Homeland Security
DHS Enterprise Architecture Continues to Evolve but Improvements Needed
Gao ID: GAO-07-564 May 9, 2007
GAO designated the transformation of the Department of Homeland Security (DHS) as high risk in 2003, and it continues to do so today. One essential tool for facilitating organizational transformation is an enterprise architecture (EA)--a corporate blueprint that serves as an authoritative frame of reference for information technology investment decision making. The Congress required DHS to submit a report that includes its EA and a capital investment plan for implementing it. The Congress also required that GAO review the report. In June 2006, DHS submitted this report to the Congress. GAO's objective was to assess the status of the EA, referred to as DHS EA 2006, and the plan for implementing it. To meet this objective, GAO analyzed architectural documents relative to its prior recommendations; evaluated stakeholder comments and the process used to obtain them; and analyzed the implementation plan against relevant guidance.
DHS EA 2006 has evolved beyond prior versions, but missing architecture content and limited stakeholder input constrain its usability. While the architecture partially addresses each of the prior GAO recommendations concerning the content of DHS's architecture, the full depth and breadth of EA content that the recommendations solicited is still missing. For example, GAO recommended that DHS use, among other things, an analysis of the gaps between the current ("as-is") and future ("to-be") states of the architecture to define missing and needed capabilities and form the basis for its transition plan. However, DHS EA 2006 does not include a transition plan and it does not include any evidence of a gap analysis. In addition, department stakeholders, including component organizations and the department's EA support contractor, provided a range of comments relative to the completeness, internal consistency, and understandability of a draft of DHS EA 2006, but the majority of the comments were not addressed. Moreover, key stakeholders, such as the Coast Guard and the Transportation Security Administration, did not comment on the draft. GAO found that the extent of stakeholder participation was limited because the approach EA officials used to solicit input did not clearly define the type of information being requested and did not provide sufficient time for responding. Furthermore, DHS's capital investment plan for implementing its architecture is not based on a transition plan and is missing key information technology (IT) investments. Thus, the plan does not provide a comprehensive roadmap for transitioning the department to a target architectural state. Also, the plan does not account for all of DHS's planned investments in IT (excluding about $2.5 billion in planned IT investments). Without an architecture that is complete, internally consistent, and understandable, the usability of the DHS's EA is diminished, which in turn limits the department's ability to guide and constrain IT investments in a way that promotes interoperability, reduces overlap and duplication, and optimizes overall mission performance.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-07-564, Homeland Security: DHS Enterprise Architecture Continues to Evolve but Improvements Needed
This is the accessible text file for GAO report number GAO-07-564
entitled 'Homeland Security: DHS Enterprise Architecture Continues to
Evolve but Improvements Needed' which was released on May 9, 2007.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Committees:
United States Government Accountability Office:
GAO:
May 2007:
Homeland Security:
DHS Enterprise Architecture Continues to Evolve but Improvements
Needed:
GAO-07-564:
Contents:
Letter:
DHS EA 2006 Has Evolved beyond Prior Versions, but Missing Architecture
Content and Limited Stakeholder Input Constrain Its Usability:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Briefing to the Staffs of the Subcommittees on Homeland
Security Senate and House Committees on Appropriations:
Appendix II: Comments from the Department of Homeland Security:
Appendix III: GAO Contact and Staff Acknowledgments:
Abbreviations:
CBP: Customs and Border Protection:
CIO: chief information officer:
CURE: create, update, reference, and eliminate:
DHS: Department of Homeland Security:
EA: enterprise architecture:
EAMMF: Enterprise Architecture Management Maturity Framework:
FEMA: Federal Emergency Management Agency:
ICE: Immigration and Customs Enforcement:
IT: information technology:
OMB: Office of Management and Budget:
TRM: technical reference model:
TSA: Transportation Security Administration:
US-VISIT: United States Visitor and Immigrant Status Indicator
Technology:
USSS: United States Secret Service:
United States Government Accountability Office:
Washington, DC 20548:
May 9, 2007:
The Honorable Robert C. Byrd:
Chairman:
The Honorable Thad Cochran:
Ranking Minority Member:
Subcommittee on Homeland Security:
Committee on Appropriations:
United States Senate:
The Honorable David E. Price:
Chairman:
The Honorable Harold Rogers:
Ranking Minority Member:
Subcommittee on Homeland Security:
Committee on Appropriations:
House of Representatives:
Information technology (IT) is a critical tool in the Department of
Homeland Security's (DHS) quest to transform 22 diverse and distinct
agencies into one cohesive, high-performing department. Because of the
importance of this transformation and the magnitude of the associated
challenges, we designated the department's implementation and
transformation as a high-risk undertaking in 2003.[Footnote 1] In 2003
and in 2004, we reported that DHS needed to, among other things,
develop and implement an enterprise architecture (EA)--a corporate
blueprint that serves as an authoritative frame of reference to guide
and constrain IT investment decision making, promoting
interoperability, minimizing wasteful duplication and redundancy, and
optimizing departmentwide mission performance.[Footnote 2]
Recognizing the importance that an EA plays in effectively leveraging
IT for organizational transformation, DHS issued an initial version of
its architecture in September 2003. Following our review of this EA and
recommendations for its improvement,[Footnote 3] the department issued
a second version in October 2004. The DHS Appropriations Act of 2006
required the department's chief information officer (CIO) to submit to
Congress a report that includes, among other things, an EA and a
capital investment plan for implementing the architecture.[Footnote 4]
It also required GAO to review the report. On June 16, 2006, the CIO
submitted its report, which included the third version of the
department's EA and a plan for implementing it, which DHS referred to
as DHS EA 2006 and Capital Investment Plan for Implementing the DHS
Enterprise Architecture.
Our objective was to assess the status of DHS EA 2006, including the
capital investment plan for implementing it. On February 28, 2007, we
briefed your staffs on the results of our review, which included
sensitive information. This report transmits the slides from that
briefing, with sensitive information removed. These slides, along with
our scope and methodology, are included as appendix I.
DHS EA 2006 Has Evolved beyond Prior Versions, but Missing Architecture
Content and Limited Stakeholder Input Constrain Its Usability:
DHS EA 2006 partially addresses the content shortcomings in earlier
versions of the department's architecture, which we had reported on and
made recommendations to correct. However, the full depth and breadth of
EA content that our 41 recommendations provided for is not reflected in
DHS EA 2006. For example, we recommended that the architecture include
a data dictionary, which is a repository of standard definitions of key
terms. In response, DHS EA 2006 provides a data dictionary, but it does
not include definitions of all key terms (e.g., first responder). We
also recommended that DHS base its EA transition plan on, among other
things, an analysis of the gaps between the current ("as-is") and
future ("to-be") states of the architecture to define missing and
needed capabilities.[Footnote 5] However, DHS EA 2006 does not include
a transition plan, and it does not include any evidence of a gap
analysis--a comparison of the "as-is" and "to-be" architectures to
identify capability differences.
Moreover, this version of the architecture does not address the
majority of the 383 comments made on a draft of it by DHS stakeholders,
including component organizations and the department's EA support
contractor. For example, Immigration and Customs Enforcement commented
that the inputs it provided had not been incorporated, represented, or
otherwise accommodated in any way. Of the comments, 139 were
categorized as fully addressed, 27 as partially addressed, 101 as not
addressed but to be resolved in a later EA version. The remaining 116
had no resolutions specified. In general, comments were raised about
the architecture's completeness, internal consistency, and
understandability. In addition, concerns were raised about the
architecture's usability as a departmental frame of reference for
informing IT investment decisions.
In addition, the approach DHS used in soliciting comments did not
clearly define the type of information requested and did not provide
sufficient time for detailed responses. Also, the extent to which
comments were obtained was limited. For example, key stakeholders, such
as the Coast Guard and Transportation Security Administration, chose to
not comment on a draft of DHS EA 2006.
Lastly, DHS's capital investment plan for implementing its architecture
is not based on an EA transition plan and is missing key IT
investments. For example, the plan does not account for all of DHS's
planned investments in IT nor does it include information on certain
major IT capital investments.
Conclusions:
DHS's approach to developing its EA through incremental releases or
versions is reasonable, given the size and complexity of the department
and the volumes of information needed to produce a complete,
understandable, and usable architecture. As the department's third
version of its EA, DHS EA 2006 is an improvement over prior versions,
as evidenced by it at least partially addressing our prior
recommendations. Moreover, DHS EA 2006 is partially responsive to
stakeholder comments on a draft of it.
Nevertheless, DHS EA 2006 is still not sufficiently complete and
usable, given those aspects of our recommendations that it did not
fully address the range of stakeholder comments that have not been
resolved and the limitations of the capital investment plan. Given the
critical role that DHS's EA should play in the department's
transformation efforts, which we have identified as a high-risk
undertaking, it is important for DHS to fully address both our existing
recommendations and stakeholder comments on incremental versions of its
architecture.
Finally, with regard to stakeholder comments, it is also important for
DHS to ensure that it devotes sufficient time and adopts an effective
approach to obtaining stakeholder comments on future versions. If it
does not, the chances of developing a well-defined EA that is accepted
and usable will be diminished.
Recommendations for Executive Action:
To ensure that DHS fully implements our prior EA recommendations and
effectively solicits and addresses stakeholder comments on incremental
versions of its EA, we recommend that the Secretary of Homeland
Security direct the department's CIO to take the following two actions:
* Include in future versions of the department's EA a traceability
matrix that explicitly maps EA content to our recommendations in
sufficient detail to demonstrate their implementation, and:
* Ensure that future efforts to solicit stakeholder comments on the
department's EA employ an effective approach that includes clearly
defining the type of information requested and allowing sufficient time
for obtaining and responding to these comments.
We are not making recommendations for addressing limitations in the
department's capital investment plan for implementing its EA because
our existing recommendations for an EA transition plan address such
limitations.
Agency Comments and Our Evaluation:
In DHS's written comments on a draft of this report, signed by the
Director, Departmental GAO/OIG Liaison Office, and reprinted in
appendix II, the department stated that the fourth release of its EA
(referred to as HLS EA 2007) addresses many of the issues that our
report identifies. In addition, DHS agreed to include in future EA
releases a traceability matrix that explicitly maps its EA content to
our recommendations, adding that this recommended tool will allow DHS
to better track progress.
However, DHS commented that its current approach to soliciting
architecture stakeholders' input is adequate, noting that this approach
provides stakeholders with unlimited opportunity to comment and
observing that its receipt of nearly 400 comments on DHS EA 2006
demonstrates this opportunity. Moreover, the department stated that we
had an incorrect perception of how it treated stakeholder comments,
adding that all comments that require resolution will be addressed in
future EA releases.
We do not agree with DHS's comments about the adequacy of its approach
to obtaining and incorporating stakeholder comments for several
reasons, each of which are cited in our report. For example, the
approach did not adequately define the type and nature of the comments
being solicited, and it did not provide sufficient time for
stakeholders to comment, as evidenced by some stakeholders stating that
the time was too limited. Also, most DHS component organizations,
including large ones like the Transportation Security Agency and the
Coast Guard, did not provide comments. Moreover, about 60 percent of
the comments that were received on DHS EA 2006 were not to be addressed
in the next version (HLS EA 2007), and it was not specified when they
would be addressed. Given that comments were directed at the
architecture's completeness, internal consistency, understandability,
and usability, which are all fundamental characteristics of an EA, we
believe that our recommendation aimed at employing a more effective
approach to soliciting and responding to comments is warranted.
We are sending copies of this report to the Chairmen and Ranking
Minority Members of other Senate and House committees that have
authorization and oversight responsibilities for homeland security. We
are also sending a copy of this report to the Secretary of Homeland
Security and the Director of OMB. We will also make copies available to
others upon request. In addition, this report will be available at no
charge on the GAO Web site at http://www.gao.gov.
If you or your staffs have any questions about this report, please
contact me at (202) 512-3439 or hiter@gao.gov. Contact points for our
Offices of Congressional Relations and Public Affairs may be found on
the last page of this report. GAO staff members who made major
contributions to this report are listed in appendix III.
Signed by:
Randolph C. Hite:
Director, Information Technology Architecture and Systems Issues:
[End of section]
Appendix I: Briefing to the Staffs of the Subcommittees on Homeland
Security Senate and House Committees on Appropriations:
Homeland Security: DHS Enterprise Architecture Continues to Evolve but
Improvements Needed:
Briefing to the Staffs of the Subcommittees on Homeland Security Senate
and House Committees on Appropriations:
February 28, 2007:
Table Of Contents:
Introduction:
Objective, Scope, and Methodology:
Results in Brief:
Background:
Results:
Conclusions:
Recommendations:
Agency Comments:
Attachment 1: DHS EA 2006 Structure:
Attachment 2: Previous GAO Recommendations on DHS Enterprise
Architecture:
Introduction:
Information technology (IT) is a critical tool in the Department of
Homeland Security's (DHS) quest to transform 22 diverse and distinct
agencies into one cohesive, high-performing department. In light of the
importance of this transformation and the magnitude of the associated
challenges, in 2003 we designated the department's implementation and
transformation as a high-risk undertaking.[Footnote 6]
In 2003 and in 2004, we reported that DHS needed to, among other
things, develop and implement an enterprise architecture (EA)-a
corporate blueprint-as an authoritative frame of reference to guide and
constrain IT investment decision-making in a way that promoted
interoperability, minimized wasteful duplication and redundancy, and
optimized departmentwide mission performance.[Footnote 7]
Recognizing the importance that an EA plays in effectively leveraging
IT for organizational transformation, DHS issued an initial version of
its architecture in September 2003. Following our review and
recommendations for improvement of this version,[Footnote 8] the
department issued a second version in October 2004.
The DHS Appropriations Act of 2006 required the department's chief
information officer (CIO) to submit to Congress a report that includes,
among other things, an EA and a capital investment plan for
implementing the architecture. It also required GAO to review the
report.[Footnote 9] On June 16, 2006, the CIO submitted its report,
which included the third version of the department's EA and a plan for
implementing it, which DHS referred to as DHS EA 2006 and Capital
Investment Plan for Implementing the DHS EA.
Objective, Scope, And Methodology:
As agreed with staff for the Chairmen and Ranking Minority Members of
the House and Senate Appropriations Committees' respective homeland
security subcommittees, our objective was to assess the status of DHS
EA 2006, including the capital investment plan for implementing it.
In order to meet this objective, we:
analyzed DHS EA 2006 and supporting documentation against our 41 prior
recommendations regarding DHS EA content;
evaluated the nature, substance, and disposition of stakeholder
comments, including documentation produced by DHS's EA support
contractor on DHS EA 2006;
assessed DHS's process for soliciting stakeholder comments relative to
applicable survey and data collection practices; analyzed DHS's capital
investment plan against relevant guidance, including Office of
Management and Budget's (OMB) capital planning guidance and applicable
EA guidance; and:
interviewed DHS and contractor officials about their efforts to address
our recommendations and resolve stakeholder comments, process for
soliciting and responding to stakeholder comments, and basis for the
capital investment plan.
We conducted our work at DHS and contractor facilities in the
Washington, D.C., metropolitan area from June 2006 to February 2007 in
accordance with generally accepted government auditing standards. For
DHS data that we did not substantiate, we made appropriate attribution
indicating the data source.
RESULTS IN BRIEF:
DHS EA 2006 has evolved beyond prior versions, but missing architecture
content and limited stakeholder input constrain its usability. While
the architecture partially addresses prior GAO recommendations and
stakeholder comments, the full depth and breadth of EA content that our
recommendations provided for is still missing. Additionally, the
majority of stakeholder comments, including concerns about architecture
completeness, consistency, and understanding remain to be addressed.
Stakeholder commentary on draft DHS EA 2006 products was limited by the
approach used to solicit comments and the extent to which stakeholders
provided comments. Further, DHS's capital investment plan for
implementing its architecture is not based on an EA transition plan and
is missing key IT investments. Without an EA that is complete,
internally consistent, and understandable, DHS's ability to guide and
constrain IT investments in a way that promotes interoperability,
reduces overlap and duplication, and optimizes mission performance will
be significantly diminished.
We are making recommendations to ensure that DHS fully implements our
prior EA recommendations and effectively solicits stakeholder comments
on future versions of its EA.
In commenting on a draft of this briefing, DHS officials, including the
DHS Chief Information Officer (CIO) and the Chief Architect,
acknowledged that DHS EA 2006 is missing important content and stated
that future versions will add content and improve usability.
Additionally, the Chief Architect generally agreed with our
recommendations for mapping our prior recommendations to specific EA
content and for effectively soliciting stakeholder comments on future
EA versions.
Background:
Created in March 2003, DHS has assumed operational control of about
209,000 civilian and military positions from 22 agencies and offices
that specialize in one or more aspects of homeland security.[Footnote
10] A major purpose of DHS's establishment was to improve coordination,
communication, and information sharing among the multiple federal
agencies responsible for protecting the homeland.
As we previously reported, the creation of DHS[Footnote 11] is
critically important and poses significant management and leadership
challenges. For these reasons, we designated the implementation of the
department and its transformation as high risk; we also pointed out
that failure to effectively address DHS's management challenges and
program risks could have serious consequences for our national
security.
Mission and Organization:
DHS's mission is to lead the unified national effort to secure the
United States by preventing and deterring terrorist attacks and
protecting against and responding to national threats. Among other
things, DHS is charged with ensuring safe and secure borders, and
promoting the free flow of commerce.
To accomplish its mission, DHS is organized into various components,
each of which is responsible for specific homeland security missions
and for coordinating related efforts with its sibling components as
well as with external entities. Table 1 shows DHS's principal
organizations and their missions. Figure 1 shows a simplified view of
the DHS organizational structure.
Table 1: Principal DHS Organizations and Their Missions:
Principal organizations[A]: Citizenship and Immigration Services;
Missions: Administers immigration and naturalization adjudication
functions and establishes immigration services policies and priorities.
Principal organizations[A]: Coast Guard;
Missions: Protects the public, the environment, and U.S. economic
interests in the nation's ports and waterways, along the coast, on
international waters, and in any maritime region as required to support
national security.
Principal organizations[A]: Customs and Border Protection (CBP);
Missions: Protects the nation's borders in order to prevent terrorists
and terrorist weapons from entering the United States, while
facilitating the flow of legitimate trade and travel.
Principal organizations[A]: Federal Emergency Management Agency;
Missions: Prepares the nation for hazards, manages federal response and
recovery efforts following any national incident, and administers the
(FEMA) National Flood Insurance Program.
Principal organizations[A]: Immigration and Customs Enforcement (ICE);
Missions: Identifies and addresses vulnerabilities in the nation's
border, economic, transportation, and infrastructure security.
Principal organizations[A]: Management Directorate;
Missions: Manages department budgets and appropriations, expenditure of
funds, accounting and finance, procurement, human resources, IT
systems, facilities and equipment, and performance measurements.
Principal organizations[A]: Preparedness Directorate;
Missions: Works with state, local, and private sector partners to
identify threats, determine vulnerabilities, and target resources where
risk is greatest, thereby safeguarding borders, seaports, bridges and
highways, and critical information systems.
Principal organizations[A]: Science and Technology Directorate;
Missions: Serves as the primary research and development arm of the
department, responsible for providing federal, state, and local
officials with the technology to protect the homeland.
Principal organizations[A]: Secret Service (USSS);
Missions: Protects the President and other high-level officials and
investigates counterfeiting and other financial crimes (including
financial institution fraud, identity theft, and computer fraud) and
computer-based attacks on the nation's financial, banking, and
telecommunications infrastructure.
Principal organizations[A]: Transportation Security Administration
(TSA);
Missions: Protects the nation's transportation systems to ensure
freedom of movement for people and commerce.
Principal organizations[A]: U.S. Visitor and Immigrations Status
Indicator Technology (US-VISIT;
Missions: Develops and implements a governmentwide program to record
the entry into and exit from the United States of selected individuals,
verify their identity, and confirm their compliance with the terms of
their admission into and stay in this country.
Source: GAO analysis based on DHS data.
[A] Does not show all the organizations under each of the directorates
or all organizations that report directly to the DHS Secretary and
Deputy Secretary.
[End of table]
Figure 1: Simplified and Partial DHS Organizational Structure:
[See PDF for image]
Source: GAO analysis based on DHS data.
[End of figure]
EA: A Brief Description:
An EA provides systematic structural descriptions-in useful models,
diagrams, tables, and narrative-of how an entity currently operates
(the "as-is" architecture) and how it plans to operate in the future
(the "to-be" architecture), and it includes a plan for making that
transition (the transition plan). In the federal arena, the transition
plan provides the basis for informed capital investment planning.
Agency capital investment plans are the basis for budget exhibits that
are submitted annually to the OMB. Those plans identify, among other
things, ongoing and planned IT investments.
Our experience with federal agencies has shown that investing in IT
programs without having an EA to guide the process often results in
systems that are duplicative, not well integrated, unnecessarily costly
to maintain, and limited in terms of meeting mission needs and
optimizing mission performance.[Footnote 12]
GAO EA Guidance:
To assist DHS and other federal agencies in effectively developing,
maintaining, and implementing an enterprise architecture, we published
a framework for architecture management that is grounded in federal
guidance and recognized best practices.[Footnote 13] The framework is a
five-stage maturity framework that outlines 31 practices that
contribute to effective architecture management.
In addition, we published a set of architecture content criteria that
define the attributes of well-defined EA artifacts. These criteria are
associated with the major components of the current and target
architectures, namely the business, performance, information/data,
services/applications, technical, and security descriptions, as well as
the sequencing plan for transitioning from the current to the target
architectures.[Footnote 14]
DHS EA Players:
The DHS Office of the CIO has primary responsibility for departmentwide
IT. According to the CIO, this includes among other things, developing
and facilitating the implementation of the department's EA. To satisfy
this responsibility, the CIO established various entities with specific
roles and responsibilities. (See table 2 below.)
Table 2: DHS EA Players:
Player: Enterprise Architecture Board (EAB);
Roles and responsibilities: Evaluates and approves IT investments for
EA alignment and ensures that the EA is updated and maintained. Chair
is the DHS CIO; Vice-Chair is the DHS Deputy CIO. Members include Chief
Financial Officer Designee, Chief Procurement Officer Designee,
Designated CIO's from DHS Directorates/Components, and a Business
Process Support Group Designee.
Player: Enterprise Architecture Center of Excellence (EACOE);
Roles and responsibilities: Reviews the information provided by the
Submitter and provides recommendations to the EAB. Members include
representatives from the components and departmental specialists.
Player: Chief Architect;
Roles and responsibilities: Serves as the EA program manager and is
responsible for developing the EA and associated processes.
Player: Submitter;
Roles and responsibilities: Initiates a request to the EACOE and EAB
for a decision about a particular IT investment. Represents a DHS
component, focus group, or other DHS stakeholder:
Player: Reviewer;
Roles and responsibilities: Provides the research, supporting analysis,
and to support the EACOE and EAB decision process.
Player: EA team;
Roles and responsibilities: Supports DHS Chief Architect in developing
and managing the EA.
Player: Facilitator team;
Roles and responsibilities: Supports, manages, and facilitates the
EACOE.
Source: GAO analysis of DHS data.
[End of table]
Additionally, major stakeholders consisting of DHS component
organizations (e.g., CBP and FEMA), internal stakeholders (e.g., Chief
Information Security Office and the Wireless Management Office), and
the department's EA support contractor are asked to support development
of the architecture by providing input and responding to solicitations
for comments on draft versions.
History of DHS EA Versions:
In September 2003, DHS issued the first version of its EA, called HLS
EA (Homeland Security Enterprise Architecture). In October 2004, it
issued the second version, known as EA version 2.
Subsequently, DHS decided to issue annual architecture updates. The
first of these, DHS EA 2006, was issued in February 2006, and was
included in the DHS CIO's June 2006 report to the Congress as mandated
by the DHS Appropriations Act of 2006. According to DHS, this version
was to create a better frame of reference to support departmental
planning for the "to-be" environment, and to better coordinate cross-
departmental initiatives. The department reports that the focus of DHS
EA 2007 will be on issuing an enterprisewide transition plan and
improving the target architecture.
Summary of DHS EA 2006:
DHS EA 2006 is organized as follows:
Overview Documents:
Business Architecture:
Data/Information Architecture:
Information Sharing Architecture:
"As-is" Inventory:
Target Technical Architecture:
EA Analysis Reports:
Create, Update, Reference, and Eliminate (CURE) Matrix:
HLS EA Strategic Drivers:
Other EA Related Artifacts:
Attachment 1 depicts the structure of DHS EA 2006.
Summary of GAO Reviews of DHS's EA:
Since 2003, we have evaluated and reported on DHS's efforts to develop,
maintain, and implement its enterprise architecture from three EA
perspectives: management, content, and investment alignment.
EA Management:
We reported in 2003[Footnote 15] and again in 2006[Footnote 16], on the
department's institutional capability to manage its architecture
program, including management practices associated with architecture
governance, content, use, and measurement.
In 2003 we reported that the department had implemented many of the
practices described in our Enterprise Architecture Management Maturity
Framework (EAMMF version 1.1).[Footnote 17] For example, the department
had, among other things, assigned architecture development,
maintenance, program management, and approval responsibilities; and
created policies governing architecture development and maintenance.
However, we also reported that the department's EA products did not
describe its "as-is" and "to-be" environments, nor did they include a
sequencing plan. Furthermore, the EA business, performance,
information/data, application/service, and technology descriptions did
not address security.
In August 2006, we reported that DHS had satisfied a number of key
elements within our EA framework (version 1.1). For example, we
reported that DHS EA 2006 included products describing its "as-is" and
"to-be" environments. However, we also reported that the sequencing
plan was in draft and not approved, and DHS had not, for example,
subjected its EA products and management processes to independent
verification and validation, and it was not measuring and reporting on
EA use and return on investment.
EA Content:
In 2004, we reported on the completeness and usability of the initial
version of DHS's enterprise architecture.[Footnote 18] In summary, we
found that while the initial version provided a foundation on which to
build, it was missing important content (i.e., was not sufficiently
complete), which limited its usability. Moreover, we found that this
version was not systematically derived from a DHS or national homeland
security business strategy, but rather was an amalgamation of the
existing architectures that several of DHS's predecessor agencies
already had, along with their respective portfolios of system
investments. Accordingly, we made 41 recommendations aimed at ensuring
that future versions of the architecture:
are based on a methodology that provides for identifying the
appropriate scope and are effectively planned;
include the key elements business, performance, information, services/
applications, technical, and security descriptions of a "to-be"
architecture; and:
include the key elements of a transition plan.
Attachment 2 lists the 41 recommendations.
EA Investment Alignment:
Between 2003 and 2006, we have reported on the extent to which the
department has ensured that major IT investments, such as US-
VISIT,[Footnote 19] CBP's Automated Commercial Environment (ACE)
system[Footnote 20], and ICE's Atlas program[Footnote 21], are aligned
with its EA. For example,
We reported in September 2003 that US-VISIT was making assumptions and
decisions about the program's operational technological context because
DHS did not yet have a well-defined EA. We concluded that if program
decisions were not consistent with DHS's EA, program rework would be
required.[Footnote 22]
In February 2005, we reported that DHS had assessed US-VISIT for
alignment with its architecture and found it to be in compliance.
However, DHS could not provide us with sufficient documentation to
understand its architecture compliance methodology and criteria, or
verifiable analysis to justify its determination.[Footnote 23]
We similarly reported in March 2005 that DHS's determination that ACE
was aligned with DHS's EA was not supported by sufficient documentation
to allow us to understand its architecture compliance methodology and
criteria (e.g., definition of alignment and compliance) or with
verifiable analysis demonstrating alignment.[Footnote 24] In May 2006,
we again reported that DHS evaluated and approved ACE alignment.
However, DHS again did not have a documented methodology for evaluating
programs for compliance, and no analysis or documentation was produced
that could be used to verify ACE's degree of alignment. Moreover, the
alignment assessment again did not cover all architectural
views.[Footnote 25]
We reported in September 2005 that DHS had determined that Atlas was in
compliance with the EA but that this determination was also not based
on a documented analysis that is necessary to make such a
determination.[Footnote 26] In July 2006, we reported that DHS had
again determined that Atlas was in compliance. However, the
determination was not based on a documented analysis mapping Atlas's
infrastructure architecture to the EA or a documented methodology for
evaluating compliance.[Footnote 27]
Results:
DHS EA 2006 Evolution and Limitations:
DHS EA 2006 Has Evolved beyond Prior Versions, but Missing Architecture
Content and Limited Stakeholder Input Constrain Its Usability:
DHS EA 2006 partially addresses the content shortcomings that we
previously reported about prior versions of the department's
architecture and made recommendations to correct. Moreover, this latest
version of the architecture either partially or fully addresses about
36 percent of the comments made by DHS component organizations and
stakeholders and its EA support contractor on a draft of it.
Nevertheless, the full depth and breadth of EA content that our
recommendations provided for adding is still missing. Moreover, not
only do the majority of stakeholder comments remain to be addressed,
but key stakeholders, such as the Coast Guard and TSA, chose to not
comment on a draft of DHS EA 2006, and the approach used to solicit
input from those DHS organizations and stakeholders that chose to
comment was limited.
As a result, concerns about the usability of DHS EA 2006 as a
departmental frame of reference for informing IT investment decisions
were raised by certain DHS component organizations and stakeholders,
and the EA support contractor, and as noted earlier, was observed as
part of our prior work on major IT investments. Without an EA that is
complete, internally consistent, and understandable, DHS's ability to
guide and constrain IT investments in a way that promotes
interoperability, reduces overlap and duplication, and optimizes
overall mission performance will be greatly diminished.
DHS EA 2006 Partially Addresses Prior GAO Recommendations, but
Important Content Still Are Missing:
DHS EA 2006 partially satisfies each of our 41 prior recommendations
aimed at adding important content to the architecture's "to-be"
business, performance, information, services/applications, technical,
and security views.[Footnote 28] The following are summaries of
selected recommendations that are illustrative of the extent to which
DHS EA 2006 addresses them.
Recommendation: Include in the "business" view of the "to-be"
architecture, among other things, the enterprise's purpose, scope
(e.g., organizations, business areas, and internal and external
stakeholders' concerns), and associated limitations or assumptions.
In response, the DHS EA 2006 business view describes DHS's purpose,
including strategic goals, and it describes aspects of DHS's scope,
such as organizational entities and their business area
responsibilities. Further, it describes the need to interact with
external stakeholders, and it identifies the limitations of its current
environment (e.g., information sharing). However, some of the entities
described no longer exist (e.g., Border and Transportation Security
Directorate). Moreover, it does not clearly describe DHS's scope within
the larger context of homeland security, which is important because
other departments are involved in homeland security, and thus where
DHS's business areas stop and other departments' start needs to be
clear. In addition, it does not identify any assumptions associated
with the "to-be" business model, such as cultural changes needed for
information sharing.
Recommendation: Include in the "business" view of the "to-be"
architecture a description of key business processes and the locations
where the processes will be performed, including the alignment among
(1) applicable federal laws, regulations, and guidance, (2) department
policies, procedures, (3) operational activities, (4) organizational
roles, and (5) operational events and information.
In response, the DHS EA 2006 identifies functions (e.g., "Implement and
Test Countermeasures") and services (e.g., "Person-Centric Information
Services") for achieving mission and strategic business goals (e.g.,
"Prevention"). However, the functions are not decomposed into business
processes, which is important because functions are logical groupings
of business activities, whereas a process is an executable series of
triggered events that produces a desired outcome. Moreover, not all
functions are assigned to a location/organization (e.g., "Discover
Threat Trends" or "Assess Preparedness Capabilities"). In addition,
while functions are based on applicable laws, regulations, and guidance
(e.g., the National Strategy for Homeland Security), the architecture
does not describe alignment with department policies, procedures, and
guidance, and it does not address operational activities, all
organizational roles, and operational events.
Recommendation: Include in the "performance" view of the "to-be"
architecture a description of measurable goals and outcomes for (1)
technology products and services and (2) business applications and
services that help enable achievement of business goals and outcomes.
In response, DHS EA 2006 describes certain technical performance goals/
measures, (e.g., 99.5 percent availability for IT infrastructure).
However, goals/measures for other items are not specified, such as
network throughputs. According to EA Team officials, specification of
all technical goals/measures are pending execution of IT and business
unit service level agreements. Also, the EA provides a vision for
business services to develop an integrated system or system of systems
that provide a comprehensive set of business services. In addition,
while the architecture specifies measurable goals and outcomes for some
applications and services, it does not describe such goals and services
for all specified services (e.g., "Managing Grants, Procurements, and
Acquisitions") and all systems (e.g., the Automated Export System).
Recommendation: Include in the "information/data" view of the "to-be"
architecture a description of data management policies, procedures,
processes, and tools for analyzing, designing, building, and
maintaining databases in an enterprise architected environment.
In response, DHS EA 2006 outlines data management strategies and
database management activities, including ensuring that the design,
development, deployment, operation, and maintenance of an enterprise
data environment support enterprisewide management of data. For
example, activities are identified for establishing procedures for
coordinating data maintenance activities. Also, data management
objectives are defined, such as ensuring that data storage is not
centralized but rather available via federated query. Further, the need
to identify and adopt tools for meeting data management objectives,
such as modeling and organizing data is recognized. However, DHS EA
2006 does not describe data management processes and procedures, such
as ones for identifying and standardizing core data elements to be used
across DHS and with external stakeholders.
Recommendation: Include in the "information/data" view of the "to-be"
architecture a data dictionary, which is a repository of standard
definitions for key terms.
In response, DHS EA 2006 provides a data dictionary that includes
definitions of subject areas (e.g., event) and data objects (e.g.,
incident). However, definitions of all key terms (e.g., first
responder) are not included in the dictionary.
Recommendation: Include in the "information/data" view of the "to-be"
architecture a (1) conceptual data model (i.e., a description of the
objects or things that comprise the business without regard to how they
will be physically stored); (2) a logical database model (i.e., the
normalized basis for developing the schemas that support design of
physical databases), and (3) a metadata model (i.e., the rules and
standards for representing data (data formats) and accessing data (data
protocols), according to a documented business context).
In response, DHS EA 2006 provides definitions of subject areas or high-
level categories of business things/information types (e.g.,
"Conveyances") and data objects (e.g., "Manifest") that are fundamental
to DHS's business. It also identifies the relationships between data
objects.
Also, DHS EA 2006 provides a logical database model for its "Integrated
Flow of Persons Through Existing Screening Processes" business
function. However, logical database models are not included for all
business functions. DHS EA Team officials told us that a project team
has been established to develop a metadata model.
Recommendation: Include in the "services/applications" view of the "to-
be" architecture a description of the enterprise application systems
and system components and their interfaces.
In response, DHS EA 2006 defines capabilities (e.g., Maintain Threat
Notification) for target application and application components. In
addition, it identifies business functions (e.g., "Communicate Risks"
and "Threats to the Public") that are enabled by application
components. However, the architecture does not describe the interfaces
between enterprise applications and application components. For
example, it does not depict the interconnection involved between the
"Communicate Risks" and "Threats to the Public" business functions.
Recommendation: Include in the "technical" view of the "to-be"
architecture a description of the technical reference model
(TRM)[Footnote 29] that describes enterprise infrastructure services,
including specific details regarding the services' functionality and
capabilities that will be available in developing application systems,
as well as the technical standards to be implemented for each service
and the life cycle of each service.
In response, DHS EA 2006 lists TRM services, such as data discovery
services and Web services, and identifies the technical standards that
support the services. However, since the listed services are from DHS
components, the services that will and will not be enterprise services
are not identified. In addition, the functionality and capabilities of
these services are not specified, and the anticipated life cycles of
many services (e.g., "Message Middleware") are not described.
Recommendation: Include in the "security" view of the "to-be"
architecture a description of the policies, procedures, goals,
strategies, principles, and requirements relevant to information
assurance and security, including how they align and integrate with
other elements of the architecture (e.g., security services).
In response, DHS EA 2006 contains policies, procedures, goals,
strategies, principles, and requirements for managing information
assurance and security. For example, it includes DHS IT Security
Architecture Guidance, which outlines security principles related to
identity and access management, as well as the DHS Sensitive Systems
Policy and DHS Sensitive Systems Handbook, which describe a range of
security policies and procedures. However, the architecture does not
clearly show how these documents are aligned with each other, and how
they are aligned with products in the other architecture views (e.g.,
the "technical" view's TRM identifies component organizations
firewalls, but it is unclear whether these are part of the "security"
view of the "to-be" architecture). Moreover, none of the security
related documents have been updated from those in the prior version of
the EA.
Recommendation: Base the EA transition plan on, among other things, an
analysis of the gaps between the "as-is" and "to-be" architectures'
business, information/data, and services/application systems to define
missing and needed capabilities.
In response, DHS EA 2006 does not include a transition plan, and it
does not include any evidence of a gap analysis-a comparison of the
current and target architectures to identify capability differences.
DHS EA 2006 Partially Addresses Stakeholder Comments, but Concerns
Remain:
A total of 383 stakeholder comments were submitted on a draft of DHS EA
2006. Of these comments, DHS reported that 139 were fully addressed, 27
were partially addressed, and 101 were not addressed but are to be
resolved in a later EA version, while 116 had no resolutions reported.
Thus, the majority of stakeholder comments, including expressions of
concern about the usability of DHS EA 2006, were not addressed.
Of the 139 stakeholder comments that were reported as fully addressed,
131 were reportedly addressed by adding or correcting previously
missing or erroneous information in the draft materials, such as
omitted systems, misspellings, and incorrect business owner contact
information and:
8 were reportedly addressed by providing additional descriptive
information.
According to DHS's comment tracking documentation, 27 of the remaining
244 comments were partially addressed. For example,
* The EA support contractor stated that the IT standards
profile[Footnote 30] in the TRIVI did not identify important time
frames for TRIVI categories. These categories are hold[Footnote 31],
contain[Footnote 32], divest[Footnote 33], or move-to.[Footnote 34]
Without time frames for each standard, programs cannot effectively plan
for the appropriate use of new and existing standards, thus increasing
the chances of later program rework.
In response, the EA Team stated that timeframes for 30 percent of the
standards in the move-to category were established by the January 31,
2006, target, and the remainder of the time frames are scheduled to be
identified by September 30, 2007.
Multiple comments criticized the usability of EA 2006. CBP stated that
the collection of Access tables and Excel spreadsheets was very hard to
understand, navigate, and cross-reference. IAIP commented that data
were spread over too many documents, making it hard for nonarchitects
to understand and utilize. US-VISIT noted that appropriate architecture
access tools were not provided. The EA support contractor stated that
the architecture's usability was poor and suggested adopting a proper
EA repository tool to improve usability.
In response, an html embedded table of contents with hyperlinks to EA
products was added. However, plans to make the EA repository available
in a commercial tool, which was at one time scheduled for December 1,
2005, have been suspended. Additionally, the repository requirements
working group has been disbanded. Notwithstanding this, EA Team
officials stated that they are looking at opportunities for improved
presentation of the EA.
According to DHS's comment tracking documentation, 101 comments were
not addressed in DHS EA 2006 but are to be resolved in a later version
of the EA.
The Chief Information Security Office stated that the security
architecture was not fully integrated, citing for example that the "as-
is" inventory lacked security classifications-sensitivity levels for
4,118 out of 4,260 systems listed. According to DHS documentation, work
is ongoing to address this comment and continued planning,
collaboration, and resources are required to further integrate the
security architecture into the EA.
ICE stated that the inputs it provided had not been incorporated,
represented, or otherwise accommodated in anyway, and that the draft
DHS EA 2006 business model was an unchanged repackaging of the prior
version of the EA. DHS documentation acknowledged that the scope of the
business model included only limited changes, and the ICE business
model and mapping would be incorporated in a later version of the
architecture.
CBP stated that the draft DHS EA 2006 lacked a framework or other
organizational structure. According to DHS documentation, a framework
is to be used for the next version of the architecture.
The United States Secret Service (USSS) stated that the draft
architecture described a "snap shot in time" and did not provide any
organized way of updating and maintaining data. The EA Team stated that
in developing the draft it had tried to minimize the number of "data
calls" to component organizations and that it would make further
efforts to initiate more component collaboration and input in the
future.
The EA support contractor stated that:
* The business model was not complete and should have been updated to
reflect missing data. According to DHS documentation, a business model
review was under way at the time to collect additional information
where possible and include it in EA 2007, but some business model
updates may be carried to the DHS EA 2008 version.
* The process flows, and use cases which are essential for driving out
information sharing and interoperability issues-were missing. According
to DHS documentation, work on this had started for business areas based
on Office of the Chief Information Officer (OCIO) priorities and where
artifacts and content were available.
* The transition strategy had weaknesses, such as a lack of vision for
incremental transformation. According to DHS documentation, work was
under way for creating a transition plan.
* Security and privacy considerations were notably weak. According to
DHS documentation, some related work is on-going but that further
efforts will be planned to address security and privacy information in
a future release of the EA as opportunity and information is available.
DHS's comment tracking documentation did not provide resolution actions
for the remaining 116 comments. Although some of these unresolved
comments did not require that action be taken, others were substantive.
For example,
CBP stated that the draft EA suffered the same incompleteness that we
identified with the first version of DHS's EA and that it did not
demonstrate an integrated understanding of the current DHS environment.
According to DHS documentation, no change was required to address this
comment because our recommendations were addressed in the second
version of DHS's EA. However, as previously discussed, our analysis of
the extent to which DHS EA 2006 addresses our prior recommendations
showed that they were only partially addressed, and that important
content remained to be added.
Science and Technology (S&T) stated that performance measures were not
comprehensive and not always measurable. According to DHS
documentation, no change was required because the source for the
performance measures was the department's fiscal year 2006 budget.
Stakeholder Commentary on Draft DHS EA 2006 Products Was Limited:
Soliciting and obtaining comments from all departmental stakeholders is
an important way to ensure that draft architectural products are well
defined. To their credit, the DHS Chief Architect and EA Team
recognized the importance of such commentary.
However, the approach they used in soliciting comments did not clearly
define the type of information requested and did not provide sufficient
time for detailed responses. Also, the extent to which they actually
obtained comments was limited. Of 33 EA stakeholders, only 12 submitted
comments. Without ensuring that meaningful comments from all key DHS
organizational components were obtained, the department has missed a
valuable opportunity to better ensure the completeness, internal
consistency, and understandability of DHS EA 2006.
Approach to Soliciting Stakeholder Comments Was Limited:
When soliciting comments from stakeholders, it is important that the
approach used, among other things, (1) clearly define the type of
information being solicited, including what key terms mean, and (2)
permit adequate time for stakeholders to provide comments. The approach
to soliciting comments on DHS EA 2006 did not do these things.
First, the type of information being solicited from stakeholders on a
draft of DHS EA 2006 was not clearly defined. For example,
Stakeholders were asked to use a scale of 1 to 5 to score the quality
of four characteristics of DHS EA 2006. However, only the extremes of
the scale were labeled, with 1 being designated as poor and 5 being
designated as excellent. Scores of 2, 3, and 4 were not labeled.
Moreover, the intended meaning of poor and excellent, much less a score
of 2, 3, or 4, were not defined. As a result, stakeholders had to
assign their own unique meanings to the scoring system.
The characteristics that stakeholders were asked to score the quality
of were completeness, consistency, understanding, and usability.
Associated with each of the four architecture characteristics were
between 2 to 4 questions. However, these questions did not clarify what
was meant by each characteristic. For example, stakeholders were asked
to score completeness based on the following questions without further
explanation or guidance.
* How complete do you feel EA 2006 is from a DHS perspective?
* How complete do you feel EA 2006 is from your component or
organization perspective?
* How complete do you feel EA 2006 is from an OMB or oversight
perspective?
Second, stakeholders had to review the draft and provide their comments
in only 2 weeks. According to the EA support contractor, this was not
sufficient time to respond. Similarly, CBP stated in its comments that
this was too short a period of time to permit a detailed review. Our
review of DHS EA 2006 confirmed this, as we found that considerably
more time was needed for us to examine the number of complex artifacts
in the architecture (e.g., 200 Access tables and 6 Excel workbooks
(each of with multiple worksheets).
Extent to Which Stakeholders Provided Comments Was Limited:
To the credit of the Chief Architect and the EA Team, they solicited
stakeholder comments on a draft of DHS EA 2006. The stakeholders
included 14 component organizations, 18 internal stakeholders, and 1
support contractor.
Of these 33 stakeholders, comments were received from only 12. Among
those major DHS organizations that did not comment were Transportation
Security Administration (TSA), the Coast Guard, and FEMA. This means
that DHS EA 2006 does not reflect the reactions and perspectives of
major organizational parts of the department. The tables on the next
slide identifies the 33 stakeholders as well as which ones provided
comments.
Table 4: Stakeholders That Did and Did Not Provide Comments:
Provided comments.
Components.
Customs and Border Protection (CBP).
Immigration and Customs Enforcement (ICE).
Science and Technology (S&T).
US-VISIT.
Intelligence Analysis and Operations (IAIP).
Federal Law Enforcement Training Center (FLETC).
Secret Service (USSS).
Internal stakeholders.
EA Program Management Office (PMO).
Chief Information Security Office (CISO).
Enterprise Data Management Office.
Wireless Management Office (WMO).
Contractor.
Contractor/Independent Review Team.
Did not provide comments:
Components.
OPS Coordination.
Citizenship and Immigration Services (USCIS).
Federal Emergency Management Agency (FEMA).
Office of Intelligence and Analysis (OI&A).
Preparedness Division (PD).
Transportation Security Administration (TSA).
Coast Guard (USCG).
Internal stakeholders.
Geospatial Management Office.
Infrastructure Transformation Office.
Continuity of Operations/ Critical Infrastructure Protection.
Homeland Secure Data Network.
Section 508 Compliance.
Enterprise Business Management Office (EBMO).
Enterprise Application Delivery Office (EADO).
Privacy Office.
Chief Medical Officer (CMO).
Chief Financial Office (CFO).
Chief Procurement Officer (CPO).
Chief Human Capital Officer (CHCO).
Screening Coordination Officer.
Grants and Training.
Source: GAO Analysis of DHS data.
[End of table]
DHS Capital Investment Plan Is Not Based on EA Transition Plan and Is
Not Complete:
According to OMB guidance, capital planning helps to ensure that
investments are timed and economically justified to fill identified
gaps in mission capabilities and to support strategic mission goals and
outcomes. Capital investment plans are intended to capture the results
of such planning. Our EA guidance states that a complete EA includes a
plan for investing in capital assets and transitioning from the "as-is"
architectural environment to the "to-be" environment. It further states
that this transition plan is to be based on an analysis of the mission
capability gaps that exists between these two environments, as well as
such factors as technology opportunities, marketplace trends, fiscal
and budgetary constraints, institutional system development and
acquisition capabilities, new and legacy system dependencies and life
expectancies, and the relative value of competing investments.
In January 2006, DHS produced Capital Investment Plan for Implementing
the DHS Enterprise Architecture, which was prepared to respond to the
DHS Appropriations Act of 2006. According to the plan, it focuses on
the near-term and represents the first phase of a transition plan for
getting from the "as-is" to the "to-be" EA. The plan refers to this
focus as building the foundation for effective transition, and states
that it includes the following four areas:
establishing the IT infrastructure (e.g., communications security,
network/e-mail/data center services, application portals) to support
eventual provision of enterprisewide shared services and efficient
information sharing;
planning and implementing more efficient provision enterprise business
services (e.g., financial services, human resource services);
consolidating duplicative legacy systems (e.g., watch lists); and:
supporting OMB eGov initiatives and lines of business.
For each of these areas, the capital investment plan incorporates
information from the department's fiscal year 2007 budget submissions
to OMB (Exhibit 53 and Exhibit 300s) to identify prior year, current
year (fiscal year 2006), and future year (fiscal year 2007 to 2011)
funding and personnel levels for a number of investments, including
descriptions of these investments. Examples of investments in each
category are as follows.
IT Infrastructure: Network services to move toward a consolidated,
reliable, and secure communications network.
Enterprise Business Services: Electronic records management to
integrate and replace multiple applications and manual processes.
Consolidating Legacy Systems: Watch list technical integration to,
among other things, streamline the flow of terrorist screening data to
and among DHS agencies and the National Counterterrorism Center.
OMB eGOV and Lines of Business: Geospatial information one-stop to
promote coordination and alignment of geospatial data collection and
maintenance among all levels of government.
Notwithstanding the wide range of investment-related information in
DHS's capital investment plan, it is not complete with respect to
providing a comprehensive roadmap for transitioning from the "as-is" to
the "to-be" DHS architecture. For example,
DHS EA 2006 did not include an EA transition plan, and thus the capital
investment plan is not based on this integral part of a complete EA-
namely the temporal roadmap transitioning to the "to-be" architecture
that is grounded in, among other things, analyses of gaps in mission
area capabilities and proposed investments to fill the gaps that are
sequenced over time in light of, for example, the investments' mutual
dependencies and return on investment, and the department's ability to
afford and manage them. Rather, the capital investment plan is the
compilation of a number of ongoing and planned investments as contained
in the department's budget submissions, logically organized by
investment categories or portfolios. According to the DHS Chief
Architect, the capital investment plan is in an "initial plan" and a
more complete version will exist once the DHS EA 2007 transition plan
is developed.
The capital investment plan does not account for all of DHS's planned
investment in IT. For example,
* For fiscal year 2007, it includes $527 million in IT development,
modernization, and enhancement funding, while DHS's budget submission
to OMB for IT totaled $1.845 billion. Thus, it excludes about $1.318
billion or about 71 percent of this planned IT funding.
* For fiscal year 2007, it includes $1.078 billion in IT operations and
maintenance funding, while DHS's budget submission to OMB for IT
totaled $2.260 billion. Thus, it excludes $1.182 billion or about 52
percent of this planned IT funding.
The capital investment plan does not include information on certain
major IT capital investments, such as Secure Flight, which is a system
to prescreen passengers (i.e., match passenger information against
terrorist watch lists) for domestic flights, or the Secure Border
Initiative (SBI), which is a multiyear program to secure U.S. borders
and reduce illegal immigration. According to the capital investment
plan, investments like SBI were not included in the plan because they
require an enormous amount of planning and did not have investment
dollars associated with them.
In March 2006, DHS announced that Emerge[Footnote], a departmentwide
program to consolidate financial management systems and which was
included within the capital investment plan, was being terminated.
Conclusions:
DHS's approach to developing its EA through incremental releases or
versions is reasonable, given the size and complexity of the department
and the volumes of information needed to produce a complete,
understandable, and usable architecture. As the department's third
version of its EA, DHS EA 2006 is an improvement over prior versions,
as evidenced by it at least partially addressing our prior
recommendations. Moreover, DHS EA 2006 is partially responsive to
stakeholder comments on a draft of it.
Nevertheless, DHS EA 2006 is still not sufficiently complete and
usable, given those aspects of our recommendations that it did not
fully address, the range of stakeholder comments that have not been
resolved, and the limitations of the capital investment plan. Given the
critical role that DHS's EA should play in the department's
transformation efforts, which we have identified as a high-risk
undertaking, it is important for DHS to fully address both our existing
recommendations and stakeholder comments on incremental versions of its
architecture.
Finally, with regard to stakeholder comments, it is also important for
the department to ensure that it devotes sufficient time and adopts an
effective approach to obtaining stakeholder comments on future
versions. If it does not, the chances of developing a well-defined EA
that is accepted and usable will be diminished.
Recommendations For Executive Action:
To ensure that DHS fully implements our prior EA recommendations and
effectively solicits and addresses stakeholder comments on incremental
versions of its EA, we recommend that the Secretary of Homeland
Security direct the department's CIO to:
(1) include in future versions of the department's EA a traceability
matrix that explicitly maps EA content to our recommendations in
sufficient detail to demonstrate their implementation, and:
(2) ensure that future efforts to solicit stakeholder comments on the
department's EA employ an effective approach that includes clearly
defining the type of information requested and allowing sufficient time
for obtaining and responding to these comments.
We are not making recommendations for addressing limitations in the
department's capital investment plan for implementing its EA because
our existing recommendations for an EA transition plan address such
limitations.
Agency Comments:
In written comments on a draft of this briefing, the DHS CIO
acknowledged that DHS EA 2006 is missing important content. He also
stated that the department is addressing our prior recommendations and
valid stakeholder comments, and that future versions of the
architecture will add recommended content and improve usability.
Further, the CIO stated that the department is currently using its EA
as a means to improve mission effectiveness and efficiency, and that
completeness is not required for an EA to be useful. We agree that
there is value in each incremental version of an evolving architecture
to help inform system investment decision making. However, the more
complete and understandable an EA is, the greater its utility. Our
prior recommendations are aimed at advancing the utility of DHS's EA.
While the CIO's written comments did not explicitly address the
recommendations in this briefing, the DHS Chief Architect said that the
department generally agrees with our recommendations for mapping our
prior recommendations to specific EA content and for effectively
soliciting stakeholder comments on future EA versions.
Attachment 1: DHS EA 2006 Structure:
[See PDF for image]
Source: GAO based on DHS EA 2006.
[End of figure]
Attachment 2: GAO EA Content Recommendations:
To ensure that DHS has a well-defined architecture to guide and
constrain pressing transformation and modernization decisions, we
recommended that the Secretary of Homeland Security direct the
department's architecture executive steering committee, in
collaboration with the CIO, to:
# Recommendation:
1 Ensure that the development of DHS's enterprise architecture is based
on an approach and methodology that provides for identifying the range
of mission operations and the focus of the business strategy and
involving relevant stakeholders (external and internal) in driving the
architecture's scope and content.
2 Develop, approve, and fund a plan for incorporating into the
architecture the content that is missing.
3 A business assessment that includes the enterprise's purpose, scope
(e.g., organizations, business areas, and internal and external
stakeholders' concern(s), limitations or assumptions, and methods.
A gap analysis that describes the target outcomes and shortfalls,
including strategic business issues, conclusions reached as a result of
the analysis (e.g., missing capabilities), casual information, and
rationales.
4 A business strategy that describes the desired future state of the
business, the specific objectives to be achieved, and the strategic
direction that will be followed by the enterprise to realize the
desired future state. The business strategy should include:
(1) A vision statement that describes the business areas requiring
strategic attention based on the gap analysis,
(2) A description of the business priorities and constraints, including
their relationships to, at a minimum, applicable laws and regulations,
executive orders, departmental policy, procedures, guidance, and audit
reports,
(3) A description of the scope of business change that is to occur to
address identified gaps and realize the future desired business state.
The scope of change, at a minimum, should identify expected changes to
strategic goals, customers, suppliers, services, locations, and
capabilities,
(4) A description of the measurable strategic business objectives to be
met to achieve the desired change,
(5) A description of the measurable tactical business goals to be met
to achieve the strategic objective, and:
(6) A listing of opportunities to unify and simplify systems or
processes across the department, including their relationships to
solutions that align with the strategic initiatives to be implemented
to achieve strategic objectives and tactical goals.
5 Common (standard and departmentwide) policies, procedures, and
business and operational rules for consistent implementation of the
architecture.
6 A description of key business processes and how they support the
department's mission, including the business processes and the
locations where the business process will be performed. This
description should provide the consistent alignment of (1) applicable
federal laws, regulations, and guidance; (2) department policies,
procedures, and guidance; (3) operational activities; (4)
organizational roles; and (5) operational events and information.
7 A description of the operational management processes to ensure that
the department's business transformation effort remains compliant with
the business rules for fault, performance, security, configuration, and
account management.
8 A description of the organizational approach (processes and
organizational structure) for communications and interactions among
business lines and program areas for (1) management reporting, (2)
operational functions, and (3) architecture development and use (i.e.,
how to develop the architecture, and govern/manage the development and
implementation of the architecture).
We recommended the following actions to ensure that future versions of
the architecture included the three key elements governing the
performance view of the "to-be" architectural content that our previous
report identified as not being fully developed:
# Recommendation:
9 A description of the processes for establishing, measuring, tracking,
evaluating, and predicting business performance regarding business
functions, baseline data, and service levels.
10 A description of measurable business goals and outcomes for business
products and services, including strategic and tactical objectives.
11 A description of measurable technical goals and outcomes for
managing technology products and services for the "to-be" architecture
that enables the achievement of business goals and outcomes.
We recommended the following actions to ensure that future versions of
the architecture included the seven key elements governing the
information view of the "to-be" architectural content that our previous
report identified as not being fully developed:
# Recommendation:
12 A description of data management policies procedures, processes, and
tools (e.g., CURE matrix) for analyzing, designing, building, and
maintaining databases in an enterprise architected environment.
13 A description of the business and operational rules for data
standardization to ensure data consistency, integrity, and accuracy,
such as business and security rules that govern access to, maintenance
of, and use of data.
14 A data dictionary, which is a repository of standard data
definitions for applications.
15 A conceptual data model that describes the fundamental things/
objects (e.g., business or tourist visas, shipping manifests) that make
up the business, without regard to how they will be physically stored.
A conceptual data model contains the content needed to derive facts
about the business and to facilitate the creation of business rules. It
represents the consolidated structure of business objects to be used by
business applications.
16 A logical database model that provides (1) a normalized (i.e.,
nonredundant) data structure that supports information flows and (2)
the basis for developing the schemas for designing, building, and
maintaining physical databases.
17 A metadata model that specifies the rules and standards for
representing data (e.g., data formats) and accessing information (e.g.,
data protocols) according to a documented business context that is
complete, consistent, and practical.
18 A description of the information flows and relationships among
organizational units, business operations, and system elements.
We recommended the following actions to ensure that future versions of
the architecture included the five key elements governing the services/
applications view of the "to-be" architectural content that our
previous report identified as not being fully developed:
# Recommendation:
19 A description of the services and their relationships to key end-
user services to be provided by the application systems.
20 A list of application systems (acquisition/development and
production portfolio) and their relative importance to achieving the
department's vision, based on business value and technical performance.
21 A description of the policies, procedures, process, and tools for
selecting, controlling, and evaluating application systems to enable
effective IT investment management.
22 A description of the enterprise application systems and system
components and their interfaces.
23 A description of the system development life-cycle process for
application development or acquisition and the integration of the
process with architecture, including policies, procedures, and
architectural techniques and methods for acquiring systems throughout
their life cycles. The common technical approach should also describe
the process for integrating legacy systems with the systems to be
developed/acquired.
We recommended the following actions to ensure that future versions of
the architecture included the six key elements governing the technical
view of the "to-be" architectural content that our previous report
identified as not being fully developed:
# Recommendation:
24 A list of infrastructure systems and a description of the systems'
hardware and software infrastructure components. The description should
also reflect the systems relative importance to achieving the
department's vision based on constraints, business value, and technical
performance.
25 A description of the policies, procedures, processes, and tools for
selecting, controlling, and evaluating infrastructure systems to enable
effective IT investment management.
26 A description of the technical reference model (TRIVI) that
describes the enterprise infrastructure services, including specific
details regarding the functionality and capabilities that these
services will provide to enable the development of application systems.
27 A description of the TRIVI that identifies and describes (1) the
technical standards to be implemented for each enterprise service and
(2) the anticipated life cycle of each standard.
28 A description of the physical IT infrastructure needed to design and
acquire systems, including the relationships among hardware, software,
and communications devices.
29 Common policies and procedures for developing infrastructure systems
throughout their life cycles, including requirements management,
design, implementation, testing, deployment, operations, and
maintenance. These policies and procedures should also address how the
applications will be integrated, including legacy systems.
We recommended the following actions to ensure that future versions of
the architecture included the seven key elements governing the security
view of the "to-be" architectural content that our previous report
identified as not being fully developed:
# Recommendation:
30 A description of the policies, procedures, goals, strategies,
principles, and requirements relevant to information assurance and
security and how they (the policies, procedures, goals, strategies, and
requirements) align and integrate with other elements of the
architecture (e.g., security services).
31 Definitions of terms related to security and information assurance.
32 A listing of accountable organizations and their respective
responsibilities for implementing enterprise security services. It is
important to show organizational relationships in an operational view
because they illustrate fundamental roles (e.g., who conducts
operational activities) and management relationships (e.g., what is the
command structure or relationship to other key players) and how these
influence the operational nodes.
33 A description of operational security rules that are derived from
security policies.
34 A description of enterprise security infrastructure services (e.g.,
identification and authentication) that will be needed to protect the
department's assets and the relationship of these services to
protective mechanisms.
35 A description of the security standards to be implemented for each
enterprise service. These standards should be derived form security
requirements. This description should also address how the services
will align and integrate with other elements of the architecture (e.g.,
security policies and requirements).
36 A description of the protection mechanisms (e.g., firewalls and
intrusion detection software) that will be implemented to secure the
department's assets, including a description of the interrelationships
among these protection mechanisms.
We recommended the following actions to ensure that future versions of
the architecture included the five key elements governing the
transition plan content that our previous report identified as not
being fully developed:
# Recommendation:
37 Analysis of the gaps between the baseline and the target
architecture for business processes, information/data, and
services/application systems to define missing and needed capabilities.
38 A high-level strategy for implementing the enterprise architecture.
This strategy should include:
(1) Specific time-phased milestones for acquiring and deploying
systems;
(2) Performance metrics for determining whether business value is being
achieved;
(3) Financial and nonfinancial resources needed to achieve the business
transformation;
(4) A listing of the legacy systems that will not be part of the "to-
be" environment and the schedule for terminating these systems;
(5) A description of the training strategy/approach that will be
implemented to address the changes made to the business operations
(processes and systems) to promote operational efficiency and
effectiveness. This plan should also address any changes to existing
policies and procedures that affect day-to-day operations, as well as
resource needs (staffing and funding); and,
(6) A list of the systems to be developed, acquired, or modified to
achieve business needs and a description of the relationship between
the system and the business need(s).
39 A strategy for employing enterprise application integration (EAI)
plans, methods, and tools to, for example, provide for efficiently
reusing applications that already exist, concurrent with adding new
applications and databases.
40 A technical (systems, infrastructure, and data) migration plan that
shows:
(1) The transition from legacy to replacement systems, including
explicit sunset dates and intermediate systems that may be temporarily
needed to sustain existing functionality during the transition period;
(2) An analysis of system interdependencies, including the level of
effort required to implement related systems in a sequenced portfolio
of projects that includes milestones, time lines, costs, and
capabilities;
(3) A cost estimate for the initial phase(s) of the transition and a
high-level cost projection for the transition to the target
architecture.
41 A strategy that describes the architecture's governance and control
structure and the integrated procedures, processes, and criteria (e.g.,
inventory management and security) to be followed to ensure that the
department's business transformation effort remains compliant with the
architecture.
Source: GAO.
[End of table]
[End of section]
Appendix II: Comments from the Department of Homeland Security:
U.S. Department of Homeland Security:
Washington, DC 20528:
April 11, 2007:
Mr. Randolph C. Hite:
Director, Information Technology Architecture and Systems Issues:
U.S. Government Accountability Office:
441 G Street, NW:
Washington, DC 20548:
Dear Mr. Hite:
RE: Draft Report GAO-07-564, Homeland Security: DHS Enterprise
Architecture Continues to Evolve but Improvements Needed (GAO Job Code
310641):
The Department of Homeland Security (DHS) appreciates the opportunity
to review and comment on the draft report referenced above that
addresses enterprise architecture and its role in facilitating
organizational transformation. We are pleased that the Government
Accountability Office (GAO) recognizes the progress made in the
development of the DHS Enterprise Architecture (EA) since the
Department was formed four years ago. We continue to make progress in
EA development and the recent release of the Homeland Security
Enterprise Architecture (HLS EA 2007) addresses many of the remaining
issues GAO highlights.
The report recommends that the Department's Chief Information Officer
(CIO) include a traceability matrix in future versions of the
Department's Enterprise Architecture that explicitly maps EA content to
GAO's recommendations in sufficient detail to demonstrate their
implementation. We agree with this recommendation. Efforts are
currently underway to develop a traceability matrix so that DHS can
better track progress and explicitly map EA content to the
recommendations.
GAO also recommends that the CIO ensure that future efforts to solicit
stakeholder comments on the Department's EA employ an effective
approach that includes clearly defining the type of information
requested, and allowing sufficient time for obtaining and responding to
these comments. We believe that the current process adequately allows
for stakeholder input into the DHS EA. The DHS EA Program Management
Office works closely with all stakeholders, including component
agencies and major programs throughout the year. Stakeholders have
unlimited opportunity to comment on and provide input to the EA.
Stakeholders have visible insight into the contents of and changes to
the EA through weekly EA review meetings of the EA Center of Excellence
and the EA Board. The evolution of the EA is, in fact, guided largely
by input from stakeholders. The annual review of the EA by stakeholders
is merely a review of the final packaged deliverable content that is
intended for review by OMB, which should already be familiar to
stakeholders. Moreover, the fact that the GAO audit team counted nearly
400 comments from stakeholders suggests that there was ample
opportunity for stakeholders to comment during this period.
We would like to correct the perception of the audit team on how the
Department has treated stakeholder comments. Stakeholder input is
crucial to the development of the DHS EA. In fact, the EA cannot exist
as a useful tool for the Department without stakeholder participation.
Many of the unresolved comments touch on areas that will be the focus
of future releases of the DHS EA. Furthermore, although the draft
report states that 116 comments from stakeholders had no resolution,
many of these comments were merely observations about the EA not
requiring a resolution.
Thank you again for the opportunity to comment on the draft report. DHS
is committed to continuous progress and improvements to Enterprise
Architecture to help support our very important mission of securing the
homeland. As the Department continues to evolve, the EA will evolve and
continue to show progress and improvements with each release.
Sincerely,
Signed by:
Steven J. Pecinovsky:
Director:
Departmental GAO/OIG Liaison Office:
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
Randolph C. Hite, (202) 512-3439, hiter@gao.gov:
Staff Acknowledgments:
In addition to the person named above, Mark Bird, Assistant Director;
Neil Doherty; Ashfaq Huda; Nancy Glover; Anh Le; Teresa Smith; Amos
Tevelow; William Wadsworth; and Kim Zelonis made key contributions to
this report.
FOOTNOTES
[1] GAO, High-Risk Series: An Update, GAO-03-119 (Washington, D.C.:
January 2003); High-Risk Series: An Update, GAO-05-207 (Washington,
D.C.: January 2005).
[2] GAO, Homeland Security: Efforts to Improve Information Sharing Need
to Be Strengthened, GAO-03-760 (Washington, D.C.: Aug. 27, 2003) and
Department of Homeland Security: Formidable Information and Technology
Management Challenge Requires Institutional Approach, GAO-04-702
(Washington, D.C.: Aug. 27, 2004).
[3] GAO, Homeland Security: Efforts Under Way to Develop Enterprise
Architecture, but Much Work Remains, GAO-04-777 (Washington, D.C.: Aug.
6, 2004).
[4] The act also required DHS's CIO report to include a description of
the IT capital planning and investment control (CPIC) process and an IT
human capital plan.
[5] An EA describes how an entity currently operates (the "as-is"
architecture) and how it plans to operate in the future (the "to-be"
architecture); it also includes a plan for making that transition (the
transition plan).
[6] GAO-03-119 and GAO-05-207.
[7] GAO-03-760 and GAO-04-702.
[8] GAO-04-777.
[9] The act also requires DHS's CIO to submit a report that includes a
description of the information technology (IT) capital planning and
investment control (CPIC) process and an IT human capital plan, which
will also be reviewed by GAO.
[10] These specialties include intelligence analysis, law enforcement,
border security, transportation security, biological research, critical
infrastructure protection, and disaster recovery.
[11] For example, see GAO, Major Management Challenges and Program
Risks: Department of Homeland Security, GAO-03-102 (Washington, D.C.:
January 2003) and Homeland Security: Proposal for Cabinet Agency Has
Merit, but Implementation Will be Pivotal to Success, GAO-02-886T
(Washington, D.C.: June 25, 2002).
[12] See GAO, DOD Business Systems Modernization: Improvements to
Enterprise Architecture Development and Implementation Efforts Needed,
GAO-03- 458, (Washington, D.C.: Feb. 28, 2003); Information Technology.
DLA Should Strengthen Business Systems Modernization Architecture and
Investment Activities, GAO-01-631 (Washington, D.C.: June 29, 2001);
and Information Technology. INS Needs to Better Manage the Development
of Its Enterprise Architecture, AIMD-00-212 (Washington, D.C.: Aug. 1,
2000).
[13] GAO, Information Technology. A Framework for Assessing and
Improving Enterprise Architecture Management (Version 1.1), GAO-03-584G
(Washington, D.C.: April 2003).
[14] GAO-04-777.
[15] GAO, Information Technology: Leadership Remains Key to Agencies
Making Progress on Enterprise Architecture Efforts, GAO-04-40
(Washington, D.C.: Nov. 17, 2003).
[16] GAO, Enterprise Architecture: Leadership Remains Key to
Establishing and Leveraging Architectures for Organizational
Transformation, GAO- 06-831 (Washington, D.C.: Aug. 14, 2006).
[17] GAO, Information Technology: A Framework for Assessing and
Improving Enterprise Architecture Management (Version 1.1), GAO-03-584G
(Washington, D.C.: April 2003).
[18] GAO-04-777.
[19] US-VISIT is a governmentwide program to collect, maintain, and
share information on foreign nationals for enhancing national security
and facilitating legitimate trade and travel, while adhering to U.S.
privacy laws and policies.
[20] ACE is a new import and export processing system to facilitate the
movement of legitimate trade through more effective trade account
management and strengthen border security by identifying import and
export transactions that could pose a threat to the United States.
[21] Atlas is a program to modernize ICE's IT infrastructure to improve
information sharing, strengthen information security, and improve
productivity. GAO, Homeland Security. Risks Facing Key Border and
Transportation Security Program Need to Be Addressed, GAO-03-1083
(Washington, D.C.: Sept. 19, 2003).
[22] GAO, homeland Security: Risks Facing Key Border and Transportation
Security Program Need to Be Addresses, GAO-03-1083 (Washington, D.C.:
Sept. 19, 2003).
[23] GAO, Homeland Security. Some Progress Made, but Many Challenges
Remain on U.S. Visitor and Immigrant Status Indicator Technology
Program, GAO- 05-202 (Washington, D.C.: Feb. 23, 2005).
[24] GAO, Information Technology. Customs Automated Commercial
Environment Program Progressing, but Need for Management Improvements
Continues, GAO-05-267 (Washington, D.C.: Mar. 14, 2005).
[25] GAO, Information Technology. Customs Has Made Progress on
Automated Commercial Environment System, but It Faces Long-Standing
Management Challenges and New Risks, GAO-06-580 (Washington, D.C.: May
31, 2006).
[26] GAO, Information Technology. Management Improvements Needed on
Immigration and Customs Enforcement's Infrastructure Modernization
Program, GAO-05-805 (Washington, D.C.: Sept. 7, 2005).
[27] GAO, Information Technology. Immigration and Customs Enforcement
Is Beginning to Address Infrastructure Modernization Program Weaknesses
but Key Improvements Still Needed, GAO-06-823 (Washington, D.C.: July
27, 2006).
[28] Partially satisfied means that DHS addressed at least one but not
all elements of the recommendation.
[29] Describes technology that is to support the delivery of service
components, including relevant standards for implementing the
technology.
[30] The TRIVI identifies and describes the IT services (e.g., a data
interchange service) used throughout the agency. The standards profile
defines the set of IT standards that support the services. The profile
may also specify the technology products that implement a specific IT
standard.
[31] The hold category identifies the IT standards (or technology
products) that are currently in use.
[32] The contain category identifies the IT standards (or technology
products) that are currently in use but cannot be further deployed.
[33] 28 The divest category identifies the IT standards (or technology
products) that are to be retired.
[34] The move-to category identifies the IT standards (or technology
products) that are to be in the target state.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts
newly released reports, testimony, and correspondence on its Web site.
To have GAO e-mail you a list of newly posted products every afternoon,
go to www.gao.gov and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office 441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202)
512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S.
Government Accountability Office, 441 G Street NW, Room 7125
Washington, D.C. 20548:
Public Affairs:
Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800
U.S. Government Accountability Office, 441 G Street NW, Room 7149
Washington, D.C. 20548: