U.S. Environmental Protection Agency ATTACHMENTS TO THE SYSTEM LIFE CYCLE MANAGEMENT (SLCM) PROCEDURE (GUIDANCE) Document Number XXX.X January 10, 2007 OFFICE OF ENVIRONMENTAL! INFORMATION ------- Table of Contents SLCM Phase Descriptions: Attachment 1: Definition Phase 2 A. Concept Exploration Subphase 2 B. System Planning Subphase 7 C. Requirements Subphase and Control Gate # 1 - EA Compliance Certification Review and System Selection 14 Attachment 2: Acquisition/Development Phase 18 A. Acquisition Subphase 18 B. Design Subphase and Control Gate # 2 - EA Compliance Certification Review 22 C. Development Subphase 30 D. Test Subphase and Control Gate # 3 - Authorization to Operate 34 Attachment 3: Implementation Phase 38 Attachment 4: Operations & Maintenance Phase and Control Gate # 4 - Modify or Terminate 42 Attachment 5: Termination Phase 50 Guidance on Control Gate Reviews: Gate 1 - EA Compliance Certification and System Selection Review 54 Gate 2 - EA Compliance Certification Review 54 Gate 3 - Authorization to Operate Review 55 Gate 4 -Modify or Terminate Review 55 SLCM Tools: Supporting Document Checklist for System Life Cycle Management 57 System Life Cycle Management Guidance - DRAFT - Not for Distribution Page i Updated: 1/10/07 ------- Concept Exploration Attachment 1: Definition Phase A. Concept Exploration Subphase Process The Concept Exploration Subphase begins when management determines Description: the need to enhance a business process through the application of information technology. The purposes of the Concept Exploration Subphase are to: • Identify and validate an opportunity to improve business accomplishments of the organization or a deficiency related to a business need • Identify significant assumptions and constraints on solutions relative to that need • Recommend the exploration of alternative concepts and methods to satisfy the need During this initial phase the System Sponsor designates a System Manager who prepares a Concept Proposal. Projects may be initiated as a result of business process improvement activities, changes in business functions, advances in information technology, or may arise from external sources, such as public law or the general public. When an opportunity to improve business/mission accomplishments or to address a deficiency is identified, the System Manager documents these opportunities in the Concept Proposal. Procedure The following activities are performed as part of the Concept Exploration Description: Subphase: • Identify and establish the business justification for the proposed system • Establish the project sponsorship/ownership • Consider the project team needs • Document the exploration activities • Review and approve to proceed to the next phase • Initiate security planning activities System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 2 ------- Concept Exploration Every project must have a responsible organization and sufficient resources to execute the project. The Concept Proposal should identify why a business process is necessary and what business benefits can be expected by implementing this improvement. It is important to state the needs or opportunities in business terms. Avoid identifying a specific product or vendor as the solution. The Concept Proposal should be approximately 2-5 pages in length. The background information provided should be at a level of detail sufficient to familiarize senior managers with the history, issues and customer service opportunities that can be realized through improvements to business processes with the potential support of IT. This background information must not offer or predetermine any specific automated solution, tool, or product. The System Sponsor is the principal authority on matters regarding the expression of business needs, the interpretation of functional requirements language, and the mediation of issues regarding the priority, scope and domain of business requirement. The System Sponsor must understand what constitutes a requirement and must take ownership of the requirements and input and output. This activity involves the appointment of a System Manager who carries both the responsibility and accountability for project execution. For small efforts, this may only involve assigning a project to a manager within an existing organization that already has an inherent support structure. For new, major projects, a completely new organizational element may be formed - requiring the hiring and reassignment of technical and business specialists. To provide a management structure for the project, the System Manager should adapt, adopt, or create written processes and procedures for recurring project activities. These include requirements management, project tracking, contractor management, verification and validation, quality assurance, change management, and risk management. The results of the efforts of this phase are documented in the Concept Proposal and the Mission Need Statement. The approval of the Concept Proposal identifies the end of the Concept Exploration subphase. Approval should be annotated on the Concept Proposal by the System Sponsor and/or the Chief Information Officer (CIO). Once approval to proceed has been given within EPA, a core project team with participation of the System Manager must be established in order to move on to the System Planning Subphase. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 3 ------- Concept Exploration Responsibilities: System Sponsor: The System Sponsor is the senior spokesperson for the project, and is responsible for ensuring that the needs and accomplishments within the business area are widely known and understood. The System Sponsor is also responsible for ensuring that adequate financial and business process resources to address the business area needs are made available in a timely manner. System Manager: The appointed System Manager is charged with leading the efforts to ensure that all business aspects of the process improvement effort are identified in the Concept Proposal. This includes establishing detailed project plans and schedules. Information Security Officer (ISO): The ISO is responsible for coordinating the Change Impact Assessments. Project Level Reviews: The Initiation Phase Review is performed at the end of this phase which ensures that the Concept Proposal is approved before proceeding to the next phase. The review ensures that the Concept Proposal is sound, does not conflict with the Enterprise Architecture and is a good investment. This is the first key decision required in the SDLC and IT Investment Management process. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Acquisition Strategy Documents the framework for planning, organizing, staffing, controlling, and leading a program. It provides a master schedule for research, development, test, production, and other activities essential for program success, and for formulating functional strategies and plans. Status D System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 4 ------- Concept Exploration Work Product Approvals (Decision Papers) (SMP) Document decisions presented to management. Summarize those aspects of the analysis and decisions of a given phase or subphase that are important to program management and requests approval to continue the project. The EPA life cycle model provides for decision papers to be prepared at the beginning of the Definition, Development or Acquisition, Implementation, and Retirement Phases and at the end of the Requirements Subphase. The level of detail for decision papers should be appropriate to the category of the system. Business Case The compelling business rationale and justification for developing or modernizing a system. It describes current business processes, possibly using activity and data models. Current costs and performance are also associated with the models. Gaps between current and desired outcomes are identified and analyzed. Alternatives for improving the business are developed and evaluated based on readily available information. This is a document that is a component of SMP. Change Directive Documents the formal Change Control Document to implement an approved change. Change Tracking Log Log that records the status of all changes proposed to the SMP, including a description of the proposed change, the status history, and final disposition. Concept of Operations Describes Business process and how system is used in support of the process. Concept Proposal Describes the need or opportunity to improve business functions. It identifies where strategic goals are not being met or mission performance needs to be improved. Cost-Benefit Analysis Documents costs and proposed benefits of alternatives. Information Categorization Types of information that will be collected and processed should be identified and categorized in accordance with FIPS 199 and NIST SP 800-60, to the extent known, including Privacy Act type information. Further refinement will be needed throughout the life cycle. IT Project Request Serves as the formal budget request for the project. Most of the information required for the IT Project Request is obtained from the Business Case and the Project Risk Management Plan. Mission Need Statement Documents the results of a mission analysis, serves as the decision document for the mission need decision, and after final approval, serves as the basis for investment analysis. It provides a clear, unambiguous, and quantitative description of the mission area, current capability, capability shortfall or technology opportunity, required operational capability, impact of disapproval, benefits, time frame, critically, and resource estimate. This product is a component of the SMP. Privacy Impact Assessment Based on the initial FIP 199 categorization and the identification of the need or potential to collect Privacy Act data/information, the assessment required by the Status B D ^ ^ B B D D B B B System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 5 ------- Concept Exploration Work Product Status Privacy Act and/or E-Government Act of 2002 to conduct assessments on investments before developing or procuring information technology that collects, maintains, or disseminates information that is in an identifiable form. Project Plan Documents the schedule and time frame for system development activities to occur based on the estimates developed in the previous phases, as well as task dependencies, organization priorities, and resource availability. D Project Risk Management Plan (SMP) Identifies and categorizes risks to the successful completion of the project. Lists each identified risk, describing its probability of occurrence, potential consequences, and degree to which it can be controlled. Strategies for eliminating or mitigating each risk are documented. D Security Concept Documents a preliminary analysis of security considerations for the new system. It provides the first look at the information that might be included in the Security Plan. Areas considered include risks from theft, disclosure, unauthorized access, eavesdropping, programmed attacks, incorrect routing, misplacement, erasure, and accidental damage. Includes an initial analysis of FIPS 199/NIST 800-60 categories and impact levels of the data and resulting information system. Based on this information, an initial baseline of security controls will be identified from FIPS 201 and NIST SP 800-53. D Security Risk Assessment Begins assembling and analyzing threat, and vulnerability information drafting an initial qualitative determination of risk to a collection of sensitive data and the people, information systems, and installations involved in transmitting, accessing and processing that data. Its purpose is to inform the selection or modification of required controls from FIPS 201 and NIST SP 800-53 based on the information's FIPS 199 impact levels to provide cost-effective and adequate security. D Solution Architecture Describes how an individual information management system, or information acquisition, will comply with the requirements of the Target Architecture, which is the set of products that portrays the future state of the Agency. A Solution Architecture is a comprehensive architectural response to a business problem. Solutions address all layers of Enterprise Architecture - strategy, business, data, applications and technology/security. B System Concept Document Describes the results of all significant functional analyses conducted during this subphase, including definition of high level requirements, assessment of pertinent existing information processing capabilities, complete formulation of alternative system functional concepts, assessment of the alternatives, and rationale for the selection of the recommended concept. The data portion describes high-level data requirements for the recommended system concept, provides definitions of these requirements, charts the logical structure of the data requirements, and describes sources, uses, and distribution of data. It defines the system concept, and includes, if applicable, a feasibility study, alternatives analysis, and acquisition strategy. B System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 6 ------- System Planning Attachment 1: Definition Phase B. System Planning Subphase Process Description: The System Planning Subphase begins when the Concept Proposal has been formally approved and funded. This phase requires study and analysis that may lead to system development activities. Following review and approval of the Concept Proposal, some form of EPA approval (tasking directive) should be issued to begin the formal studies and analyses of the need. The issuing of the tasking directive initiates the System Planning Subphase and begins the life cycle of an identifiable project. This subphase is also the start of the System Management Plan. Procedure Description: The following activities are performed as part of the System Planning Subphase. The results of these activities are captured in the System Management Plan, the Business Case and the Project Risk Management Plan and their underlying institutional processes and procedures. The System Management Plan (SMP) is the primary managerial documentation in the life cycle of an information system. The various components of this document can be tailored to the project's classification and may include: Change Tracking Log Mission Need Statement Business Case System Operations and Maintenance Concept Responsibilities Cost-Benefit Analysis Summary Schedule Project Risk Management Plan Security Plan and Security Categorization Quality Assurance Plan Configuration Management Plan Review Sections o Data Standards o Enterprise Architecture (EA) Alignment o Capital Planning and Investment Control (CPIC) Approvals (Decision Papers) System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 7 ------- System Planning • Waivers • Work Breakdown Structure • Application Deployment Checklist The project team, supplemented by enterprise architecture experts if needed, determines the acquisition strategy by analyzing all feasible technical, business process, and commercial alternatives to meeting the business need. These alternatives are analyzed from a life cycle cost perspective. The results of these studies show a range of feasible alternatives based on life cycle cost, technical capability, operational feasibility and scheduled availability. Typically, these studies narrow the system technical approaches to only a few potential, desirable solutions that then proceed into the subsequent life cycle phases. Caution is needed to ensure new and/or creative design concepts are not eliminated from consideration. The project team plans the subsequent phases to allow development of the project schedule and budget requirements, and to define the expected performance benefits. The Business Case summarizes the high level requirements for the project and justifies the need. The project team identifies all alternatives that may address the need and any programmatic or technical risks. The risks associated with further development are also studied. The results of these assessments are summarized in the Business Case and documented in the Project Risk Management Plan. The results of the phase efforts are presented to project stakeholders and decision makers together with a recommendation to do one of the following: • Proceed into the next life cycle phase • Continue additional conceptual phase activities • Terminate the project The emphasis of the review is on: • The successful accomplishment of the phase objectives • The plans for the next life cycle phase • The risks associated with moving into the next life cycle phase The review also addresses the availability of resources to execute the subsequent life cycle phases. The results of the review are documented reflecting the decision on the recommended action. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 8 ------- System Planning Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the System Planning Subphase. The System Manager is responsible for leading the team that accomplishes the tasks shown above, and is ultimately responsible for the quality of the finished product. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Procurement Officer: The Procurement Officer is responsible and accountable for preparing solicitation documents under the guidance of the System Manager. System Sponsor: The System Sponsor is responsible for authorizing and ensuring that the funding and resources are in place to support the system. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. System Owner: The System Owner is designated at an appropriate level within the EPA as the project decision authority (may or may not be the same individual designated as the sponsor in the previous phase). This individual is charged with assessing the: • Completeness of the planning phase activities • Robustness of the plans for the next life cycle phase • Availability of resources to execute the next phase • Acceptability of the acquisition risk of entering the next phase For applicable projects, this assessment also includes the readiness to award any major contracting efforts needed to execute the next phase. During the end of phase review process, the decision maker does one of the following: • Directs the project to move forward into the next life cycle phase (including awarding contracts) • Directs the project to remain in the planning phase pending completion of delayed activities or additional risk reduction System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 9 ------- System Planning efforts Terminates the project Project Level Reviews: A review is performed at the end of the System Planning Subphase. The review ensures that the goals and objectives of the system are identified and that the feasibility of the system is established. Products of the System Planning Subphase are reviewed including the budget, risk, and user requirements. This review is organized, planned, and led by the System Manager and/or representative. Approval of the Business Case by the SIO grants approval to proceed to the Requirements Phase of the SLC. It is important in this effort not to eliminate new and creative approaches. Emphasis should be on the total cost of ownership and not just a single system concept. Support and training issues may become very important from this perspective. After the Business Case is approved and a recommendation is accepted by the SIO and System Sponsor, the system project planning can begin. As identified in the Definition Phase., each project has an individual designated to lead the effort. The individual selected has appropriate skills, experience, credibility, and availability to lead the project. Clearly defined authority and responsibility must be provided to the System Manager. The System Manager works with the SIO and System Sponsor to verify the scope of the proposed program, participation of the key organizations, and potential individuals who can participate in the formal reviews of the project. This decision addresses both programmatic and information management-oriented participation as well as technical interests in the project that are known at this time. In view of the nature and scope of the proposed program, the key individuals and oversight stakeholders who are the approval authorities for the project should be identified, including the sign-off for quality assurance. The System Manager and System Sponsor determine if any particularly unusual programmatic, technical, or information management skills or experience are needed. Organizations not participating directly in the project may be notified, if appropriate, including external organizations. Whenever the concept is shared among multiple organizations, data administration plays a strong role. Management approval to commit resources to the proposed program System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 10 ------- System Planning marks the beginning of the subsequent system development life cycle phases. The feasibility analysis and cost benefit analysis confirm that the defined information management concept is significant enough to warrant an IT project with life cycle management activities. The feasibility study analysis confirm that the information management need or opportunity is beyond the capabilities of existing systems and that developing a new system is a promising approach. The Cost-Benefits Analysis confirms that the projected benefits of the proposed approach justify the projected resources required. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Acquisition Strategy Application Deployment Checklist - (SMP) The expected or projected platform(s) and locations on which an application will reside, requires knowledge of the requirements for deployment on that platform. Application deployment checklists should be obtained and requirements identified and factored into the system planning as soon as possible. Approvals (Decision Papers) - (SMP) Business Case - (SMP) Change Directive Change Tracking Log - (SMP) Configuration Management Plan - (SMP) Describes the overall plan for identifying and controlling the parts of the system to ensure its proper functioning according to its requirements. Contract Security Requirements Requirements for contractor background checks, and controls to protect any data used in development, non-disclosures, and separation of duties or "need-to- know" controls need to be spelled out for inclusion in any contracts in the next phase. Cost Benefit Analysis - (SMP) Data Standards - (SMP) Technical specifications for the defining, naming, and using of data within the Status B D B B ^ ^ B B B D System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 11 ------- System Planning Work Product Status system. Feasibility Study Analyzes whether the information management need or opportunity is beyond the capabilities of existing systems and that developing a new system is a promising approach. B Mission Need Statement - (SMP) U Project Plan B Project Quality Assurance Plan - (SMP) Describes the planned and systematic pattern of all actions necessary to provide adequate confidence that the system optimally fulfils the organization's expectations. B Project Risk Management Plan - (SMP) B Records Management Disposition Schedule Documents length of time that all SLCM records are retained and when inactive material is moved to storage. D Responsibilities - (SMP) Describes roles and responsibilities of the key participants in the system life cycle development process. It identifies, by name, the System Sponsor, System Owner, System Manager, and other points-of-contact. It lists the organization(s) supporting the system and delineates organizational responsibilities. B Schedule - (SMP) Documents the time frame for system development activities to occur based on the estimates developed in the previous phases, as well as task dependencies, organization priorities, and resource availability. Adjustments are made throughout the life cycle based on enterprise goals, objectives, and priorities. Schedule adjustments also take into account task dependencies and resource availability. B Security Plan - (SMP) Begins the development of the security plan which describes the plan to meet security and privacy protection requirements. It addresses what is known to date about the impact levels, conceptual information system architecture, risks, required controls, contingency or continuity of support needs, laws and penalties that may apply to breach of confidentiality, etc." D Security Categorization B Solution Architecture U System Operations and Maintenance Concept - (SMP) Describes the general manner in which the system will be managed to include the level of operational support required. Identifies whether the system will be distributed to the Regions or operated from a central location. Describes how the system will be extended to a user's desktop, i.e., whether it requires a support person to install a client component or the system is Web-based with no client footprint required. Identifies the number and locations of required servers. Estimates the number of operational support personnel and provides an estimate of the number of hours per user required to support the system annually. Identifies the number of users expected by organization and location. Waivers (SMP) Written justification for deviating from the system life cycle process or for D B System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 12 ------- System Planning Work Product omitting sections of documents from the SMP. Waiver may be considered based on the requirements of the system and needs of the developing office. Any waivers for major applications and general support systems and systems considered to be major investments in the CPIC process must receive concurrence from the System Owner and applicable IMO and be approved y the Director of the Office of Environmental Information's Office of Technology Operations and Planning. Waivers for any other applications and / or systems must receive concurrence from the System Owner and be approved by the applicable IMO. Waivers must be documented as part of the SMP. . Work Breakdown Structure (SMP) Status B System Life Cycle Management Guidance - DPvAFT - Not for Distribution Updated: 1/10/07 Page 13 ------- Requirements Attachment 1: Definition Phase C. Requirements Subphase and Control Gate # 1 - EA Compliance Certification Review and System Selection Process Description: The Requirements Subphase begins when the previous phase documentation has been approved or by management direction. Documentation related to user requirements from the System Planning Subphase is used as the basis for further user needs analysis and the development of detailed user requirements. The analysis may reveal new insights into the overall information systems requirements. In such instances, all work products are revised to reflect this analysis. During the Requirements Subphase., the system is defined in more detail with regard to system inputs, processes, outputs, and interfaces (both internal and external). This definition process occurs at the functional level. The system is described in terms of the functions to be performed, not in terms of computer programs, files, and data streams. The emphasis in this phase is on determining what functions must be performed rather than how to perform those functions, and ensuring data quality should be considered. This is best done through first identifying outputs, inputs, and processes. During the Requirements Subphase, the project team: • Further defines and refines functional and data requirements • Completes business process engineering of the functions to be supported • Develops detailed data and process models • Defines functional and system requirements that are not easily expressed in data and process models. Functional and system requirements also include the requirements of the business process, the user requirements, and operational requirements • Refines the high level architecture and logical design to support the system and functional requirements • Continues to identify and mitigate risk that the technology can be phased-in and coordinated with the business. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 14 ------- Requirements Procedure Description: The tasks described below are performed during the Requirements Subphase. The business needs are consolidated and affirmed. The functional requirements and the data requirements are then consolidated. The functional requirements are connected to the data requirements. The Functional Requirements Document (FRD) is a record of the above requirements. This can be established as a matrix and tracked for satisfaction of every module of the system as development progresses. The Functional and Data Requirements Review is conducted in the Requirements Subphase by the SIO and System Sponsor to ensure that the business requirements have been accurately linked to functional and data requirements. The Concept Exploration Subphase documentation may need to be revised or updated. The System Planning Subphase documentation may also need to be updated in this phase. Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the Requirements subphase. The System Manager is responsible for leading the team that accomplishes the tasks shown above. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Procurement Officer: The Procurement Officer is responsible and accountable for preparing solicitation documents under the guidance of the program manager. Quality Assurance Staff: The Quality Assurance Staff is responsible for continually reviewing the state of the product so the rest of the team can focus on their tasks. Quality Assurance's goal is to support the product development processes. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 15 ------- Requirements Control Gate 1 System Selection: At the end of the Definition Phase is the EA Compliance Certification Review and System Selection Control Gate. This ensures the business justification is accurate and complete and approves the IT Investment Business Case for inclusion in the EPA IT Portfolio. The system selection decision process is described in EPA Order 2100.3, Capital Planning and Investment Control (CPIC) Program Policy for Management of Information Technology (IT) Investments.. Upon completion of all Requirements Subphase tasks and receipt of resources for the next phase, the System Manager, together with the project team, prepares and presents a project status review for the SIO, IIS, System Sponsor, and other stakeholders. The review addresses: • Requirements Subphase required work products, which must be complete, approved, and verified • Planning status for all subsequent life cycle phases (with significant detail on the next phase, to include the status of pending contract actions) • Resource availability status • Acquisition risk assessments of subsequent life cycle phases given the planned acquisition strategy Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Acquisition Strategy Approvals (Decision Papers) - (SMP) Change Directive Change Tracking Log Concept of Operations Contract Security Requirements Cost Benefit Analysis Status U B •/ ^ U B U System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 16 ------- Requirements Work Product Functional Requirements Document Serves as the foundation for system design and development; captures user requirements to be implemented in a new or enhanced system; the systems subject matter experts document these requirements into the requirements trace ability matrix, which shows mapping of each detailed functional requirement to its source. Hardware Requirements Specification Information Categorization Interface Requirements Specification Specifies the requirements imposed on one or more systems, subsystems, Hardware Configuration Items, Computer Software Configuration Items, manual operations, or other system components to achieve one or more interfaces among these entities. Project Plan Records Management Disposition Schedule Security Concept Documents a preliminary analysis of security considerations for the new system. It provides the first look at the information that might be included in the Security Plan. Areas considered include risks from theft, disclosure, unauthorized access, eavesdropping, programmed attacks, incorrect routing, misplacement, erasure, and accidental damage. Includes an initial analysis of FIPS 199/NIST 800-60 categories and impact levels of the data and resulting information system. Based on this information, an initial baseline of security controls will be identified from FIPS 201 and NISTSP 800-53. Security Plan - (SMP) Begins the development of the security plan which describes the plan to meet security and privacy protection requirements. It addresses what is known to date about the impact levels, conceptual information system architecture, risks, required controls, contingency or continuity of support needs, laws and penalties that may apply to breach of confidentiality, etc." Establishes the security requirements and formalizes security process for system. Required for every system. Preliminary Security Risk Assessment Software Requirements Specification Solution Architecture System Engineering Management Plan Documents the plan, articulation, and approval of the strategy to execute the technical management aspects of the project (SEMP). System Test Plan Describes the specific tests and test cases to be used to evaluate the system at appropriate points in the system's SLC consistent with the TEMP. Security testing comes primarily from NIST SP 800-53a which will correspond to each security control. Additionally, usability and other programmatic acceptance criteria testing should be planned for that will contribute to system acceptance and authorizations. Test and Evaluation Master Plan (TEMP) Defines the overall strategy for ensuring that the developed and implemented system conforms to all requirements. The TEMP describes the types of testing that will be acceptable for use at various points in the system's SLC and what constitutes "successful" testing. Status B B B B U B B B B B U D D B System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 17 ------- I I Operations and Pciinterisince Attachment 2: Acquisition/Development Phase A. Acquisition Subphase Process Description: The purpose of acquisition planning is to allocate the requirements among development segments, research and apply lessons learned from previous projects, identify potential product and service providers, and secure funding. The Acquisition Subphase describes how all government human resources, hardware, software, and telecommunications capabilities, along with contractor support services, are acquired during the life cycle of the project. The Acquisition Subphase helps ensure that needed resources can be obtained and are available at the time they are needed. The Acquisition Subphase includes a schedule that lists activities for completion and work products to be produced with appropriate estimated completion dates. Procedure Description: The following activities are performed as part of the Acquisition Subphase. The results of these activities are captured in the Acquisition Plan and the Acquisition Strategy document and their underlying institutional processes and procedures. • Requirements Analysis • Analysis of Alternatives • Full Security Risk Assessment • Procurement of Government Human Resources and Services • Procurement Plan • Acquisition of Contractor Services • Solicitation of Services • Technical Evaluation Report • Source Selection Recommendation • Contract Award • Adjustment of Funds • Contract Performance The applicable elements of the outline to complete the Acquisition System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 18 ------- Subphase are followed. The information in the plan is as follows: • Adequate information for making management decisions concerning procurement of government human resources and services, contractor services procurement, including ensuring the availability of funding • Adequate information for performing a technical analysis and evaluation of vendor proposals • Adequate information for vendors to prepare bids • Adequate information for the source selection official to base a selection The following are considered when submitting a request for hardware, software, and/or related services: • Resources are consistent with applicable laws, regulations, policy/procedural guidance from central management agencies, Congress, and senior Agency management • Acquisitions are consistent with Agency objectives and initiatives as defined in the EPA EA • Resources are obtained only in direct support of the EPA missions and programs of the acquiring office/organization • Acquisitions are not redundant or duplicative efforts resulting in wasted money, time, and resources • Resources represent the most efficient and cost-effective means of providing automated support Caution is needed to ensure new and/or creative design concepts are considered. The Acquisition Subphase typically has its own mini-life cycle of pre-solicitation, solicitation and award, and post award. The life cycle model varies according to the system development effort; this means that the activities in each differ significantly. The model Acquisition Plan includes a milestone schedule, with estimated completion dates. The Acquisition Subphase becomes critical after the Functional Requirements Document has been approved. Several acquisitions may be needed to procure an entire system and are a continuous part of the life cycle. The Acquisition Plan is continuously updated with the active involvement of the System Manager. Responsibilities: System Manager: The System Manager works directly with acquisitions personnel to ensure the timely award of the needed System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 19 ------- Operations and Pciinterisince resources. The Acquisition Subphase is developed as required by the Federal Acquisition Regulation (FAR) 7.103. The System Manager is responsible and accountable for the successful execution of the Acquisition Subphase. The System Manager is responsible for leading the team that accomplishes the tasks shown above. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. May include Program Analysts or Programmers who interpret user requirements, designs and writes the code for specialized programs. Procurement Officer: The Procurement Officer is responsible and accountable for preparing solicitation documents under the guidance of the System Manager. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. System Owner: At an appropriate level within the EPA, an individual is designated as the project decision and quality authority (may or may not be the same individual designated as the sponsor in the previous phase). This individual is charged with assessing: • The completeness of the Acquisition Subphase activities • The robustness of the plans for the next life cycle phase • The availability of resources to execute the next phase • The acceptability of the risk of entering the next phase • The quality of the products produced in each phase For applicable projects, this assessment also includes the readiness to award any major contracting efforts needed to execute the next phase. At the end of phase review process, the decision maker does one of the following: • Directs the project to move forward into the next life cycle phase (including awarding contracts) • Directs the project to remain in the acquisition subphase pending completion of delayed activities or additional risk reduction efforts • Terminates the project System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 20 ------- Operations and Pciinterisince Project Level Reviews: A review is performed at the end of the Acquisition Subphase. The review ensures that the requirements of the system are identified and that the feasibility of the system is established. Products of the Acquisition Subphase are reviewed including the Acquisition Plan and the requirements specifications. This review is organized, planned, and led by the System Manager and/or representative. Approval of the Contract for Services by the Procurement Officer grants approval to proceed to the Design Subphase. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version -S = Always Required Work Product Acquisition Package Documents allocation of the requirements among development segments, research and applies lessons learned from previous projects; identifies potential product and service providers, and secures funding. Acquisition Strategy Approvals (Decision Papers) (SMP) Bidders List List of eligible and interested bidders, bidding on a contract. Change Directive Change Tracking Log Contract Document that establishes an offer and consideration for goods and/or services. Full Security Risk Assessment Project Plan Request for Proposal Solution Architecture Status B U B B ^ •/ B B U B U System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 21 ------- Design Operations and flBintertanee Attachment 2: Acquisition/Development Phase B. Design Subphase and Control Gate # 2 - EA Compliance Certification Review Process Description: The objective of the Design Subphase is to transform the detailed, defined requirements into complete, detailed specifications for the system that will guide the work of the Development Subphase. The decisions made in this phase address, in detail, how the system will meet the defined functional, physical, interface, and data requirements. Design Subphase activities may be conducted in an iterative fashion, producing first a general system design that emphasizes the functional features of the system, then a more detailed system design that expands the general design by providing all the technical detail. For Commercial Off-the-Shelf (COTS) products, some tasks and activities may have been performed by the vendor and vendor documentation may be appropriate to meet some documentation requirements. This is acceptable as long as each task and activity is performed and each document is available. Procedure Description: The following tasks are performed during the Design Subphase. The System Design Document is developed by the System Manager and project team, identifying the steps used in the design of the application/system. The prerequisites for this phase are the Business Case, Project Plan, and Functional Requirements Document (FRD). The System Manager and project team identify/specify the target environment, the development environment and the design environment. The business organization, roles and procedures for designing this system/application are articulated. The System Design Document is a work product in the Design Subphase. Documents from the previous phases are revised during the Design Subphase. The updates are signed off by the System Manager with significant changes approved by the System Sponsor and CIO. In the system design, first the general system characteristics are defined. The data storage and access for the database layer are designed. The user interface at the desktop layer is designed. The business rules layer or the application logic is designed. The interfaces System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 22 ------- Design Operations and flBintertanee from application to application and application to database also are designed and documented. A security risk assessment is conducted by addressing the following components: assets, threats, vulnerabilities, probability of risk occurence, consequences and safeguards. The risk assessment evaluates compliance with baseline security requirements, identifies threats and vulnerabilities, and assesses alternatives for mitigating or accepting residual risks. A Contingency Plan/COOP is developed containing emergency response procedures; backup arrangements, procedures and responsibilities; and post-disaster recovery procedures and responsibilities. It is included in this phase because many of these factors will affect the design of the system. The developer obtains the requirements from the Security Risk Assessment and the FRD and allocates them to the specific modules within the design for enforcement purposes. For example, if a requirement exists to audit a specific set of user actions, the developer may have to add a workflow module into the design to accomplish the auditing. Security operating procedures are guidance documents that provide users and administrators with detailed requirements on how to operate and maintain the system securely. They should address all applicable computer and telecommunications security requirements, including: system access controls; marking, handling, and disposing of magnetic media and hard copies; computer room access; account creation, access, protection, and capabilities; operational procedures; audit trail requirements; configuration management; processing area security; employee check-out; and emergency procedures. Security operating procedures may be created as separate documents or added as sections or appendices to the user and operations manuals. This activity should be conducted during the Design Subphase. The system user community is included in Design Subphase actions as needed. New or further requirements might be discovered that are necessary to accommodate individuals with disabilities. If so, these requirements are added to the FRD. Development of the following system documents is started in this phase: • Maintenance Manual: to ensure continued operation of the system once it is completed. This manual is completed as a work product in the Development Subphase. • Operations Manual for mainframe systems/applications and the System Administrators Manual for client/server System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 23 ------- Design Operations and flBintertanee systems/applications. These manuals are completed as work products in the Development Subphase. • Training Plan and the User Manual are begun during the Design Subphase. This will be completed as a work product in the Development Subphase. • Conversion Plan, if current information needs to be converted/migrated/transitioned to the new system. The Conversion Plan is needed especially if processes are re- engineered. • Implementation Plan and Contingency Plan/COOP are designed in this phase and are work products in the Development Subphase. • Training Plan outlining the objectives, needs, strategy, and curriculum to be addressed when training users on the new or enhanced information system. The plan presents the activities needed to support the development of training materials, coordination of training schedules, reservation of personnel and facilities, planning for training needs, and other training-related tasks. Training activities are developed to teach user personnel the use of the system as specified in the training criteria. The Training Plan includes a description of the target audience and topics on which training must be conducted on the list of training needs. It includes how the topics will be addressed and the format of the training program, the list of topics to be covered, materials, time, space requirements, and proposed schedules. The decisions of this phase re-examine in greater detail many of the parameters addressed in previous phases. The design prepared in this phase is the basis for the activities of the Development Subphase. The overall objective is to establish a complete design for the system. A number of project approach, project execution, and project continuation decisions are made in this phase. Project approach decisions include: • Identification of existing or COTS components that can be used, or economically modified, to satisfy validated functional requirements • Use of appropriate prototyping to refine requirements and enhance user and developer understanding and interpretation of requirements System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 24 ------- Design Operations and flBintertanee • Selection of specific methodologies and tools to be used in the later life cycle phases, especially the Development and Implementation Phases • Determination of how user support will be provided, how the remaining life cycle phases will be integrated, and newly identified risks and issues handled Project execution decisions include: • Modifications that must be made to the initial information system • Modifications that will be made to current procedures • Modifications that will be made to current systems/databases or to other systems/databases under development • How conversion of existing data will occur Project continuation decisions include: • The continued need for the information system to exist • The continued development activities based on the needs addressed by the design • Availability of sufficient funding and other required resources for the remainder of the system's life cycle There is an ongoing interim review of the system design as it evolves through the Design Subphase. Detailed objective system functions, performance requirements, security requirements, and system platform characteristics are reviewed. The System Manager conducts the final design review with approval or disapproval by the SIO and the System Sponsor. This review is conducted as the end of the Design Subphase and confirms that modifications prompted by earlier reviews are incorporated. Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the Design Subphase. The System Manager is responsible for leading the team that accomplishes System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 25 ------- Design Operations and flBintertanee the tasks shown above. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Procurement Officer: The Procurement Officer is responsible and accountable for preparing solicitation documents under the guidance of the program manager. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. Chief Architect: The Chief Architect is responsible for certifying EA compliance of the Solution Architecture to complete Control Gate #2. System Sponsor: The System Sponsor participates in the final design review and gives approval or disapproval with the SIO. Senior Information Official (SIO): The SIO participates in the final design review and gives approval or disapproval with the System Sponsor. Gate 2 - EA The purpose of the EA Compliance Certification Review is to Ensure COMPLIANCE the system's design conforms to the planned Solution Architecture and CERTIFICATION continues to address the business need while remaining in alignment REVIEW: with the Agency EA. The EA Compliance Certification Review is conducted by the Chief Architect who is responsible for certifying that Solution Architectures are compliant with the Enterprise Architecture. The SIO or designee conducts the EA Compliance Certification Review and certifies architecture compliance for non-major and small or other systems. The Solution Architecture is certified as architecturally compliant prior to project development unless the appropriate waiver is obtained. During the Control Gate #2 Review, all Acquisition and Design Subphase required work products must be complete, approved, and verified to satisfy the Control Gate requirement. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 26 ------- Design Operations and flBintertanee Joint Management Reviews: Joint management reviews are required when the project is being managed and/or funded by multiple offices. The determination of who should participate in joint management reviews is made during the initial tailoring process. Joint management reviews for both requirements and design are held during the Design Subphase. Prior to the design reviews, the acquirer shall have reviewed the work products initiated, updated, or completed during the Design Subphase. System/subsystem and software requirements reviews are held at the beginning of the Design Subphase to resolve open issues regarding the specified requirements for a software system or subsystem. A system/subsystem design review is held at the end of the Design Subphase to resolve open issues regarding any of the following: • The system-wide or sub system-wide design decisions • The architectural design of a software system or subsystem A software design review is held at the end of the Design Subphase to resolve open issues regarding one or more of the following: • The software-wide design decisions • The architectural design of a software item • The detailed design of a software item or portion thereof (such as a database) Upon completion of all Design Subphase tasks and receipt of resources for the next phase, the System Manager, together with the project team should prepare and present a project status review for the SIO, System Sponsor, and other stakeholders. The review should address: • Design Subphase required work products, which must be complete, approved, and verified • Planning status for all subsequent life cycle phases (with significant detail on the next phase, to include the status of pending contract actions) • Resource availability status Acquisition risk assessments of subsequent life cycle phases given the planned acquisition strategy. System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 27 ------- Design Operations and flBintertanee Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Application Deployment Checklist (SMP) Approvals (Decision Papers) (SMP) Change Directive Change Tracking Log Contingency Plan/COOP Contains emergency response procedures; backup arrangements, procedures, and responsibilities; and post-disaster recovery procedures and responsibilities. Contingency planning is essential to ensure that systems are able to recover from processing disruptions in the event of localized emergencies or large-scale disasters. It is an emergency response plan, developed in conjunction with application owners and maintained at the primary and backup computer installation to ensure that a reasonable continuity of support is provided if events occur that could prevent normal operations. Data Conversion Plan Describes the strategies involved in converting data from an existing system to another hardware or software environment. It is appropriate to re-examine the original system's functional requirements for the condition of the system before conversion to determine if the original requirements are still valid. Functional Requirements Document Hardware Requirements Specification Interface Requirements Specification Maintenance Manual Provides the definition of the software support environment, the roles and responsibilities of maintenance personnel, and the regular activities essential to the support and maintenance of program modules, job streams, and database structures. Operations Manual Provides system administrators/computer control personnel/computer operators with a detailed operational description of the information system and its associated environments, such as machine room operations and procedures. Project Plan Requirements Traceability Matrix Graphically depicts the relationship between requirements, design modules, and tests used to establish that all requirements have been addressed within the system and that the tests planned for the system will both test all of the components and demonstrate that the requirements have been met. Solution Architecture Status B B V S B B U U U D D U B U System Life Cycle Management Guidance - DPvAFT - Not for Distribution Updated: 1/10/07 Page 28 ------- Design Operations and flBintertanee Work Product Status System Design Document Describes the system requirements, operating environment, system and subsystem architecture, files and database design, input formats, output layouts, human-machine interface, detailed design, processing logic, and external interfaces. It is used in conjunction with the Functional Requirements Document, which is finalized in this phase, to provide a complete system specification of all user requirements for the system and reflects the user's perspective of the system design. Will include Database Models - Logical/Physical and Physical Network Topologies - Logical/Physical B System Implementation Plan (SMP) Describes how the information system will be deployed and installed into an operational system. The plan contains an overview of the system, a brief description of the major tasks involved in the implementation, the overall resources needed to support the implementation effort (such as hardware, software, facilities, materials, and personnel), and any site-specific implementation requirements. D System Test Plan (SMP) B User Manual Contains all essential information for the user to make full use of the information system. This manual includes a description of the system functions and capabilities, contingencies and alternate modes of operation, and step-by- step procedures for system access and use. D User Training Plan Outlines the objectives, needs, strategy, and curriculum to be addressed when training users on the new or enhanced information system. The plan presents the activities needed to support the development of training materials, coordination of training schedules, reservation of personnel and facilities, planning for training needs, and other training-related tasks. D System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 29 ------- Development Attachment 2: Acquisition/Development Phase C. Development Subphase Process Description: The objective of the Development Subphase is to convert the work products of the Design Subphase into a complete information system. Although much of the activity in the Development Subphase addresses the computer programs that make up the system, this phase also puts in place the hardware, software, and communications environment for the system and other important elements of the overall system. The activities of this phase translate the system design produced in the Design Subphase into a working information system capable of addressing the information system requirements. The Development Subphase contains activities for integration and installation and acceptance related to software products. At the end of this phase, the system is ready for the activities of the Test Subphase. For COTS products, some tasks and activities may have been performed by the developer and developer documentation may be appropriate to meet some documentation requirements. This is acceptable as long as each task and activity is performed and each document is available. Procedure Description: This activity consists of several tasks that are the responsibility of the developer. The developer places the outputs under configuration control and performs change control. The developer also documents and resolves problems and non-conformances found in the software products and tasks. The developer selects, tailors, and uses those standards, methods, tools, and computer programming languages that are documented, appropriate, and established by the organization for performing the activities in the Development Subphase. Plans for conducting the activities of the Development Subphase are developed, documented and executed. The plans include specific standards, methods, tools, actions, and responsibility associated with the development and qualification of all requirements including safety and security. Separate plans may be developed. The detailed project Work Breakdown Structure (WBS) developed during the Planning Subphase should be expanded to incorporate the WBS structure into System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 30 ------- Development each module or software configuration item to be developed. Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the Development Subphase. The System Manager is responsible for leading the team that accomplishes the tasks shown above. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Procurement Officer: The Procurement Officer is responsible and accountable for preparing solicitation documents under the guidance of the program manager. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. Project Level Reviews: Upon completion of all Development Subphase tasks and receipt of resources for the next phase, the System Manager, together with the project team prepares and presents a project status review for the SIO, Program Sponsor, and other stakeholders. The review should address: Development subphase activities status Planning status for all subsequent life cycle phases (with significant detail on the next subphase, to include the status of pending contract actions) Resource availability status Acquisition risk assessments of subsequent life cycle phases given the planned acquisition strategy System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 31 ------- Development Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Acquisition Package Application Deployment Checklist Change Directive Change Tracking Log Contingency Plan/COOP Data Conversion Plan Hardware Requirements Specification Integration Document Explains how the software components, hardware components, or both are combined and the interaction between them. Maintenance Manual Operations Manual Project Plan Requirements Traceability Matrix System Design Document Security Risk Assessment Software Development Document Contains documentation pertaining to the development of each unit or module, including the test cases, software, test results, approvals, and any other items that will help explain the functionality of the software. Solution Architecture System (Application) Software Entails the disks (or other media) used to store the application software used for the Test Phase and finalized in this phase before implementation of the system. System Implementation Plan System Modules (Code, Test, Implementation, and Operational) Includes development units such as the source code modules, object code modules, load modules, and job control streams developed to automate the required business functions. Although these modules are not typically documents but files that reside on the developed system, source code and job control listings can be printed and included in system documentation for each unit / module. System Security Plan System Test Plan Status U U s s U U U B B B U U U U B U D U D B U System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 32 ------- Development I Test Work Product Test Analysis Report Documents the formal documentation of the software testing. Test Files / Data Provide the actual test data and files used for system testing. User Manual User Training Plan Status B B B B System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 33 ------- Attachment 2: Acquisition/Development Phase C. Test Subphase and Control Gate # 3 - Authorization to Operate Process Description: The objective of the Test Subphase is to prove that the developed system satisfies the requirements defined in the Functional Requirements Document (FRD). Another purpose is to perform an integrated system test function as specified by the design parameters. This function is the responsibility of the system testers and heavily supported by the user participants. Prerequisites of this phase are the FRD, project management plan and schedule, system baseline software and documents, and a test plan containing all test requirements and schedules. Several types of tests are conducted in this phase. First, subsystem integration tests are executed and evaluated by the development team to prove that the program components integrate properly into the subsystems and that the subsystems integrate properly into an application. Next, the testing team conducts and evaluates system tests to ensure the developed system meets all technical requirements, including performance requirements. Next, the testing team and the Security Manager conduct security tests to validate that the access and data security requirements are met. Finally, users participate in acceptance testing to confirm that the developed system meets all user requirements as stated in the FRD. Acceptance testing is performed in a simulated "real" user environment with the users using simulated or real target platforms and infrastructures. Procedure Description: The following tasks are completed during the Test Subphase. The test and evaluation team is responsible for establishing the test team and creating the Test Files/Data. The test and evaluation team is responsible for creating/loading the test database(s) and executing the system test(s). All results are documented on the Test Analysis Report, Test Problem Report, and on the Test Analysis Approval Determination. Any failed components are migrated back to the Development Subphase for rework, and the passed System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 34 ------- components migrated ahead for security testing. The test and evaluation team create or load the test database(s) and execute security (penetration) test(s). All tests are documented, similar to those above. Failed components are migrated back to the Development Subphase for rework, and passed components will be migrated ahead for acceptance testing. The test and evaluation team create/load the test database(s) and execute the acceptance test(s). All tests are documented similar to those above. Failed components are migrated back to the Development subphase for rework, and passed components migrate ahead for implementation. During this phase, the documentation from all previous phases is finalized to align it with the delivered system. The System Manager coordinates these update activities and is responsible for ensuring that the functionality of the systems meets all quality requirements specified in the Quality Assurance Plan. Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the Test subphase. The System Manager is responsible for leading the team that accomplishes the tasks shown above. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of project decision milestones. Gate 3 - AUTHORIZ- ATION TO OPERATE: The purpose of the Authorization to Operate Review is to ensure that the system is ready to move into an operational state. The Authorization to Operate Review is conducted by the designated approving authority, who uses the certification package to make a determination as to the appropriateness of allowing the system to function. The system must be accredited for operations prior to the System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 3 5 ------- system being moved into an operational state. The approving authority can provide full authorization to operate or denial of authorization to operate. Upon completion of all integration and the Test Subphase tasks and the receipt of resources for the next phase, the System Manager, together with the project team prepares and presents a project status review for the SIO, System Sponsor, and other stakeholders. The review should address: • Test Subphase required work products, which must be complete, approved, and verified • Planning status for all subsequent life cycle phases (with significant detail on the next phase, to include the status of pending contract actions) • Resource availability status • Acquisition risk assessments of subsequent life cycle phases given the planned acquisition strategy • Completion of quality assurance and quality control activities for this phase The final statement of Authorization to Operate is issued by the Information Management Officer. (IMO) Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version -S = Always Required Work Product Change Directive Change Tracking Log Project Plan Solution Architecture System Implementation Plan Status ^ ^ U U U System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 36 ------- System Modules (Code, Test, Implementation, and Operational) System Test Plan Test Analysis Approval Determination Summary of the perceived readiness for migration of the software; attached to the Test Analysis Report as a final result of the test reviews and testing levels above the integration test. Test Analysis Report Test Problem Report U U B B S System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 37 ------- Implementation Attachment 3: Implementation Phase Process Description: In the Implementation Phase., the system or system modifications are installed and made operational in a production environment. The phase is initiated after the system has been tested and accepted by the user. Activities in this phase include notification of implementation to end users, execution of the previously defined training plan, data entry or conversion, completion of security certification and accreditation and post implementation evaluation. This phase continues until the system is operating in production in accordance with the defined user requirements. The new system being implemented can fall into three categories: replacement of a manual process, replacement of a legacy system, or upgrade to an existing system Regardless of the type of system, all aspects of the implementation phase should be followed. This ensures the smoothest possible transition to the organization's desired goal. Procedure Description: The following activities are performed as part of the Implementation Phase. A description of these tasks and activities is provided below. The implementation notice is sent to all users and organizations affected by the implementation. Additionally, it is good policy to make internal organizations not directly affected by the implementation aware of the schedule so that allowances can be made for a disruption in the normal activities of that section. The notice should include: • The schedule of the implementation • A brief synopsis of the benefits of the new system • The difference between the old and new system • Responsibilities of end user affected by the implementation during this phase • The process to obtain system support, including contact names and phone numbers Typically, implementation includes converting existing data for use in the new system. The tasks for this effort are two-fold: data input and data verification. When replacing a manual system, hard copy data is entered into the automated system. Some sort of verification that the data is being entered correctly should be conducted throughout this process. This is also the case in data transfer, where data fields in the System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 3 8 ------- Implementation old system may have been entered inconsistently and therefore affect the integrity of the new database. Verification of the old data becomes imperative to a useful computer system. One of the ways verification of both system operation and data integrity can be accomplished is through parallel operations. Parallel operations consist of running the old process or system and the new system simultaneously until the new system is certified. In this way if the new system fails in any way, the operation can proceed on the old system while the bugs are worked out. To ensure that the system is fully operational, install the system in a production environment. After the system has been fielded, a post-implementation evaluation is conducted to determine the success of the project through its implementation phase. The purpose of this evaluation is to document implementation experiences to recommend system enhancements and provide guidance for future projects. In addition, Change Implementation Notices are utilized to document user requests for fixes to problems that may have been recognized during this phase. It is important to document any user request for a change to a system to limit misunderstandings between the end user and the system programmers. During this phase, the documentation from all previous phases is finalized to align it with the delivered system. The System Manager coordinates these update activities. Responsibilities: System Manager: The System Manager is responsible and accountable for the successful execution of the Implementation Phase. The System Manager is responsible for leading the team that accomplishes the tasks shown above and finalizing all of the documentation from previous phases. Project Team: The project team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the System Manager. Oversight Stakeholders: The oversight stakeholders provide oversight, advice and counsel to the System Manager on the conduct and requirements of the planning effort. Additionally, oversight stakeholders provide information, judgments, and recommendations to the EPA decision makers during project reviews and in support of System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 3 9 Updated: 1/10/07 ------- Project Level Reviews: Implementation project decision milestones. A post-implementation review is conducted to ensure that the system functions as planned and expected; to verify that the system cost is within the estimated amount; and to verify that the intended benefits are derived as projected. Normally, this is a one-time review, and it occurs after a major implementation; it may also occur after a major enhancement to the system. The results of an unacceptable review are submitted to the SIO for review and follow-up actions. The SIO may decide it is necessary to return the deficient system to the responsible system development System Manager for correction of deficiencies. During the Implementation Phase review, recommendations may be made to correct errors, improve user satisfaction or improve system performance. For contractor development, analysis is performed to determine if additional activity is within the scope of the statement of work or within the original contract. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version •S = Always Required Work Product Acquisition Package Application Deployment Checklist Approvals (Decision Papers) Authorization to Operate The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. Also referred to as Authorization to Process or Accreditation. Addressed during Control Gate #3. Change Directive Change Implementation Notice Documents a formal request and approval document for changes made during the Implementation Phase. Change Tracking Log Post Implementation Review Report Documents the review that is conducted to ensure that the system functions Status U U B B ^ B ^ B System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 40 ------- Implementation Work Product as planned and expected, to verify that the system cost is within the estimated amount, and to verify that the intended benefits are derived as projected. This report is created at the end of the fmplementation Phase. Project Plan Security Certification and Accreditation Certification results in a security assessment report that results in findings and recommendations. These are used to revise and approve the security plan any develop any Plans of Action and Milestones (POA&Ms) to correct deficiencies. The approved security plan, security assessment report and POA&Ms are components of an Accreditation package. From this the approving authority will develop the "Accreditation" which contains their decision to accredit, decision rationale and any terms and conditions. The term "No accreditation" signifies identified deficiencies must be corrected before the system can move to production/implementation, interim accreditation allows for implementation based on mission exigencies and risk acceptance, but does not consider the system accredited for purposes of OMB reporting. Full accreditation allows for implementation in the production environment. There may be POA&Ms that must be fulfilled, but these do not represent a significant security risk, (see NIST SP 800-37 for further details). The Security Accreditation Package includes the Certifier's Statement. Solution Architecture System Modules (Code, Test, Implementation, and Operational) Version Description Document Serves as the primary configuration control document used to track and control versions of software released to the operational environment. It is a summary of the features and contents for the software development, and identifies and describes the version of the software to be delivered. Status U B U B B System Life Cycle Management Guidance - DPxAFT - Not for Distribution Updated: 1/10/07 Page 41 ------- Operations and Maintenance Attachment 4: Operations & Maintenance Phase Control Gate # 4 — Modify or Terminate Process Description: More than half of the life cycle cost of a system can be attributed to its operation and maintenance. In this phase, it is essential that all facets of operation and maintenance are performed. The system is being used and scrutinized to ensure that it meets the needs initially defined during planning. Problems may be detected and new needs arise that may require modification to existing code, new code to be developed, and/or hardware configuration changes. Providing user support such as providing training to new users is an ongoing activity. The emphasis of this phase is to ensure that the users' needs are met and the system continues to perform as specified in the operational environment. Additionally, as operations and maintenance personnel monitor the current system, they may become aware of ways to improve the system and therefore make recommendations. Changes will be required to fix problems, possibly add features, and make improvements to the system. This phase continues for as long as the system is in use. Procedure Operations support is an integral part of the day-to-day operation of a Description: system. In small systems, all or part of each task may be done by the same person. But in large systems, each function may be done by separate individuals or even separate areas. The Operations Manual was developed in previous phases. This document defines tasks, activities, and responsible parties and needs to be updated as changes occur. Systems operations activities and tasks need to be scheduled, on a recurring basis, to ensure that the production environment is fully functional and is performing as specified. The following is a checklist of systems operations key tasks and activities: • Ensure that systems and networks are running and available during the defined hours of operation • Ensure all processes, manual and automated, are documented in the operating procedures. These processes should comply with the system documentation System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 42 ------- Operations and Maintenance • Acquisition and storage of supplies, e.g., paper, toner, tapes, removable disks • Perform and test backups (day-to-day protection, contingency) • Perform the physical security functions including ensuring adequate uninterruptible power supply and ensuring that personnel have proper clearances and proper access privileges, etc. • Ensure contingency planning for disaster recovery is current, tested, and funded according to the Contingency Plan/COOP • Ensure users are trained on current processes and new processes. Provide periodic refresher training and ensure funding • Ensure that service level objectives are kept accurate and are monitored • Maintain performance measurements, statistics, and system logs. Examples of performance measures include volume and frequency of data to be processed in each mode, order and type of operations • Monitor security controls and performance statistics, report the results, and escalate problems when they occur Data/software administration is needed to ensure that input data and output data and databases are correct and continually checked for accuracy and completeness. This includes ensuring that any regularly scheduled jobs are submitted and completed correctly. Software and databases should be maintained at (or near) the current maintenance level. The backup and recovery processes for databases are normally different than the day-to-day data/software administration volume backups. The backup and recovery process of the databases should be performed as a data/software administration task. A checklist of data/software administration tasks and activities includes the following: • Performing production control and quality control functions (job submission, checking and corrections) • Interfacing with other functional areas for day-to-day checking/corrections • Installing, configuring, upgrading and maintaining database(s). This includes updating processes, data flows, and objects (usually shown in diagrams) • Developing and performing data/database backup and System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 43 Updated: 1/10/07 ------- Operations and Maintenance recovery routines for data integrity and recoverability • Ensuring all processes are properly documented properly in the Operations Manual • Developing and maintaining a performance plan for online process and databases • Performing configuration, security and design reviews/audits to ensure software, system, parameter, and configuration are correct • Perform patching of software for the system if and when required • Manage and control configuration and changes to the system One fact of life with any system is that change is inevitable. Users need an avenue to suggest changes and identified problems. A User Satisfaction Review which can include a Customer Satisfaction Survey can be designed and distributed to obtain feedback on operational systems to help determine if the systems are accurate and reliable. Systems administrators and operators need to be able to make recommendations for upgrades to hardware, architecture and streamlining processes. For small in-house systems, modification requests can be handled by an in-house process. For large integrated systems, modification requests may be addressed in the requirements document and may take the form of a change package or a formal Change Implementation Notice and may require justification and cost benefits analysis for approval by a review board. The requirements document for the project may call for a modification cut-off and rollout of the system as a first version and all subsequent changes addressed as a new or enhanced version of the system. A request for modifications to a system may also generate a new project and require a new project initiation plan. Daily operations of the system/software may necessitate that maintenance personnel identify potential modifications needed to ensure that the system continues to operate as intended and produces quality data. Daily maintenance activities for the system must take place to ensure that any previously undetected errors are fixed. Maintenance personnel may determine that modifications to the system and databases are needed to resolve errors or performance problems. Also, modifications may be needed to provide new capabilities or to take advantage of hardware upgrades or new releases of system software and application software used to operate the system. New capabilities may take the form of routine maintenance or may constitute enhancements to the system or database as a response to user requests for new/improved System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 44 Updated: 1/10/07 ------- Operations and Maintenance capabilities. New capability needs may begin a new problem modification process described above. At the beginning of this phase any outstanding security-related Plans of Action and Milestones (POA&Ms) must be completed. Throughout the phase, continuous security monitoring of selected controls must be conducted. In addition, periodic reviews of controls, periodic re- evaluation of information categorization and re-certifications and revision of risk assessments and security plans, and re-certification and re-authorizations to process (re-accreditation) are conducted as required. Because systems undergo periodic maintenance, enhancements and improvement, mini life cycles may be required throughout this stage. Continuous vigilance should be given to virus and intruder detection. The System Manager must be sure that security operating procedures are kept updated accordingly. Review and update system documentation including the operations from the previous phases. In particular, the Operations Manual, Business Case, and Contingency Plan/COOP (including results of tests during this phase), as required, need to be updated and finalized during the Operations and Maintenance Phase. The System Manager must report on any security incidents related to the system during this phase. Responsibilities: System Manager: The System Manager develops documents and executes plans and procedures for conducting activities and tasks of the maintenance period and conducts quality assurance activities on those documents. To provide for an avenue of problem reporting and customer satisfaction, the Systems Manager should create and discuss communications instructions with the systems customers. Systems Managers should keep the Help Desk personnel informed of all changes to the system especially those requiring new instructions to users, and must report on all security incidents. Technical Support: Personnel which provide technical support to the program. This support may involve granting access rights to the program, setup of workstations or terminals to access the system, and maintenance of the operating system for both server and workstation. Technical support personnel may be involved with issuing user IDs or login names and passwords. In a client-server environment, technical support may perform systems scheduled backups and operating system maintenance during downtime. Vendor Support: The technical support and maintenance on some programs are provided through vendor support. A contract is established outlining the contracted systems administration, operators, and System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 45 Updated: 1/10/07 ------- Operations and Maintenance maintenance personnel duties and responsibilities. One responsibility which should be included in the contract is that all changes to the system will be thoroughly documented. Help Desk: Help Desk personnel provide the day-to-day users help for the system. Help desk personnel should be kept informed of all changes or modifications to the system. Help Desk personnel are contacted by the user when questions or problems occur with the daily operations of the system. Help Desk personnel need to maintain a level of proficiency with the system. Operations or Operators (turn on/off systems, start tasks, backup etc): For many mainframe systems, an operator provides technical support for a program. The operator performs scheduled backup, performs maintenance during downtime and is responsible to ensure the system is online and available for users. Operators may be involved with issuing user IDs or login names and passwords for the system. Customers: The customer needs to be able to share with the systems manager the need for improvements or the existence of problems. Some users live with a situation or problem because they feel they must. Customers may feel that change will be slow or disruptive. Some feel the need to create work-arounds. A customer has the responsibility to report problems or make recommendations for changes to a system. Program Analysts or Programmer: Interprets user requirements, designs and writes the code for specialized programs. User changes, improvements, enhancements may be discussed in Joint Application Design sessions. Analyzes programs for errors, debugs the program and tests program design. Process Improvement Review Board: A board of individuals may be convened to approve recommendations for changes and improvements to the system. This group may be chartered. The charter should outline what should be brought before the group for consideration and approval. The board may issue a Change Directive. Users Group or Team: A group of computer users who share knowledge they have gained concerning a program or system. They usually meet to exchange information, share programs and can provide expert knowledge for a system under consideration for change. Contract Manager: The Contract Manager has many responsibilities when a contract has been awarded for maintenance of a program. The Contract Manager should have a certificate of training for completion of a Contracting Officer's Technical Representative (COTR) course. The Contract Manager's main role is to make sure that the interests of the Procurement Office are protected and that no modifications are made to System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 46 Updated: 1/10/07 ------- Operations and Maintenance the contract without permission from the Procurement Office. Data Administrator: Performs tasks which ensure that accurate and valid data are entered into the system. Sometimes this person creates the information systems database, maintains the databases security and develops plans for disaster recovery. The data administrator may be called upon to create queries and reports for a variety of user requests. The data administrator responsibilities include maintaining the databases data dictionary. The data dictionary provides a description of each field in the database, the field characteristics and what data is maintained with the field. Telecommunications Analyst and Network System Analyst: Plans, installs, configures, upgrades, and maintains networks as needed. If the system requires it, they ensure that external communications and connectivity are available. Information Security Officer (ISO): The ISO has a requirement to review system change requests, review and in some cases coordinate the Change Impact Assessments, participate in the Configuration Control Board process, and conduct and report changes that may be made that affect the security posture of the system. The ISO is also responsible for ensuring that all POA&Ms are tracked appropriately. Gate 4 - MODIFY OR TERMINATE REVIEW: The purpose of the Modify or Terminate Review is to determine if the IT Investment should continue, be modified or terminated. The Modify or Terminate Review is coordinated by OEI, who ensures the IT Investment Business Case is accurate and complete. The package is then forwarded to the QIC, who relies on the IIS to provide a through Business Case review in accordance with the EPA's CPIC Evaluation Phase criteria, determining if it can optimally continue to support mission/user requirements and the EPA's strategic direction. The IIS develops recommendations for the QIC to make a decision on whether to keep this investment as part of the EPA's IT Investment Portfolio as is, modify or terminate the investment. Review activities occur several times throughout this phase. Each time the system is reviewed, one of three of the following decisions will be made: • The system is operating as intended and meeting performance expectations • The system is not operating as intended and needs corrections or modifications System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 47 ------- Operations and Maintenance • The users are/are not satisfied with the operation and performance of the system During the Control Gate #4 Review, all Implementation and Operations & Maintenance Phase required work products must be complete, approved, and verified to satisfy the Control Gate requirement. The In-Process Reviews (conducted at least annually) are conducted in this phase. An In-Process Review is performed to evaluate system performance, user satisfaction with the system, adaptability to changing business needs, and new technologies that might improve the system. This review is diagnostic in nature and can lead to development or maintenance activities. Any major system modifications needed after the system has been implemented follow the life cycle process from planning through implementation. A project management plan, including a feasibility study, is developed to identify modifications to existing system documentation (change pages) rather than new system documentation (for example, a functional requirements document, a system design document, etc.). The appropriate reviews and testing are conducted based on the scope of the modification. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version -S = Always Required Work Product Acquisition Strategy Change Control Depending on the type and magnitude of changes made during O&M, modifications to the system may have to cycle through some or all of the development phases with attention paid to the security requirements and impacts of the required changes. Change Directive Change Tracking Log Cost-Benefit Analysis Functional Requirements Document Hardware Requirements Specification Status U U ^ ^ U U U System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 48 ------- Operations and Maintenance Work Product In-Process Review Documents the In-Process Review which occurs at predetermined milestones; usually quarterly, but at least once a year. The performance measure should be reviewed along with the health of the system. Performance measures should be measured against the baseline measures. Ad hoc reviews should be performed when deemed to be necessary. Project Plan Re-Certification and Re-Accreditation Records Management Disposition Schedule Requirements Traceability Matrix Solution Architecture System Design Document System Modules (Code, Test, Implementation, and Operational) User Satisfaction Review Documents User Satisfaction Reviews which can be used as a tool to determine the need to proceed with a Process Improvement Review Board meeting or initiate a proposal for a new system. This review can be used as input to the In- Process Review Status B U B U U U U U B System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 49 ------- Termination (Retirement) Attachment 5: Termination Phase Process Description: Procedure Description: The Termination Phase is implemented to either eliminate a large part of a system or, in most cases, close down a system and end the life cycle process. At this point, the system has been declared surplus and/or obsolete and will be scheduled for retirement and shutdown. The emphasis of this phase is to ensure that data, procedures, and documentation are packaged and archived in an orderly fashion, making it possible to reinstall and bring the system back to an operational status, if necessary, and to retain all data records in accordance with policies regarding retention of electronic records. The Termination Phase represents the end of a system's life cycle. A Retirement Plan is prepared to address all facets of archiving, transferring, and disposing of the system and data. Particular emphasis is given to proper preservation of the data processed by the system do that it is effectively migrated to another system or archived in accordance with applicable records management regulations and policies for potential future access. The system retirement activities preserve information not only about the current production system but also about the evolution of the system through its life cycle. The objectives for all tasks identified in this phase are to retire the system, software, hardware and data. The tasks and activities actually performed are dependent on the nature of the project. The retirement activities are performed at the end of the systems life cycle. The retirement activities ensure the orderly retirement of the system and preserve vital information about the system so that some or all of it may be reactivated in the future if necessary. These activities may be expanded, combined or deleted, depending on the size of the system. The Retirement Plan must be developed and implemented. The Retirement Plan identifies how the retirement of the system/data will be conducted, and when, as well as the system retirement date, software components to be preserved, data to be preserved, retirement of remaining equipment, and archiving of life cycle products. The data from the old system is implemented into the new system or if it is obsolete, the data is archived. Similar to the data that is archived or transferred, the software components will need to be transferred to the new system, or if that is not feasible, dispositioned appropriately. The documentation that resulted from the development of the application or system needs to be archived, where it can be referenced, System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 50 ------- Termination (Retirement) if needed, at a later date. Follow the Retirement Plan for the orderly breakdown of the system, its components and the data within. If the equipment can be used elsewhere in the organization, it should be recycled. If it is obsolete, notify the property management/Facilities Office to dispose of all hardware components. This review is performed at the end of the Termination Phase and again within six months after retirement of the system. Responsibilities: System Manager: Authors the Retirement Plan and ensures that all aspects of the Retirement Plan are followed. The Retirement Plan should outline all roles and responsibilities for all actions related to the close down and archive of the system. Prepares Post-Retirement Review Report. Ensure that the Retirement Plan is followed. Technical Support or Vendor Support: The Retirement Plan may call for the Technical Support Personnel to send system related hardware to a warehouse or may reassign equipment to a new or replacement system. Technical Support Personnel or Operators may perform the cutoff of users' access per instructions from the Security Manager. Technical Support personnel may assist with the archive of the Information Systems data. They would perform the actual archive process. Data Administrator: The Retirement Plan may direct that only certain systems data be archived. The Data Administrator would identify the data and assist technical personnel with the actual archive process. The Data Administrator may be involved with identifying data which due to its sensitive nature must be destroyed. They would also be involved with identifying and migrating data to a new or replacement system. User Services (Training & Help Desk): User Services includes training, telecommunications, and Help Desk personnel. The training component coordinates and schedules the development and delivery of all training and facilitates the development of systems training methods and materials. In this phase, User Services may assist with the retraining of users to facilitate the transfer to a new or replacement system. Operations: (turn off systems, start tasks, backup etc) Operations interfaces with the computer facility that hosts the system being terminated. This group also schedules, executes, and verifies production job streams; distributes specified outputs; handles other production control activities; and maintains and monitors centralized mainframe database management system software and runtime environments. It also acquires, maintains, customizes and tunes System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 51 Updated: 1/10/07 ------- Termination (Retirement) operating system software, assesses the affect of new or changed systems upon the operational environments, manages system software capacities, and advises on or arranges accommodation of new application systems. In this phase, the Operators would assist Technical Support, the Security Manager, Data Administrators, and the Quality Manager with the actual archive process. Program Manager/Analysts: Program Managers need to plan and schedule a smooth shutdown. They also should be sure that all documentation is accumulated to be archived with the system. Customers (User Groups): The user group ensures the active participation of users at all levels in the definition, design, and development of a re-engineered automation system for the capture, processing, tracking, and reporting. The purpose of the user group is to provide a forum for end users' input, coordination, and validation of their automation requirements. The group provides a consistent work force responsible for initiating and resolving issues relating to system development efforts and expeditiously resolves issues relating to the identification and documentation of requirements. Security Managers: The security managers need to make sure that all access authority has been eliminated for the users. Any users that only use the application should be removed from the system while others that use other applications as well as this one may still need access to the overall system, but not the application being shutdown. Project Level Reviews: The Post-Retirement Review shall be performed after the end of this final phase. This phase-end review shall be conducted within six months after retirement of the system and is intended to notify all parties that the final shut-down of the system has occurred. The Post-Retirement Review Report also documents the lessons learned from the shutdown and archiving of the terminated system. Work Products: D = Draft: Preliminary version of work product/working copy B = Baseline: Completed version of work product (with signoff if applicable) U = Update: Completed version showing changes made to the baseline version S = Required Work Product Approvals (Decision Papers) Status B System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 52 ------- Termination (Retirement) Work Product Archive/Incorporate Data and Software The packaged set of data and documentation containing the archived application. Change Directive Change Tracking Log Close-Out Certification Documents the verification that all procedures and steps were successfully carried out in the termination of a system Post Retirement Review Report Documents the detailed findings of the Termination Phase review. It includes details of where to find all products and documentation that has been archived. Retirement Decision Paper Documents the decision to retire, or terminate the life cycle of, the system. Retirement Plan Documents the plan to end the operation of the system in a planned, orderly manner and to ensure that system components and data are properly archived or incorporated into other systems. This will include removing the active support by the operations and maintenance organizations. Solution Architecture System Disposition Report Describes the rationale for ceasing system operations, documents the plan for ceasing operations and effectively archiving the various components of the system, including hardware, and provides information about the location of archived materials. This report is vital to ensure that information about the system can be accessed to support reactivation of the system, or future reuse of portions of the current system by other systems. Transition Plan (as appropriate) Status B S s B B B B U B B System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 53 ------- Control Gate Reviews This section contains information on each of the required Control Gate Reviews. The descriptions of these reviews as presented here represent the most complete set of requirements that could be imposed on a system during the SLCM process. Depending on the system's tailoring methodology, some of these Control Gate requirements may not be applicable. Further guidance on tailoring your system's SLCM process will be made available in a separate guidance package which is currently under development. Gate 1 - EA Compliance Certification and System Selection Review Purpose The purpose of the System Selection Review is to approve the IT Investment Business Case for inclusion in the Agency's IT Investment portfolio. An initial EA Compliance Certification review is also performed at the Control Gate (see Control Gate 2 for official definition of EA Compliance Certification). Scope The System Selection Review is coordinated by the Office of Environmental Information (OEI), who ensures the IT Investment Business Case is accurate and complete. The package is then forwarded to the Quality and Information Council (QIC), who relies on the Information Investment Subcommittee (IIS) to provide a thorough Business Case review in accordance with the Agency's CPIC Select Phase criteria. The IIS then forwards its investment recommendation to the QIC for its final decision. Work Products All work products required during the SLCM Definition Phase must be complete, approved, and verified during the Control Gate 1 review. These products include but are not limited to: • Business justification for the investment • Established performance goals and quantifiable performance measures • Project plan • Identified costs, schedule, benefits, and risks • Established security, and architecture goals and measures • Privacy Impact Assessment • Solution Architecture Gate 2 - EA Compliance Certification Review Purpose The purpose of the EA Compliance Certification Review is to ensure the system's design conforms to the planned Solution Architecture and continues to address the business need while remaining in alignment with the Agency EA. Scope The EA Compliance Certification Review will be conducted by the Chief Architect who is responsible for certifying that Solution Architectures developed for information management System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 54 Updated: 1/10/07 ------- and technology development, modernization, and enhancement, are compliant with the Enterprise Architecture. The SIO or designee conducts the EA Compliance Certification Review and certifies architecture compliance for non-major and small or other systems. The Solution Architectures are certified as architecturally compliant prior to project development unless the appropriate wavier is obtained. Work Products All work products required during the SLCM Acquisition and Design Subphases must be complete, approved, and verified during the Control Gate 2 review. In addition, s Solution Architecture which describes how an individual information management system or information acquisition complies with the requirements of the Target Architecture must be presented. Gate 3 - Authorization to Operate Review Purpose For general support systems and major applications, the Authorization to Operate Review is to ensure that the system is ready to move into an operational state. Scope The details of what is required for this Gate depends on whether the information system is subject to FISMA as a general support system, major application, or whether it is considered a minor application residing on a general support system. The Authorization to Operate Review is conducted by the Information Management Officer (IMO) who uses the certification package to make a determination as to the appropriateness of allowing the system to function. The system must be accredited for operations prior to the system being moved into an operational state. The IMO can provide full authorization to operate or denial of authorization to operate. Minor applications generally have their security proved as part of the general support system; therefore each general support system will have application deployment requirements to ensure integrity of their security and consideration in their maintenance scheme. Work Products All work products required during the SLCM Development and Test Subphases must be complete, approved, and verified during the Control Gate 3 review. In addition, a certification package including system security plan, security assessment report (risk assessment and system test and evaluation), and Plan of Action and Milestones (POA&M) must be presented. Gate 4 - Modify or Terminate Review Purpose The purpose of the Modify or Terminate Review is to determine if the IT Investment should continue, be modified or terminated. Scope The Modify or Terminate Review will be coordinated by OEI, who ensures the IT Investment Business Case is accurate and complete. The package is then forwarded to the QIC, who relies on the IIS to provide a through Business Case review in accordance with the Agency's CPIC System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 5 5 Updated: 1/10/07 ------- Evaluation Phase criteria, determining if it can optimally continue to support mission/user requirements and the Agency's strategic direction. The IIS develops recommendations for the QIC to make a decision on whether to keep this investment as part of the Agency's IT Investment Portfolio as is, modify or terminate the investment. Work Products All work products required during the SLCM Implementation and Operations & Maintenance Phases must be complete, approved, and verified during the Control Gate 4 review. These products include but are not limited to: • Updated Business Case • Post-Implementation Review (PIR) Results • Operational Analysis Report System Life Cycle Management Guidance - DRAFT - Not for Distribution Page 56 Updated: 1/10/07 ------- Supporting Document Checklist for System Life Cycle Management The following matrix lists potential work products generated during the system life cycle. Work products in bold must be included for every system and serve as the basis for control gate reviews. Senior managers must ensure that these work products are properly in place and approved to manage a system through the life cycle phases. Although products are listed in sequential order, it is not the intent of this checklist to mandate that all systems follow a sequential (waterfall) methodology for system development. SLC Phase Definition Work Products System Categorization Initiation Decision Paper Concept Proposal Change Impact Assessment/Change Directive IT Project Request Project Plan Security Risk Assessment Change Tracking Log Si /stem Management Plan Mission Need Statement Solution Architecture Security Plan IT Investment Business Case Business Justification System Concept Document Cost-Benefit Analysis Schedule/Responsibilities Project Risk Management Plan Functional Requirements Document Project Quality Assurance Plan Configuration Management Plan Approvals (Decision Papers) Waivers Work Breakdown Structure Application Deployment Checklist Privacy Impact Assessment Feasibility Study Acquisition Strategy Records Management Disposition Schedule Concept of Operations Requirements Specifications (Hardware and Software) System Engineering Management Plan Test and Evaluation Master Plan (Baseline) Acquisition/Development Development Decision Paper Acquisition Package System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 57 ------- SLC Phase Implementation Work Products System and Software Design Documents Requirements Traceability Matrix Data Conversion Plan User/System Documentation System Implementation Plan User Training Plan Contingency Plan/COOP System and Security Test Plan Software Development Document Test Files/Data Integration Document Test Analysis and Test Problem Report System (Application) Software Test Analysis Approval Determination Certifier's Statement Implementation Decision Paper Authorization to Operate Security Accreditation Package Delivered System & Modified Software Change Implementation Notice Version Description Document Post Implementation Review Report Operations & Maintenance Retirement Re-Authorization to Operate Security Configuration Management and Control In Process Review User Satisfaction Review Retirement Decision Paper Archive/Incorporate Data and Software System Disposition Report Retirement Plan Post Retirement Review Report [Security] Information Preservation/Media Sanitation Close-Out Certification Deactivation Plan [Security] Hardware and Software Disposal System Life Cycle Management Guidance - DRAFT - Not for Distribution Updated: 1/10/07 Page 58 ------- |