means that, similar to DOD's federated BEA, a
complete family of DOD and component transition plans does not yet
exist.
* The latest version provides performance measures for both enterprise
and component investments (i.e., programs), including key milestones
(e.g., initial operating capability). However, it does not include
other important information needed to understand the sequencing of
these investments. In particular, the planned investments are not
sequenced based on a range of important factors cited in federal
guidance, such as technology opportunities, marketplace trends, fiscal
and budgetary constraints, institutional system development and
acquisition capabilities, new and legacy system dependencies and life
expectancies, and the projected value of competing investments.
[Footnote 55] While the ETP has begun to incorporate some top-down
analysis based on gaps in the business enterprise priorities, the plan
continues to be largely based on a bottom-up planning process in which
ongoing programs were examined and categorized in the plan around
business enterprise priorities. For example, many of these investments
are dependent on Net-Centric Enterprise Services (NCES)[Footnote 56]
for its core services, and as such the plans and milestones for each
should reflect the incremental capability deployment of NCES. According
to the BTA official responsible for the ETP, the investments were
sequenced based on only fiscal year budgetary constraints. However, BTA
officials said that they intend to depict investment dependencies in
future versions of the ETP, especially program-to-program dependencies
associated with adoption of a service- oriented architecture approach.
* The latest version of the ETP also includes discussion of how the
department plans to use enterprise application integration,[Footnote
57] including plans, methods, and tools for reusing applications that
already exist while also adding new applications and databases.
However, as we reported last year,[Footnote 58] this discussion lacks
specifics on which investments will reuse which applications.
According to BTA officials, a number of actions are envisioned to
address the above cited areas and further improve the ETP, such as
adding the results of capability gap analyses for all business priority
areas, including tier 1 and 2 programs for all components, and
recognizing dependencies among investments. Until the ETP, or a
federated family of such plans, either directly or by reference
includes relevant information on the full inventory of investments
across the department (and does so in a manner that reflects
consideration of the range of variables associated with a well-defined
transition plan, such as timing dependencies among investments and the
department's capability to manage them), it will not have a sufficient
basis for informed investment decision making regarding disposition of
the department's existing inventory of systems or for sequencing the
introduction of modernized systems. To help DOD in addressing its
transition planning challenges, we have previously made recommendations
that the department is in the process of addressing.
DOD's Fiscal Year 2009 Budget Submission Includes Key Information on
Business Systems:
Among other things, the act requires DOD's annual IT budget submission
to include key information on each business system for which funding is
being requested, such as the system's designated approval authority and
the appropriation type and amount of funds associated with development/
modernization and current services (i.e., operation and maintenance).
The department's fiscal year 2009 budget submission includes a range of
information for the approximately 3,000 business system investments for
which DOD is requesting funding. Of these, 273 involve modernization/
development activities. For each of the 273, the information provided
includes the system's (1) name, (2) approval authority, and (3)
appropriation type. The submission also identifies the amount of the
fiscal year 2009 request that is for development/modernization versus
operations/maintenance. For example, the Army's General Fund Enterprise
Business System, the amount of modernization funds related to "Other
Procurement, Army" and "Research, Development, Testing and Evaluation,
Army" are identified. For systems in excess of $1 million in
modernization funding, the submission also cites its certification
status (e.g., approved, approved with conditions, not applicable, and
withdrawing) and the DBSMC approval date, where applicable.
DOD and Military Departments Have Partially Established Key Investment
Management Structures, but Have Yet to Fully Define Related Policies
and Procedures:
The National Defense Authorization Act for Fiscal Year 2005 requires
DOD to establish business system investment review structures, such as
the previously mentioned DBSMC and five IRBs, and processes that are
consistent with the investment management provisions of the Clinger-
Cohen Act.[Footnote 59] As we have previously reported, organizations
that have satisfied stages 2 and 3 of our ITIM framework have
established the investment selection, control, and evaluation
structures, and the related policies, procedures, and practices that
are consistent with the investment management provisions of the Clinger-
Cohen Act.
DOD and the Air Force have established the kind of investment
management structures provided for in the act and our ITIM framework.
[Footnote 60] However, the Navy has not. Moreover, neither DOD, the Air
Force, nor the Navy have defined the full range of related investment
management policies and procedures that our framework identifies as
necessary to effectively manage investments as individual business
system projects (stage 2) and as portfolios of projects (stage 3).
Accordingly, we made recommendations to address the limitations that
the department is addressing. Until all of DOD has in place these
requisite investment management structures and supporting policies and
procedures, the billions of dollars that the department and its
components invest annually in business systems will remain at risk.
Investment Management Structures Have Been Partially Established:
DOD has partially established the organizational structures that are
associated with Stages 2 and 3 of our framework. Specifically, we
reported in May 2007[Footnote 61] that the department had established
an enterprisewide investment board and four subordinate boards, and
assigned them responsibility for business systems investment
governance, including conducting investment certification and approval
reviews and annual reviews as provided for in the act. The
enterprisewide board--the DBSMC--is composed of senior executives, such
as the Deputy Secretary of Defense and the ASD(NII)/CIO, as provided
for in the act. Among other things, the DBSMC is responsible for
establishing and implementing policies governing the organization's
investment process and approving lower-level investment board processes
and procedures. The subordinate boards include four IRBs[Footnote 62]
that are composed of senior officials representing their respective
business areas, including representatives from the combatant commands,
defense agencies, military departments, and Joint Chiefs of Staff.
Among other things, the IRBs are responsible and accountable for
overseeing and controlling certain business system investments,
including ensuring compliance and consistency with the BEA. The
department has also assigned responsibility to the USD(AT&L) for
managing business system portfolio selection criteria.
However, as we reported last year, the department has yet to establish
the fifth review board required pursuant to the act, the Enterprise
Information Environment Mission Area[Footnote 63] IRB. According to
ASD(NII)/CIO officials, this board has been operating under a draft
concept of operations for about 2 years, but has not been chartered
because of issues surrounding its authority across IT infrastructure-
related investments. However, they stated that a policy is expected to
be approved and issued by the end of May 2008 that will, among other
things, establish a CIO Enterprise Guidance Board that will meet the
act's requirements for Enterprise Information Environment Mission Area
IRB. Specifically, the policy is to provide the Enterprise Guidance
Board with DOD-wide oversight of IT investments.
With respect to the military departments' investment management
structures, we reported in October 2007[Footnote 64] that the Air Force
had established the organizational structures associated with stages 2
and 3 of our framework. Specifically, it has instituted a business
systems IRB, called the Senior Working Group, consisting of senior
executives from the functional business units, including the Office of
the Air Force CIO. This group has been assigned responsibility for
business system investment governance, including conducting investment
precertification and approval reviews and annual reviews, as required
by the act. However, we also reported in October 2007[Footnote 65] that
the Navy had not established such investment management structures.
Specifically, it did not have an enterprisewide IRB, composed of senior
executives from its IT and business units, to define and implement a
Navy-wide business system governance process. Without such structures,
we concluded that the Navy's ability to ensure that business system
investment decisions are made consistently and reflect the needs of the
organization is limited. Accordingly we made a recommendation to the
Navy for establishing these management structures.
Investment Management Policies and Procedures Are Lacking at Both
Corporate and Component Levels:
Neither DOD nor the departments of the Air Force and the Navy have
defined the full range of policies and procedures needed to effectively
support project-level (stage 2) and portfolio-based (stage 3)
investment management practices. While the department is in the process
of developing a new methodology for managing its business system
investments throughout their life cycles that it reports will address
this lack of policies and procedures, this new methodology is still in
draft, has not been approved, and we have yet to be provided a copy.
Until these missing policies and procedures are defined, it is unlikely
that the thousands of DOD business system investments will be managed
in a consistent, repeatable, and effective manner.
To DOD's credit, it has defined corporate policies and procedures
relative to several key practices in our ITIM framework that are
associated with project-level investment management (stage 2). However,
it does not have the full range of project-level policies and
procedures needed for effective investment management. Specifically, we
reported in May 2007[Footnote 66] that DOD had satisfied several policy-
and procedure-related stage 2 practices, such as requiring that systems
support ongoing and future business needs through alignment with the
BEA, having procedures for identifying and collecting information about
these systems to support DBSMC and IRB investment decision making, and
assigning responsibility for ensuring that the information collected
about projects meets the needs of DOD's investment review structures
and processes. However, we also reported that it had not, for example,
developed policies and procedures outlining how the DBSMC/IRB
investment review processes are to be coordinated with other decision-
support processes used at DOD, such as the Joint Capabilities
Integration and Development System; the Planning, Programming,
Budgeting, and Execution process; and the Defense Acquisition System.
[Footnote 67] Without clear linkage among these processes, inconsistent
and uninformed decision making may result. Furthermore, without
considering component and corporate budget constraints and
opportunities, the IRBs risk making investment decisions that do not
effectively consider the relative merits of various projects and
systems when funding limitations exists.
Other important project-level, as well as portfolio-based, investment
management policies and procedures that we reported as lacking include
ones that (1) specify how the full range of cost, schedule, and benefit
data accessible by the IRBs is to be used in making selection
decisions; (2) ensure sufficient oversight and visibility into
component-level (e.g., Air Force and Navy) investment management
activities, including component reviews of systems in operations and
maintenance; (3) define the criteria to be used for making portfolio
selection decisions; (4) create the portfolio of business systems
investments; and (5) provide for conducting postimplementation reviews
of these investments. DOD agreed with our findings and described
actions that it planned to take to address our recommendations,
including developing a new life cycle management methodology for
business systems. In addition, it stated that while its actions would
improve the department's corporate policies and procedures for business
system investments, each component is responsible for developing and
executing investment management policies and procedures needed to
manage its business systems.
In this regard, the military departments also have not developed the
full range of related investment management policies and procedures
needed to execute the project and portfolio-level practices reflected
in our ITIM framework. Specifically, we reported in October 2007
[Footnote 68] that the state of the Air Force and the Navy's investment
management policies and procedures were similar to that of DOD in that
while several of our ITIM framework stage 2 practices were satisfied,
others were not, and none of the stage 3 practices were satisfied. For
example, both the Air Force and the Navy, to their credit, had
developed procedures for identifying and collecting information about
their business systems to support investment selection and control, and
assigned responsibility for ensuring that the information collected
during project identification meets the needs of the investment
management process. However, neither the Air Force nor the Navy had
fully documented policies and procedures for overseeing the management
of business system investments and for developing and managing complete
business systems investment portfolio(s). Among other things, they did
not have policies and procedures that specify decision-making processes
for program oversight and describe how corrective actions should be
taken when projects deviate from their project management plans.
Without such policies and procedures, we concluded that both are at
risk of investing in systems that are duplicative, stovepiped,
nonintegrated, and unnecessarily costly to manage, maintain, and
operate. To address these areas, we made recommendations aimed at
implementing our framework's stage 2 and 3 practices, and DOD partially
agreed with these recommendations.
DOD reports that it has begun to address our investment management
findings and recommendations. Specifically,[Footnote 69] it has drafted
and is piloting aspects of (e.g., an Enterprise Risk Assessment
Methodology) a new lifecycle management methodology, called the
Business Capability Lifecycle (BCL). The annual report states that
these pilots have validated the BCL and that interim guidance for major
business systems[Footnote 70] has been developed. However, the new
methodology has yet to be approved. Further, BTA officials stated that
plans for its finalization and full implementation have been placed on
hold until the department has implemented the Chief Management Officer
(CMO) provisions of the National Defense Authorization Act for Fiscal
Year 2008.[Footnote 71]
Based on a draft of the BCL and descriptions of it contained in the
annual report and briefed to us by BTA officials, this new lifecycle
methodology could address some, but not all, of the policy and
procedure gaps that we have recently reported. For example, the BCL is
to consolidate DOD's currently distinct and separate system
requirements, acquisition, and architectural/investment oversight
processes into a single governance process. However, while lack of
integration among these separate processes is a limitation that
reported with DOD's business system investment management policies and
procedures, this limitation also included lack of integration with
DOD's budgeting process. Unless this new lifecycle methodology
incorporates DOD's funding process, the risk of the respective
processes producing inconsistent investment decisions remains.
The following are other examples of investment management policy and
procedure limitations cited in our recent reports that the draft of the
BCL methodology does not fully address.
* The BCL does not apply to programs after they have completed
development/modernization activities and are in an operations and
maintenance mode, except for certain programs designated as "special
interest." As we recently reported,[Footnote 72] our ITIM framework
provides for including both new system development/acquisition
investments and operations and maintenance of existing system
investments in the investment management process. According to the
department, it plans to examine the applicability of the BCL
methodology to systems in operations and maintenance.
* The BCL does not address how the full range of cost, schedule, and
benefit data is to be used by the IRBs when making their program
certification decisions. Without documenting how such boards are to
consider cost, schedule, and benefits factors when making these
decisions, the department cannot ensure that the boards consistently
and objectively select proposals that best meet the department's needs
and priorities.
* The BCL does not provide for DOD-level oversight and visibility into
component-level investment management activities, including component
reviews of systems in operations and maintenance and smaller
investments, commonly referred to as tier 4 investments.[Footnote 73]
This is particularly important because, as DOD reports, only 353 of
about 3,000 total business systems have completed the IRB certification
process and have been approved by the DBSMC. This means that the vast
majority of business systems have not come before the IRBs and DBSMC,
and thus are reviewed and approved only within the component
organizations. Without policies and procedures defining how the DBSMC
and IRBs have visibility into and oversight of all business system
investments, DOD risks components continuing to invest in systems that
will fall short of expectations.
* The BCL does not provide for portfolio-based business system
investment management. Without defining how projects are to be managed
as part of portfolios of related investments, the department will not
be able to take advantage of the synergistic benefits to be found among
the entire collection of investments, rather than just from the sum of
individual investments. Further, adequately documenting both the
policies and procedures that provide predictable, repeatable, and
reliable investment selection and control and govern how an
organization reduces investment risk of failure and provides the basis
for having rigor, discipline, and respectability in how investments are
selected and controlled across the entire organization. According to
the department, as it implements both the CMO provisions of the
National Defense Authorization Act for Fiscal Year 2008, and capability
portfolio management, the IRB/DBSMC investment management approach is
expected to become more portfolio oriented.
In finalizing the BCL, it will be important for DOD to address these
gaps in its draft methodology. If it does not, the department will
continue to risk selecting and controlling its business system
investments in an inconsistent, incomplete, and ad hoc manner, which in
turn will reduce the chances that these investments will optimally
support mission needs in the most cost-effective manner.
DOD Continues to Certify and Approve Business Systems Cited in the Act:
The act specifies two basic requirements that took effect October 1,
2005, relative to DOD's use of funds for business system modernizations
that involve more than $1 million in obligations in any given fiscal
year. First, it requires that these modernizations be certified by a
designated approval authority[Footnote 74] as meeting specific
criteria.[Footnote 75] Second, it requires that the DBSMC approve each
of these certifications. The act also states that failure to do so
before the obligation of funds for any such modernization constitutes a
violation of the Anti-deficiency Act.[Footnote 76]
As we have previously reported,[Footnote 77] the department has
established an approach to meeting the act's requirements that reflects
its philosophy of "tiered accountability." Under its approach,
investment review begins within the military departments and defense
agencies and advances through a hierarchy of review and decision-making
authorities, depending on the size, nature, and significance of the
investment. For those investments that meet the act's dollar
thresholds, this sequence of review and decision making includes
component precertification, IRB certification, and DBMSC approval. For
those investments that do not, investment decision-making authority
remains with the component. This review and decision-making approach
has two types of reviews for business systems: certification/approval
reviews and annual reviews.
* Certification/approval reviews. Certification/approval reviews apply
to new modernization projects with total costs over $1 million. These
reviews focus on program alignment with the BEA and must be completed
before components obligate funds for programs. Tiers 1, 2, and 3
investments in development and modernization are certified at three
levels--components precertify, the IRBs certify, and the DBSMC
approves. At the component level, program managers prepare, enter,
maintain, and update information about their investments in their
respective data repositories. Examples of information are regulatory
compliance reporting, architectural profile, and requirements for
investment certification and annual reviews. According to the process,
the component precertification authority is to validate that the system
information is complete and accessible on the repository, review system
compliance with the BEA, and verify the economic viability analysis.
This information is then transferred to DOD's IT Portfolio
Repository.[Footnote 78] The precertification authority asserts the
status and validity of the investment information by submitting a
component precertification letter to the appropriate IRB for its
review.
At the corporate level, the IRB reviews the pre-certification letter
and related material, and if certification is decided, prepares a
certification memorandum for the designated certification authority's
signature that documents the IRB's decisions and any related
conditions. The memorandum is forwarded to the DBSMC, which either
approves or disapproves the IRB's decisions and issues a memorandum
containing its decisions. If the DBSMC disapproves a system investment,
it is up to the component precertification authority to decide whether
to resubmit the investment after it has resolved the relevant issues.
* Annual reviews. The annual reviews apply to all business system
investments and are intended to determine whether the investment is
meeting its milestones and addressing its IRB certification conditions.
Tiers 1, 2, 3, and 4 business system investments are annually reviewed
at two levels--the component and the IRBs. At the component level,
program managers update information on all tiers of system investments
that are identified in their component's data repository. For tiers 1
through 3 systems that are in development or being modernized,
information is updated on cost, milestones, and risk variances and
actions or issues related to certification conditions. The component
precertification authority then verifies and submits the information
for these business system investments for the IRB in an annual letter.
The letter addresses system compliance with the BEA and ETP and
includes investment cost, schedule, and performance information.
[Footnote 79]
IRBs annually review tiers 1, 2, and 3 business system development or
modernization investments. These reviews focus on program compliance
with the BEA, program cost and performance milestones, and progress in
meeting certification conditions. IRBs can advise the DBSMC to revoke a
certification when the investment has significantly failed to achieve
performance commitments (i.e., capabilities and costs). When this
occurs, the component must address the IRB's concerns and resubmit the
investment for certification.
Since October 1, 2005 (the effective date of the relevant provision of
the act), DOD has continued to certify and approve investments with
annual obligations in excess of $1 million. For example, as of March
2007, DOD reported that the DBSMC had approved 285 system investments
that had been previously certified by the IRBs. By September 30, 2007,
DOD reported that the DBSMC had approved an additional 29 IRB-certified
system investments, for a total of 314 approved systems. According to
DOD:
* All 314 systems were certified and approved as meeting the first
condition in the act--being in compliance with the BEA--and the 314
systems represent all of the modernization programs meeting the act's
threshold through fiscal year 2007. Collectively, these 314 involved
$7.9 billion in modernization funding.
* About 60 percent (187) of the 314 were reviewed and precertified
within the military departments. More specifically, 69 were pre-
certified within the Army, 58 within the Navy, and 60 within the Air
Force. The remaining 127 were reviewed and precertified within 1 of 15
defense agencies, including 26 in the Military Health Service, 24
within the Defense Logistics Agency, and 20 in the BTA.
Since September 30, 2007, the IRBs have certified and the DBSMC has
approved 39 additional system modernization investments. Moreover,
available information from the military departments shows that 35
additional investments have been precertified. Specifically, the Air
Force, Navy, and Army, report that 14, 19, and 2 investments,
respectively, have been precertified. In addition, both the Air Force
and Navy reported that they have reviewed and approved investments that
are below the act's thresholds, and thus do not require IRB
certification or DBSMC approval. Specifically, the Air Force reports 46
of these systems have been reviewed and approved, while the Navy
reports 4 additional systems reviewed and approved. We have yet to
receive comparable information from the Army.
The basis for DOD's continuing efforts to certify and approve business
systems modernization investments as being compliant with the BEA are
essentially each individual program's assertion of compliance. These
assertions in turn are largely based on DOD BEA compliance assessment
guidance. At the request of the Senate Armed Services Committee, we
have ongoing reviews of several major business systems investments that
include determining the extent to which these investments have
demonstrated compliance with the BEA.
Conclusions:
Over the last year, DOD has continued to make important progress in
defining and implementing key institutional modernization management
controls, but much remains to be accomplished. In particular, the
corporate BEA, while continuing to improve, is still missing important
content, and it has yet to be federated through development of aligned
subordinate architectures for each of the department's component
organizations. Further, while the department has developed a strategy
for federating the BEA in this manner, this strategy is still evolving
and has yet to be implemented. Compounding this situation are recurring
limitations in the ETP, as well as the immaturity of the military
service architecture programs, to include their own transition plans.
In addition, neither the corporate nor the military departments'
approaches to business systems investment management have all the
requisite structures and defined policies and procedures in place to be
considered effective investment selection, control, and evaluation
mechanisms. These architecture and investment management limitations
continue to put billions of dollars spent each year on thousands of
business system investments at risk.
Development of a well-defined federated architecture and accompanying
transition plans for the business mission area, along with
institutionalization of effective business system investment management
policies and procedures across all levels of the department, are
critically important to addressing the business system modernization
high-risk area. Equally, if not more important is for the department to
actually implement the architecture and investment management controls
on each and every business system investment. While not a guarantee,
having an architecture-centric approach to investment management,
combined with following the other key system acquisition disciplines
that are reflected in our existing recommendations to the department,
can be viewed as a recipe for the business systems modernization
program's removal from our high-risk list.
Related to implementing our existing recommendations is the
department's need to keep congressional defense committees fully
informed about its progress in federating the DOD corporate BEA, to
include the maturity of component organization architecture efforts and
the related transition plan(s). In its most recent annual report to
congressional defense committees pursuant to the National Defense
Authorization Act for Fiscal Year 2005, the department missed an
opportunity to do this by not including the results of its IV&V
contractor's assessments of the completeness, consistency,
understandability, and usability of the federated family of business
mission area architectures, including associated transition plans, as
we previously recommended.
Recommendations for Executive Action:
Because we have existing recommendations to the Secretary of Defense
that address the issues raised in this report and that the department
has yet to fully implement, we are not making additional
recommendations at this time.
Agency Comments:
In comments on a draft of this report, signed by the Deputy Under
Secretary of Defense (Business Transformation), the department stated
that it appreciated our support in advancing its business
transformation efforts. It also provided several technical comments
that we have incorporated throughout the report, as appropriate.
We are sending copies of this report to interested congressional
committees; the Director, Office of Management and Budget and the
Secretary of Defense. Copies of this report will be made available to
other interested parties upon request. This report will also be
available at no charge on our Web site at [hyperlink,
http://www.gao.gov].
If you or your staffs have any questions on matters discussed in this
report, please contact me at (202) 512-3439 or hiter@gao.gov. Contact
points for our Offices of Congressional Relations and Public Affairs
may be found on the last page of this report. GAO staff who made major
contributions to this report are listed in appendix II.
Signed by:
Randolph C. Hite:
Director:
Information Technology Architecture and Systems Issues:
List of Committees:
The Honorable Carl Levin:
Chairman:
The Honorable John McCain:
Ranking Member:
Committee on Armed Services:
United States Senate:
The Honorable Daniel Inouye:
Chairman:
The Honorable Ted Stevens:
Ranking Member:
Subcommittee on Defense:
Committee on Appropriations:
United States Senate:
The Honorable Ike Skelton:
Chairman:
The Honorable Duncan L. Hunter:
Ranking Member:
Committee on Armed Services:
House of Representatives:
The Honorable John P. Murtha:
Chairman:
The Honorable C.W. Bill Young:
Ranking Member:
Subcommittee on Defense:
Committee on Appropriations:
House of Representatives:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
As agreed with defense congressional committees, our objective was to
assess the actions by the Department of Defense (DOD) to comply with
the requirements of section 2222 of Title 10, U.S. Code.[Footnote 80]
To address this, we focused on five of the six requirements in section
2222, and related best practices contained in federal guidance, that we
identified in our last annual report under the act as not being fully
satisfied.[Footnote 81] Generally, these five requirements are (1)
development of a business enterprise architecture (BEA), (2)
development of a transition plan for implementing the BEA, (3)
inclusion of business systems information in DOD's budget submission,
(4) establishment of business systems investment review processes and
structures, and (5) approval of defense business systems investments
with obligations in excess of $1 million. (See the background section
of this report for additional information on the act's requirements.)
We did not include the sixth requirement because our 2006 annual report
under the act shows that it had been satisfied. Our methodology
relative to each of the five requirements is as follows:
* To determine whether the BEA addressed the requirements specified in
the act, and related guidance, we analyzed version 5.0 of the BEA,
which was released on March 14, 2008, relative to the act's specific
architectural requirements and related guidance that our last annual
report under the act identified as not being met. We also reviewed
version 5.0 to confirm whether statements made in DOD's March 15, 2008,
annual report about the BEA's content were accurate. In addition, we
reviewed DOD's Business Mission Area Federation Strategy and Road Map
Version 2.0 released in January 2008, comparing the strategy and any
associated implementation plans with prior findings and recommendations
relative to the content of the strategy. Further, we reviewed the
Business Transformation Agency's report of selected independent
verification and validation (IV&V) contractor observations and
recommendations relative to the Version 5.0's ability to provide a
foundation for BEA federation, and compared this to our prior finding
and recommendation relative to the content of an IV&V review of the
BEA. Finally, we reviewed and leveraged the applicable results
contained in our recent reports on the military departments' enterprise
architecture programs, on the Air Force and Navy's investment
management processes, and our recent testimony on DOD's Business
Transformation.[Footnote 82]
* To determine whether the enterprise transition plan (ETP) addressed
the requirements specified in the act, we reviewed the updated version
of the ETP, which was released on March 15, 2008, relative to the act's
specific transition plan requirements and related guidance that our
last annual report under the act identified as not being met. We also
reviewed the ETP to confirm that statements in DOD's March 15, 2008,
annual report about the content of the ETP were accurate.
* To determine whether DOD's fiscal year 2009 information technology
budget submission was prepared in accordance with the criteria set
forth in the act, we reviewed and analyzed the department report
entitled "Report on Defense Business System Modernization FY 2005
National Defense Authorization Act, Section 332," dated February 2008
and compared it to the specific requirements in the act.
* To determine whether DOD has established investment review structures
and processes, we focused on the act's requirements that our last
annual report under the act identified as not being met, obtaining
documentation and interviewing cognizant DOD officials about efforts to
establish the one IRB specified in the act that we previously reported
had yet to be established. We also reviewed and leveraged our recent
reports that assessed the department's,[Footnote 83] Air
Force's,[Footnote 84] and Navy's[Footnote 85] approaches to managing
business system investments.
* To determine whether the department was reviewing and approving
business system investments exceeding $1 million, we reviewed DOD's
list of business system investments certified by the Investment Review
Boards (IRB) and approved by the Defense Business Systems Management
Committee (DBSMC). We then compared the detailed information provided
with the summary information contained in the department's March 15,
2008, report to the congressional defense committees to identify any
anomalies. We also obtained documentation from the Air Force and the
Navy to ascertain the specific actions that were taken (or planned to
be taken) in order to perform the annual systems reviews as required
pursuant to the act. We requested similar information from
representatives of the Army, but did not receive it in time to include
in this report.
We did not independently validate the reliability of the cost and
budget figures provided by DOD because the specific amounts were not
relevant to our findings. We conducted this performance audit at DOD
headquarters in Arlington, Virginia, from March 2008 to May 2008, in
accordance with generally accepted government auditing standards. Those
standards require that we plan and perform the audit to obtain
sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives.
[End of section]
Appendix II: GAO Contact and Staff Acknowledgments:
GAO Contact:
Randolph C. Hite, (202) 512-3439 or hiter@gao.gov:
Acknowledgments:
In addition to the contact person named above, key contributors to this
report were Elena Epps, Michael Holland, Tonia Johnson (Assistant
Director), Neelaxi Lakhmani, Rebecca LaPaze, Anh Le, and Freda
Paintsil.
[End of section]
Footnotes:
[1] Business systems support DOD's business operations, such as
civilian personnel, finance, health, logistics, military personnel,
procurement, and transportation.
[2] GAO, High-Risk Series: An Update, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-07-310] (Washington, D.C.:
January 2007).
[3] An enterprise architecture, or modernization blueprint, provides a
clear and comprehensive picture of an entity, whether it is an
organization (e.g., federal department or agency) or a functional or
mission area that cuts across more than one organization (e.g.,
financial management). This picture consists of snapshots of the
enterprise's current "as is" operational and technological environment
and its target or "to be" environment, and contains a capital
investment road map for transitioning from the current to the target
environment. These snapshots consist of "views," which are basically
one or more architecture products that provide conceptual or logical
representations of the enterprise.
[4] GAO, Information Technology: Architecture Needed to Guide
Modernization of DOD's Financial Operations, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-01-525] (Washington, D.C.: May
17, 2001).
[5] See, for example, GAO, Defense Business Transformation: Sustaining
Progress Requires Continuity of Leadership and an Integrated Approach,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-462T] (Washington
D.C.: Feb.7, 2008); GAO, DOD Business Systems Modernization: Progress
Continues to Be Made in Establishing Corporate Management Controls, but
Further Steps Are Needed, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-07-733] (Washington D.C.: May 14, 2007); GAO, Business
Systems Modernization: Strategy for Evolving DOD's Business Enterprise
Architecture Offers a Conceptual Approach, but Execution Details are
Needed, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-451]
(Washington, D.C.: Apr.16, 2007); GAO, Defense Business Transformation:
A Comprehensive Plan, Integrated Efforts, and Sustained Leadership Are
Needed to Assure Success, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-07-229T] (Washington, D.C.: Nov. 16, 2006); GAO,
Business Systems Modernization: DOD Continues to Improve Institutional
Approach, but Further Steps Needed, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-06-658] (Washington, D.C.: May 15, 2006); GAO, DOD
Business Systems Modernization: Long-standing Weaknesses in Enterprise
Architecture Development Need to Be Addressed, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-05-702] (Washington, D.C.: July
22, 2005); GAO, DOD Business Systems Modernization: Billions Being
Invested without Adequate Oversight, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-05-381] (Washington, D.C.: Apr. 29, 2005); GAO, DOD
Business Systems Modernization: Limited Progress in Development of
Business Enterprise Architecture and Oversight of Information
Technology Investments, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-04-731R] (Washington, D.C.: May 17, 2004); GAO, DOD
Business Systems Modernization: Important Progress Made to Develop
Business Enterprise Architecture, but Much Work Remains, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-1018] (Washington, D.C.: Sept.
19, 2003); GAO, Business Systems Modernization: Summary of GAO's
Assessment of the Department of Defense's Initial Business Enterprise
Architecture, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-
877R] (Washington, D.C.: July 7, 2003); GAO, Information Technology:
Observations on Department of Defense's Draft Enterprise Architecture,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-571R] (Washington,
D.C.: Mar. 28, 2003); GAO, DOD Business Systems Modernization:
Improvements to Enterprise Architecture Development and Implementation
Efforts Needed, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-
458] (Washington, D.C.: Feb. 28, 2003); and [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-01-525].
[6] Ronald W. Reagan National Defense Authorization Act for Fiscal Year
2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28,
2004) (codified in part at 10 U.S.C. § 2222).
[7] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[8] GAO, Business Systems Modernization: Air Force Needs to Fully
Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-52]
(Washington, D.C.: Oct. 31, 2007); GAO, Business Systems Modernization:
Department of the Navy Needs to Establish Management Structure and
Fully Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-53]
(Washington, D.C.: Oct. 31, 2007); GAO, DOD Business Systems
Modernization: Military Departments Need to Strengthen Management of
Enterprise Architectures, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-519] (Washington, D.C.: May 12, 2008); and
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-462T].
[9] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-519].
[10] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[11] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-538].
[12] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-658].
[13] See, for example, GAO, DOD Travel Cards: Control Weaknesses
Resulted in Millions of Dollars of Improper Payments, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-576] (Washington, D.C.: June
9, 2004); GAO, Military Pay: Army National Guard Personnel Mobilized to
Active Duty Experienced Significant Pay Problems, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-89] (Washington, D.C.: Nov.
13, 2003); and GAO, Defense Inventory: Opportunities Exist to Improve
Spare Parts Support Aboard Deployed Navy Ships, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-887] (Washington, D.C.: Aug.
29, 2003).
[14] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-310].
[15] These eight high-risk areas include DOD's overall approach to
business transformation, business systems modernization, financial
management, the personnel security clearance program, supply chain
management, support infrastructure management, weapon systems
acquisition, and contract management.
[16] The seven governmentwide high-risk areas are disability programs,
ensuring the effective protection of technologies critical to U.S.
national security interests, interagency contracting, information
systems and critical infrastructure, information-sharing for homeland
security, human capital, and real property.
[17] 40 U.S.C. § 11315(b)(2).
[18] 44 U.S.C. § 3602(f)(14).
[19] GAO, Information Technology Investment Management: A Framework for
Assessing and Improving Process Maturity, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-394G] (Washington, D.C.: March
2004); OMB Capital Programming Guide, Version 1.0 (July 1997); and CIO
Council, A Practical Guide to Federal Enterprise Architecture, Version
1.0 (February 2001).
[20] The Clinger-Cohen Act of 1996, 40 U.S.C. § 11302(c)(1). This act
expanded the responsibilities of OMB and the agencies that had been set
under the Paperwork Reduction Act with regard to IT management. See 44
U.S.C. 3504(a)(1)(B)(vi) (OMB); 44 U.S.C. 3506(h)(5) (agencies).
[21] We have made recommendations to improve OMB's process for
monitoring high-risk IT investments; see GAO, Information Technology:
OMB Can Make More Effective Use of Its Investment Reviews, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-05-276] (Washington, D.C.: Apr.
15, 2005).
[22] This policy is set forth and guidance is provided in OMB Circular
No. A-11 (Nov. 2, 2005) (section 300), and in OMB's Capital Programming
Guide, which directs agencies to develop, implement, and use a capital
programming process to build their capital asset portfolios.
[23] See for example, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-
04-394G]; GAO, Information Technology: A Framework for Assessing and
Improving Enterprise Architecture Management (Version 1.1), [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-584G] (Washington, D.C.: April
2003); and GAO, Assessing Risks and Returns: A Guide for Evaluating
Federal Agencies' IT Investment Decision-making, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-10.1.13] (Washington, D.C.:
February 1997).
[24] J.A. Zachman, "A Framework for Information Systems Architecture,"
IBM Systems Journal 26, no. 3 (1987).
[25] DOD, Department of Defense Architecture Framework, Version 1.0,
Volume 1 (August 2003) and Volume 2 (February 2004).
[26] See, for example, GAO, Homeland Security: Efforts Under Way to
Develop Enterprise Architecture, but Much Work Remains, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-04-777] (Washington, D.C.: Aug.
6, 2004); [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-731R];
GAO, Information Technology: Architecture Needed to Guide NASA's
Financial Management Modernization, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-04-43] (Washington, D.C.: Nov. 21, 2003); [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-1018]; [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-877R]; GAO, Information
Technology: DLA Should Strengthen Business Systems Modernization
Architecture and Investment Activities, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-01-631] (Washington, D.C.: June
29, 2001); and GAO, Information Technology: INS Needs to Better Manage
the Development of Its Enterprise Architecture, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-212] (Washington, D.C.:
Aug. 1, 2000).
[27] GAO, Information Technology: FBI Has Largely Staffed Key
Modernization Program, but Strategic Approach to Managing Program's
Human Capital Is Needed, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-07-19] (Washington, D.C.: Oct. 16, 2006).
[28] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-394G];
GAO/AIMD-10.1.13; GAO, Executive Guide: Improving Mission Performance
Through Strategic Information Management and Technology, GAO/AIMD-94-
115 (Washington, D.C.: May 1994); and OMB, Evaluating Information
Technology Investments, A Practical Guide (Washington, D.C.: November
1995).
[29] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-394G].
[30] 40 U.S.C. §§ 11311-11313.
[31] GAO, Information Technology: Centers for Medicare & Medicaid
Services Needs to Establish Critical Investment Management
Capabilities, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-12]
(Washington, D.C.: Oct. 28, 2005); GAO, Information Technology: HHS Has
Several Investment Management Capabilities in Place, but Needs to
Address Key Weaknesses, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-06-11] (Washington, D.C.: Oct. 28, 2005); GAO,
Information Technology: FAA Has Many Investment Management Capabilities
in Place, but More Oversight of Operational Systems Is Needed,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-822] (Washington,
D.C.: Aug. 20, 2004); GAO, Information Technology: Departmental
Leadership Crucial to Success of Investment Reforms at Interior,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1028] (Washington,
D.C.: Sept. 12, 2003); GAO, Bureau of Land Management: Plan Needed to
Sustain Progress in Establishing IT Investment Management Capabilities,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-1025] (Washington,
D.C.: Sept. 12, 2003); GAO, United States Postal Service: Opportunities
to Strengthen IT Investment Management Capabilities, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-03-3] (Washington, D.C.: Oct. 15,
2002); and GAO, Information Technology: DLA Needs to Strengthen Its
Investment Management Capability, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-02-314] (Washington, D.C.: Mar. 15, 2002).
[32] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct.
28, 2004) (codified in part at 10 U.S.C. § 2222).
[33] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-219].
[34] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-658].
[35] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[36] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct.
28, 2004) (codified in part at 10 U.S.C. § 2222).
[37] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1072].
[38] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-462T].
[39] Pub. L. No. 100-181 § 904, 122 Stat. 3, 273-75 (Jan. 28, 2008).
[40] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[41] According to DOD, stakeholders include representatives from the
core business mission areas through the Business Enterprise Priorities
(e.g, Personnel Visibility, Acquisition Visibility, Common Supplier
Engagement, Materiel Visibility, Real Property Accountability, and
Financial Visibility). They also will include representatives from the
component organizations that must align their architectures to the
corporate BEA, the program that must align to the corporate BEA and the
component architectures, the IRBs that use the BEA to guide and
constrain investments, and contractors that support programs in
building and configuring architecturally compliant systems.
[42] The United States Standard General Ledger provides a uniform chart
of accounts and technical guidance used in standardizing federal agency
accounting.
[43] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-777];
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-584G].
[44] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-451].
[45] According to DOD, the GIG consists of a globally interconnected,
end-to-end set of information capabilities, associated processes, and
personnel for collecting, processing, storing, disseminating, and
managing information on demand to warfighters, policymakers, and
support personnel, and as such represents the department's IT
architecture.
[46] The GIG strategy provides for federating the many and varied
architectures across the department's four mission areas--Warfighting,
Business, DOD Intelligence, and Enterprise Information Environment. It
was issued in August 2007 by the Assistant Secretary of Defense
(Networks and Information Integration)/Chief Information Officer
(ASD(NII)/CIO).
[47] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-519].
[48] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[49] The time-phased milestones refer to milestones, such as initial
operating capability, full operating capability, technology development
phase, and system development and demonstration phase.
[50] We did not independently verify the reliability of this reported
progress because we have an ongoing review of this program.
[51] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[52] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[53] DOD included system and budget information for the Defense
Financial and Accounting Service and Defense Logistics Agency in the
transition plan. DOD did not include this information for the following
defense agencies: (1) Missile Defense Agency, (2) Defense Advanced
Research Projects Agency, (3) Defense Commissary Agency, (4) Defense
Contract Audit Agency, (5) Defense Contract Management Agency, (6)
Defense Information Systems Agency, (7) Defense Intelligence Agency,
(8) Defense Legal Services Agency, (9) Defense Security Cooperation
Agency, (10) Defense Security Service, (11) Defense Threat Reduction
Agency, (12) National Geospatial-Intelligence Agency, and (13) National
Security Agency.
[54] DOD included system and budget information for the Transportation
Command in the transition plan. DOD did not include this information
for the (1) Central Command, (2) Joint Forces Command, (3) Pacific
Command, (4) Southern Command, (5) Space Command, (6) Special
Operations Command, (7) European Command, and (8) Strategic Command.
[55] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-03-584G] and CIO
Council, A Practical Guide to Federal Enterprise Architecture, Version
1.0 (February 2001).
[56] NCES is intended to provide capabilities that are key to enabling
ubiquitous access to reliable decision-quality information. NCES
capabilities can be packaged into four product lines: service-oriented
architecture foundation (e.g., security and information assurance),
collaboration (e.g., application sharing), content discovery and
delivery (e.g., delivering information across the enterprise), and
portal (e.g., user-defined Web-based presentation).
[57] Enterprise application integration software is a commercial
software product, commonly referred to as middleware, to permit two or
more incompatible systems to exchange data from different databases.
[58] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[59] 40 U.S.C. § 11312.
[60] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-394G].
[61] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[62] The four IRBs are for (1) Financial Management, (2) Weapon Systems
Lifecycle Management and Materiel Supply and Services Management, (3)
Real Property and Installations Lifecycle Management, and (4) Human
Resources Management.
[63] The Enterprise Information Environment Mission Area enables the
functions of the other mission areas (e.g., Warfighting Mission Area,
Business Mission Area, and Defense Intelligence Mission Area) and
encompasses communications, computing, and core enterprise service
systems, equipment, or software that provides a common information
capability or service for enterprise use.
[64] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-52].
[65] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-53].
[66] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[67] The Joint Capabilities Integration and Development System is a
need-driven management system used to identify future capabilities for
DOD; the Planning, Programming, Budgeting, and Execution process is a
calendar-driven management system for allocating resources and
comprises four phases--planning, programming, budgeting, and executing--
that define how budgets for each DOD component and the department as a
whole are created, vetted, and executed; and the Defense Acquisition
System is an event-driven system for managing product development and
procurement and guides the acquisition process for DOD.
[68] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-52];
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-53].
[69] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-538].
[70] DOD refers to these systems as Major Automated Information
Systems.
[71] The National Defense Authorization Act for Fiscal Year 2008
designates the Deputy Secretary of Defense as its CMO, creates a Deputy
CMO position within the department, and designates the undersecretaries
of each military department as CMOs for their respective departments.
[72] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-538].
[73] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[74] The approval authorities, as discussed earlier in this report, are
the heads of the IRBs. They are the USD(AT&L); the Under Secretary of
Defense (Comptroller); the Under Secretary of Defense for Personnel and
Readiness; and the ASD(NII)/CIO. They are responsible for the review,
approval, and oversight of business systems and must establish
investment review processes for systems under their cognizance.
[75] A key condition identified in the act includes certification by
designated approval authorities that the defense business system
modernization is (1) in compliance with the enterprise architecture;
(2) necessary to achieve critical national security capability or
address a critical requirement in an area such as safety or security;
or (3) necessary to prevent a significant adverse effect on a project
that is needed to achieve an essential capability, taking into
consideration the alternative solutions for preventing such an adverse
effect.
[76] 10 U.S.C.§2222(b); 31 U.S.C.§1341(a) (1) (A).
[77] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733].
[78] DOD's IT Portfolio Repository is the authoritative repository for
certain information about DOD's business systems, such as system names
and the responsible DOD components that are required for the
certification, approval, and annual reviews of these business system
investments.
[79] In addition, each component precertification authority submits a
list of system names to the IRBs on a semiannual basis, to include Tier
4 systems and systems in operations and maintenance that have been
reviewed at the component level.
[80] Ronald W. Reagan National Defense Authorization Act for Fiscal
Year 2005, Public Law 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct.
28, 2004) (codified in part at 10 U.S.C. § 2222).
[81] GAO, DOD Business Systems Modernization: Progress Continues to Be
Made in Establishing Corporate Management Controls, but Further Steps
are Needed, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-733]
(Washington, D.C.: May 14, 2007).
[82] GAO, Business Systems Modernization: Air Force Needs to Fully
Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-52]
(Washington D.C.: Oct. 31, 2007); GAO, Business Systems Modernization:
Department of the Navy Needs to Establish Management Structure and
Fully Define Policies and Procedures for Institutionally Managing
Investments, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-53]
(Washington D.C.: Oct. 31, 2007); GAO, DOD Business Systems
Modernization: Military Departments Need to Strengthen Management of
Enterprise Architectures, [hyperlink, http://www.gao.gov/cgi-
bin/getrpt?GAO-08-519] (Washington D.C.: May 12, 2008); and GAO,
Defense Business Transformation: Sustaining Progress Requires
Continuity of Leadership and an Integrated Approach, [hyperlink,
http://www.gao.gov/cgi-bin/getrpt?GAO-08-462T] (Washington D.C.: Feb.
7, 2008).
[83] GAO, Business Systems Modernization: DOD Needs to Fully Define
Policies and Procedures for Institutionally Managing Investments,
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-538] (Washington,
D.C.: May 11, 2007).
[84] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-52].
[85] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-53].
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: