Presentation is loading. Please wait.

Presentation is loading. Please wait.

Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com.

Similar presentations


Presentation on theme: "Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com."— Presentation transcript:

1 Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com IS Rating Tool Training By Pierre Bonnet - 2010, June Creative Commons www.sustainableitarchitecture.com This material provides you with a course to learn the key concepts of the IS Rating Tool This material is freely available on http://www.sustainableitarchitecture.com You can use this document for your own needs and publications under the condition to quote the source “Sustainable IT Architecture” This document is protected by a Creative Commons

2 2 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Agenda 1. Introduction in relation to IS/IT changes 2. Terms and definitions 3. The IS/IT foundation to enforce a progressive reshaping 4. Rules of thumb 5. Data Assessment part 6. Rules Assessment part 7. Processes Assessment part Note: You can download freely the IS Rating Tool (spreadsheets open office) via our web site http://www.sustainableitarchitecture.com

3 3 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 1. Introduction in relation to IS/IT changes

4 4 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 At the inception of IT: 1960-2000 ISIT relies on supports No real overlap between IS and IT systems Systems were pretty easy to understand and manage Systems were rigid because of the gap between IS and IT

5 5 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Current position of IT: 2000-2010 IT What target? A world where no work without a PC IT systems are everywhere Too many overlaps between IS and IT systems IT systems are opaque, rigid and hard-coded which generate significant difficulties to distinguish IS from its IT systems This situation is a blind alley IS

6 6 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Near future of IT: Today -> IT systems rely on a new foundation to carry out IS Assets based on Ref/Master Data (MDM), Business Rules (BRMS) and Processes (BPM) IS/IT alignment is achieved following a natural path as IT systems are no longer opaque and hard-coded but implemented within business repositories (MDM, BRMS, BPM) IS + IT MDM BRMS BPM Real IS Governance

7 7 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 In short 1960-2000 2000-2010 Today

8 8 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 BOOM in the data management field Black box 1960-2000 => under control Don’t worry… be happy!

9 9 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 BOOM in the data management field Black box 1960-2000 => under control2000-2010 => a nightmare What a mess!

10 10 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 BOOM in the data management field Black box 1960-2000 => under control2000-2010 => a nightmare After 2010 => BOOM in the data management field Internet of Objects Cloud Computing Rising of IS/IT growth RFID object Collapse!

11 11 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 A new IS/IT charter is necessary Company’s stakeholders Shareholders Executive Management Auditors Governments Employees Clients Suppliers Partners IT Internal zone MDM BRMS BPM IS Governance IT black-boxIS Assets This is the sole approach to enforce traceability and auditability of Information (Data, Rules, Processes) The holistic use of MDM, BRMS and BPM provide stakeholders with a high level of confidence in their Information System Reporting Risks management Facing the boom in data management including the Internet of objects (RFID, intelligent sensors, water meter…)

12 12 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 2. Terms and definitions

13 13 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Which terms do we use? IS Assets Linking value Enterprise Architecture IS Value (use value, business value, intrinsic value) Performance level and rating

14 14 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Assets: what we own, not what we do Tangible assets physical existence ------ machines tools real estates cash hardware../.. Intangible assets no physical existence ------ brands Intellectual properties patents knowledge – working procedures HR - Organizations Customer relationships - Partners Software (ERP, Legacy, SOA…) Information System Ref/Master Data Business Rules Processes IS Assets Assets Accounting, Chart of accounts Innovative accounting approaches like IAS/IFRS and assets classifications such as Edvinsson & Malone, ARC IC reporting, The Danish Guidelines, Meritum, IC- Rating, Wissensbilanz, the METI model, the IC-dVAL method, etc.

15 15 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Value 1 Linking Value Creation of additional added-value stemming from a mix of several resources Value 2 Example The linking-value of Data + Rules Data Data validation rules Rules execution Rules

16 16 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Enterprise Architecture: state-of-art Wikipedia: “An enterprise architecture (EA) is a rigorous description of the structure of an enterprise, its decomposition into subsystems, the relationships between the subsystems, the relationships with the external environment, the terminology to use, and the guiding principles for the design and evolution of an enterprise. This description is comprehensive, including enterprise goals, business functions, business process, roles, organizational structures, business information, software applications and computer systems.” Business Information Application Technology standard four layers in EA To get more information see: Zachman (1987), Togaf, Dodaf, Modaf, Agate, FEA, NIH, the enterprise framework, etc. strategy, business rules, business processes, organizations, functional decomposition, etc. Information flow within organization, data models, etc. applications software, interfaces, etc. IT infrastructure, databases, programming languages, EAI, etc.

17 17 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Enterprise Architecture: pitfalls Pitfalls of Enterprise Architecture Frameworks when there is a misunderstanding EA Frameworks don’t guarantee a good or bad final IS/IT Architecture Zachman is just a taxonomy of concepts and models TOGAF is architecture agnostic Therefore you need an IS/IT Architecture target It means A VISION TO RESHAPE YOUR IS/IT To describe your vision you must take into account your real IS Assets

18 18 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Enterprise Architecture: our contribution Enterprise Architecture and IS Assets Data Rules Processes Intrinsic value Business value Use value Quality of: the Knowledge, the governance functions and the IT Integration Business goals, alignment business/IT, IS accounting Working procedures, how people work together Regardless of any EA framework, every IS/IT relies on Data, Rules and Processes and their linking value Regardless of any EA Framework, every IS/IT is measured through its intrinsic value (IS Assets), business value (alignment and ROI), and use value (working procedures) FIRST TRUTHSECOND TRUTH IS Assets value Architecture viewpoint IS Assets viewpoint

19 19 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Value Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes Intrinsic Value IS Rating Tool

20 20 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Value Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes Intrinsic Value The Use Value of IS deals with an assessment of company’s working procedures used by IS stakeholders to communicate, build, maintain and run their Information Systems. When Use Value is studied, specialists in charge of the assessment admit that the IS value is related mainly to its mode of use not to its intrinsic value Use Value ISO900x, CobiT, CMMI, PRINCE2, TOGAF, ITIL, etc. IS Rating Tool

21 21 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Value Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes Intrinsic Value The Use Value of IS deals with an assessment of company’s working procedures used by IS stakeholders to communicate, build, maintain and run their Information Systems. When Use Value is studied, specialists in charge of the assessment admit that the IS value is related mainly to its mode of use not to its intrinsic value Use Value Regardless of working procedures, the Business Value of IS tackles the Information Systems quality to align them with business strategy and operational requirements. One significant aspect is the responsiveness, in other words the IS ability to react quickly to change. The Business Value also encompasses the computation of market values, including financial measurement Business Value ISO900x, CobiT, CMMI, PRINCE2, TOGAF, ITIL, etc. IAS-IFRS, financial method to compute ROI IS Rating Tool

22 22 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Value: holistic point of view Intrinsic Value Use Value Business Value Analysis Bad Worst situation => no real value within such a company GoodBad Strange situation => where IS assets are good even though bad working procedures are used (use value). By the way, as the business value is bad either IS assets should be sold to another company, either the company should change its strategic business commitments Good Bad Strange situation => where IS assets and working procedures are good whereas business value is not important. This is a similar situation with the previous one GoodBadGood Strange situation => where IS assets are good even though bad working procedures are used (use value). Fortunately, the business value is good. The question raised should be: can these bad working procedures damage IS assets over time? BadGood Suspect situation => because good outcomes in use value and business value hide a deeper weakness in IS assets (intrinsic value). This good situation in use and business values is unsustainable as the IS assets still remain bad Bad Good Strange situation => where business value seems good even though bad working procedures are used (use value) and IS assets are weak (intrinsic value) BadGoodBad Trap situation => where working procedures (use value) are good but IS assets (intrinsic value) and business value still remain bad. In reality, this company has a poor value and the bad quality of its IS assets will generate serious problems soon Good Ideal situation => where all values are aligned

23 23 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Performance level and rating Before establishing a financial assessment of IS Assets it is necessary to measure their performance level i.e. their quality Data Rules Processes Performance level Rating Financial assessment Rating IS/IT point of viewAccounting point of view

24 24 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 3. The IS/IT foundation to enforce a progressive reshaping

25 25 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 What goals do we have? Transparency Allowing a better understanding of IS Assets by all company’s stakeholders Auditability Guaranteeing a full and detailed auditability of IS Assets used in the past, present and future (version management) Mastering the complexity Keeping a stable level of IS/IT complexity regardless of the business changes and growth Agility Allowing rapid and secure changes in data, business rules and processes

26 26 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Key principles to achieve the goals The more the IS/IT is hard-coded the more the transparency is bad Duplication of data in rigid and scattered databases Spreadsheets effects Programming languages used by IT specialists (Cobol, Java…) Lack of up-to-date documentation

27 27 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Key principles to achieve the goals The more the IS/IT is opaque the more the auditability is bad The more the IS/IT is hard-coded the more the transparency is bad Duplication of data in rigid and scattered databases Spreadsheets effects Programming languages used by IT specialists (Cobol, Java…) Lack of up-to-date documentation IT audit trails available to IT specialists mainly Tunnel effect when using IT programming languages (Cobol, Java…) Lack of traceability between data, business rules and processes

28 28 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Key principles to achieve the goals The more the IS/IT is opaque the more the auditability is bad The more the IS/IT is hard-coded the more the transparency is bad Duplication of data in rigid and scattered databases Spreadsheets effects Programming languages used by IT specialists (Cobol, Java…) Lack of up-to-date documentation IT audit trails available to IT specialists mainly Tunnel effect when using IT programming languages (Cobol, Java…) Lack of traceability between data, business rules and processes Reshaping the whole existing IS/IT in one step is impossible A natural path to reshape IS/IT must be enforced with an iterative lifecycle implementation: first ref/master data, second business rules and then business processes

29 29 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Step 1 – Regaining the data control The MDM approach is deployed with no impact on what already exists, without modifying the data repositories which are already in place in any historical databases

30 30 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Step 2 – Regaining the rules control Business Rules Management System (BRMS) approach is established to get certain business logics out of the existing hard-coded software and have them translated into a rules language before being placed in the rules repository

31 31 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Step 3 – Regaining the processes control New developments benefit from the ref/master data and business rules that have already been capitalized. At this stage, Business Process Management (BPM) enters into play The circle is thus closed: the processes, the business rules and the ref/master data are under control. A new IT system is born: an open IT system for business, more open to evolution and more sustainable

32 32 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Applied to software packages If the MDM were locked within the Software Package scope, then it would mean risks of maintaining or reinforcing the silo effect This is the same concern with BRMS and BPM

33 33 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Business triggers to start and lifecycle which ref/master data?MDM BRMS Requirements Implementation 1 which business rules? 2 3 Case 1 Business Trigger: ref/master data rationalization which data validation rules? In this project lifecycle, the company needs to regain the control of its ref/master data first When needed, data validation rules are implemented within the BRMS to guarantee a full transparency and auditability of the data management

34 34 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Business triggers to start and lifecycle which processes? which business rules? which ref/master data?MDM BRMS BPM Requirements Implementation 1 2 3 4 5 which ref/master data?MDM BRMS Requirements Implementation 1 which business rules? 2 3 Case 1 Business Trigger: ref/master data rationalization Case 2 Business Trigger: processes/rules rationalization which data validation rules? In this project lifecycle, the company needs to regain the control of its ref/master data first When needed, data validation rules are implemented within the BRMS to guarantee a full transparency and auditability of the data management In this project lifecycle, the company needs to regain the control of its processes To achieve this goal, business rules used by these processes are identified and then ref/master data which are consumed (data scope) The implementation lifecycle starts with the MDM applied to the required data scope, following by the BRMS and then the BPM

35 35 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Lifecycle: top down + bottom up Enterprise Data Architecture Business Objects Domains of business objects Data Category Enterprise Rules Architecture Rules classification Rules naming Enterprise Processes Architecture Processes classification Processes naming Enterprise Architecture Top Down Bottom Up

36 36 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 4. Rules of thumb

37 37 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Rules of thumb We want to measure the Intrinsic Value of IS It is based on real IS Assets, it means data, rules and processes Data Ref/master (shared data) Transaction Decisional Flow Rules business rules organization rules security policies Processes workflows uses cases ApplicationsServices portfolioIT infrastructure Software packagesNetworks../.. Out of the scope of IS Assets because they all rely on Data, Rules and Processes

38 38 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Rules of thumb Linking value We take into account the linking value between MDM+BRMS+BPM

39 39 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Rules of thumb Linking value We take into account the linking value between MDM+BRMS+BPM We focus on the IS Intrinsic Value only IS Intrinsic Value What we own IS Use Value What we do IS Business Value What we win IS Rating ToolCobiT, ITIL ISOxxxx, etc. Financial assessment, IAS-IFRS, etc.

40 40 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 3 domains of assessment How data, rules and processes are documented? What are the modeling procedures used? Knowledge management “You own a data model… but is it a low- level description or a semantic model?” Quick illustrations Quick example in the next slides

41 41 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 This is not a semantic data model Lack of referential integrity constraints No business lifecycle, i.e. no state attribute whereas this is an important ref/master data attribute Very poor expressivity as this data model is a flat point of view (data flows) Figure from OASIS

42 42 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Semantic modeling – Address stage 1

43 43 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Semantic modeling – Address stage 2

44 44 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Semantic modeling – Address stage 3 Business lifecycle (state machine)

45 45 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Decision table applied to Address Carried out by the MDM automatically when checking data modifications of Address. It means less approach of hard-coding software and more auditability and traceability of integrity constraints applied to ref/master data MDM Stored into the MDM

46 46 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 3 domains of assessment How data, rules and processes are documented? What are the modeling procedures used? Knowledge management What are governance features available to users to manage their IS Assets (data, rules, processes)? Governance features This part doesn’t deal with the quality of the organization but the quality of the governance features like: version management, permission management, authoring, etc. “Do you manage you ref/master data with spreadsheets or with a more robust solution bringing real governance features?” Quick illustrations “You own a data model… but is it a low- level description or a semantic model?”

47 47 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 3 domains of assessment How data, rules and processes are documented? What are the modeling procedures used? Knowledge management What are governance features available to users to manage their IS Assets (data, rules, processes)? Governance features This part doesn’t deal with the quality of the organization but the quality of the governance features like: version management, permission management, authoring, etc. How data, rules and processes are implemented? Are they based on MDM, BRMS and BPM? IT management “Do you manage you ref/master data with spreadsheets or with a more robust solution bringing real governance features?” “Are your IS Assets hard-coded or managed through business repositories such as MDM, BRMS and BPM?” Quick illustrations “You own a data model… but is it a low- level description or a semantic model?”

48 48 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 3 domains x 3 types of IS Assets This is the IS “Rating Tool matrix” It provides nine points of assessments Every case of this matrix holds a set of questions to conduct the rating Enterprise Architecture is employed at the level of the knowledge management MDM, BRMS and BPM tools are employed at the level of the IT infrastructure

49 49 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Set of questions for every case About 100 questions to cover the whole matrix Each answer is ranked with help from 5 levels low basic medium advanced optimized Therefore about 500 points of measure

50 50 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Letter #1Letter #2Letter #3 At the highest level of the consolidation Each letter gives a consolidated rank (performance level) for Data, Business Rules and Processes

51 51 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Rating example – 1/4 This company has a huge risk in Data management (C) and Rules management (C). Its ability to well manage its Processes (B) doesn’t prevent this company from facing a serious IS crisis because of a data and/or business rules loss of control. More precisely, according to its detailed IS rating outcomes, we have to study why its data knowledge is so poor (only 5% = D)? From this first rating, the company’s stakeholders should demand detailed information describing the IS plan to manage data and rules risks. Once this plan will be delivered, a further IS rating will be done to gauge the IS improvement. May be, this company could decide to raise its data consolidated mark to the "B" level within a year and then attain a "BCB" rating which would be reassuring for its stakeholders. Then, after a full year of work on data knowledge improvement, the company’s rating goes up to "BCB” (see the next rating card).

52 52 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Rating example – 2/4 On the basis of this new rating, the company has a huge interest in improving its business rules management to reach a ‘B’ level rather than a poor ‘C’. The key factor to succeed seems to deploy a stronger approach in rules governance, as shown in its detailed IS rating outcomes (21% = C). After delivering works on rules management, this company achieves this objective and attains a new rating "BBB" (see the next rating card).

53 53 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Rating example – 3/4 "BBB" is an excellent rating, very reassuring for all IS stakeholders. By analyzing its detailed percentage levels per IS assets (see its detailed IS rating outcomes) additional improvements can be identified to target the "AAA" level. Don't forget, the rating can be established both at the scale of the whole IS but also within a smaller scope such as a subsystem, a software package, a subsidiary, a web application, etc.

54 54 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 IS Rating example – 4/4 A progressive path to leverage your IS Intrinsic Value and drive your Enterprise Architecture

55 55 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 When using the IS Rating Tool Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc. When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets To complement with accounting operations and financial assessments such as IAS-IFRS Audit

56 56 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 When using the IS Rating Tool Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc. When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets To complement with accounting operations and financial assessments such as IAS-IFRS Audit Between IT Department and IS stakeholders To contribute to an annual IS assessment Communication

57 57 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 When using the IS Rating Tool Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc. When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets To complement with accounting operations and financial assessments such as IAS-IFRS Audit Between IT Department and IS stakeholders To contribute to an annual IS assessment Communication Bench-learning between teams, partners, companies, etc. As a requirement appended to RFP/RFQ to help selecting contractors Management

58 58 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 5. Data Assessment part

59 59 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge Check-list

60 60 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-01 Enterprise Data Architecture Enterprise Data Architecture enforces a politics encouraging a unified data modeling and data knowledge management at the whole scale of the system rather than siloed data modeling and implementations only It means that Enterprise Data Architecture is aimed at deploying knowledge management applied to data, at least towards main business objects reused within business rules and processes Working procedures and organizational issues are out of the scope of the IS Rating Tool. Indeed, this tool is focus on Intrinsic Value of IS. Other organizational issues should be tackled through frameworks and methods such as CobiT, CMMI, etc.

61 61 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-01 Enterprise Data Architecture Ref/Master Data Transaction Data Data flow Decisional data DT-KN-01-1. Ref/Master data Can be established without being intrusive to existing data models and databases. Quick ROI thanks to MDM and Data Governance DT-KN-01-2. Transactional data This level of data architecture is more complicated to attain than ref/master data. Indeed, spending time to redesign existing transactional data models to reduce their duplications and defects could be difficult to justify without IS restructuring DT-KN-01-3. Decisional data Most of the time, this data level relies on an Operational Data Store (ODS). The ODS uses a data model stemming from a consolidated view of transactional data and ref/master data models DT-KN-01-4. Data flow The purpose of EA applied to data flow is to reuse ref/master, transactional and decisional data models within ETL/EAI/ESB directly DT-KN-01-5 Unified Data Architecture All types of data (ref/master, transactional, decisional and data flow) share a unified Enterprise Data Architecture relying on common concepts such as Business Objects gathered through Domains of Business Objects

62 62 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-01 Enterprise Data Architecture DT-KN-01-1. Ref/Master dataDT-KN-01-2. Transactional data

63 63 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-01 Enterprise Data Architecture DT-KN-01-3. Decisional dataDT-KN-01-4. Data flow

64 64 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-01 Enterprise Data Architecture DT-KN-01-5. Unified data architecture All types of data complement each other, which means that ref/master, transactional, decisional and data flow live together and share the same business objects. For example, the Business Object "Product" holds both ref/master data (its description) and transactional data (e.g. its quantity). It is also reused when conveying data product at the level of the integration layer and reused when statistics are computed by the datawarehouse. To succeed in deploying a Unified Data Architecture, dedicated and suitable modeling procedures must be used. These procedures are aimed at defining and sharing key concepts such as Business Objects, Domains of Business Objects and Data Category (as described in UML by Grady Booch to define business topics). To get further information about these modeling procedures we invite you to visit the MDM Alliance Group (MAG). The MAG delivers modeling procedures supporting a complete Unified Data Architecture foundation (www.mdmalliancegroup.com)www.mdmalliancegroup.com

65 65 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge How to assess unstructured data? Even thought the IS Rating Tool is focus on structured data first, you can take into consideration unstructured data as supplemental information added to business objects. It means that no information should exist outside business objects boundaries How to assess meta data? Meta-data are gauged when assessing ref/master data. Let's take an example in the field of Service Oriented Architecture. A repository describing relationships between providers and consumers must be established. There are a lot of meta-data defining services and stakeholders, including service level agreements and security policies. With help from a good data model, all meta-data structures are well-defined and then implemented to the MDM. Therefore, meta-data values are managed as usual ref/master data. It means that if you attain a good mark about the 'DT-KN-01-1 Reference and Master Data' then you should be able to manage all meta-data in a right way

66 66 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-02 Basic data modeling DT-KN-02-1. Business Dictionary One or several business dictionaries are used to gather key business concepts with definitions of terms, taxonomy, synonyms, etc. The business dictionary should be connected with data models. In other words, documentation of data models (class, attributes...) should be retrieved from the business dictionary directly. Then, if you have a shared business dictionary without linking it to data models then your mark should be 'medium' or 'advanced' only because of the lack of connection with data models. Conversely, the more your business dictionary is shared at the whole scale of the company and reused within your data models the more your mark is raised and should be 'optimized'.

67 67 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-02 Basic data modeling DT-KN-02-2. Business point of view Business data models are available and maintained regardless of physical implementations and databases schemas Business data models describe information regardless of IT issues. All business objects should be fully described including all their relationships. Indeed, the more relationships between business objects are described the more valuable data models are. To enforce a sustainable data knowledge, a formal and shared notation should be used such as UML or other DSL depending on the company's culture. The more these business models are shared, known and readable by all IS stakeholders the more your mark should be raised.

68 68 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-02 Basic data modeling DT-KN-02-3. Logical point of view Logical data models are derived from business data models. They establish the logical point of view of the data architecture Logical data models rely on IT database architecture styles such as relational oriented approach, object oriented object, hierarchical oriented approach or a mix of the three. These data models are independent of physical databases schemas. Logical data models are established by using derivation rules from business data models. In other words, these models should be the result of a translation of business data models into logical terms. They are represented with help from a formal notation, such as UML or other DSL. They rely on formal and shared logical naming rules. These data models are not meaningful for business users.

69 69 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-03 Semantic data modeling DT-KN-03-1. Business Objects’ lifecycles The real semantic of data is revealed through business objects' lifecycles. Indeed, modeling behaviors of business objects allows for establishing rich, reliable and sustainable data models. Without this approach, data models remain static and cannot express the richness of information. Beyond the data modeling procedures, this question copes with the mechanism used to really manage business objects' lifecycles as a real IS Asset, which means using the MDM to manage business objects' states values as master data. Your mark about the Basic Data Modeling should be 'medium' at least before starting the Semantic Data Modeling Example: Address’ lifecycle

70 70 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-03 Semantic data modeling DT-KN-03-2. Relationships between Business Objects The semantic of a data is revealed through relationships between business objects. These relationships must be managed as a real IS asset rather than poor cardinalities frozen when establishing data models. These cardinalities become real assets when managing them as master data. Beyond the data modeling procedures, this question copes with the mechanism used to really manage cardinalities as a real IS asset, which means using the MDM to manage data cardinality as master data. Cardinality links (minOccurs, maxOccurs) are managed as master data to ensure a better agility of data models depending on use contexts (head office, subsidiary, partner, country, language, classification, etc.)

71 71 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-03 Semantic data modeling DT-KN-03-3. Business rules applied to data When a data element is updated a rules set can be executed to check its integrity. These rules are a part of the Semantic Data Modeling. It is important to keep in mind that this question copes with business rules applied to data elements only, not other business rules spanning a large data scope or organizational rules required to conduct processes. Business rules applied to data should be gathered through a repository of rules, such as a BRMS (see also Rules Assessment part). With help from this repository, business IS Stakeholders are able to author rules or at least consult them. It is easier to manage their versions and execute them to test the system. Moreover, a link between data models and the rules repository is then established. Business rules applied to data should be collected as follows: rules independent of business objects' states, rules having pre- or post-conditions relying on business objects' states, rules updating business objects' states. This approach means that designing business rules within Enterprise Data Architecture is achieved by taking into consideration business objects' lifecycles.

72 72 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-04 Ability to act This part is aimed at assessing the ability to establish a sustainable funding for Enterprise Data Architecture and the ability to estimate the replacement value of data models The ability to act doesn't cope with the maturity of organizations to deliver an effective Enterprise Data Architecture. Indeed, the IS Rating Tool tackles the IS Intrinsic Value only which means that organization issues are not measured here. Therefore, you should use complementary tools such as CobiT and CMMi to assess maturity levels of organizations

73 73 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-04 Ability to act DT-KN-04-1. Funding A budget is established to support the Enterprise Data Architecture. The decision to raise a funding is dependent on the ROI. Spending time to rebuild data models and improve data documentations is not sufficient to guarantee a real ROI. This is the reason why data models should be reused to set up added-value data governance features to IS Stakeholders. Using a MDM is valuable to transform data models into ROI since real data governance features are brought by the MDM (see DT-GV section. However, this approach is dedicated to ref/master data only. Regarding transactional data, it is less easy to raise funds as the question is: what will we do with new transactional data models if we cannot restructure existing transactional systems? Here, MDM is not usable and data governance features are not really required. This is the reason why the marks 'Medium' and 'Advanced' are reached whereas ref/master data funding is enforced only.

74 74 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Knowledge DT-KN-04 Ability to act DT-KN-04-2. Replacement value Ability of your organization to (re)design data models from scratch (blank page). The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When data documentations are up-to-date and teams have a good command of data modeling procedures then your score is high. Conversely, when it is difficult to gather data knowledge because of poor documentations and/or lack of specialists in data modeling, then your score should be decreased.

75 75 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features

76 76 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features Data governance features are the business functions used by IS Stakeholders to manage ref/master data. This is a list of business features brought by the MDM, such as data version management, authoring of data, querying, etc. The way of these functions are used through processes and organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of data governance features, not the quality or maturity levels of organizations to use them Amongst these features, a detailed assessment is required to measure the ref/master data version management function. A focus on data quality is also integrated to measure how data governance should improve data quality processes

77 77 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features Check-list

78 78 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-01 Reference and Master Data DT-GV-01-1. Unified ref/master data governance features Ref/master data benefit from unified and shared governance functions used by all IS Stakeholders, not only by IT specialists All reference and master data are managed through unified and shared governance functions such as: collaborative authoring data, version management, traceability of data, right management, query, data approval workflow, etc. These functions are applied to any type of ref/master from simple enumerations data to complex data structures such as product configuration, chart of accounts, structure and organization, pricing configuration, customer information, parameters of business regulations, etc. From an IT point of view, data governance functions are brought by a MDM tool which is generic enough to manage all types of data. This is a Model-driven MDM (see also the part 'Mastering IT Approach to manage data')

79 79 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-01 Reference and Master Data DT-GV-01-2. Ref/master data version management Amongst data governance functions, the version management is a significant feature requiring a specific assessment The version management of ref/master data is vitally important to enforce a real data governance. It should be possible to create versions applied to any scope of data. A scope can be a data element or a set of business objects linked each other through their relationships. Every version is located to a branch. This mechanism allows for living together several versions of a same data scope located to different branches. For example, a first branch could exist for a production environment and a second branch could be applied to a data matching process. Therefore, a same data scope is both used in production and managed by a data quality process. After executing this process, the data governance allows to compare and merge data scope between its version within the production environment and its version within the data matching environment.

80 80 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-01 Reference and Master Data DT-GV-01-3. Active data quality Ref/master data quality is an acute issue because of heterogeneous existing databases and data duplications. However, when having real data governance functions as seen in DT-GV-01-1 and -2, it becomes easier to tackle this problem in an efficient way. Data Quality Tool 1/2

81 81 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-01 Reference and Master Data DT-GV-01-3. Active data quality (next) The data cleansing process is established by benefiting from the data governance functions brought by the MDM. It means that rather than clean data within data databases with poor data structures, an active data quality process is achieved by using the MDM data model. For example, when adding a new address to the system, its validity is checked by the MDM holding the shared data model about Geography business concepts. This address is validated both in terms of its data structure, its integrity rules and potential duplications. Once the data quality is checked through the data model and its integrity rules, then the address can be transformed if needed and pushed to target databases. During this active data quality process, the new address is stored within a dedicated version and branch avoiding conflicts with current version. The compare and merge data governance functions brought by the MDM allow for deciding which version is the right one. If needed, the MDM can use some data quality functions brought by specialized data quality tools such as: relocation addresses, postal address check, product compliance, etc. 2/2

82 82 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-02 Transactional data DT-GV-02-1. Data governance applied to applications oriented data Data governance functions established for ref/master data can be reused to enforce an unified management of transactional data within applications oriented data. A lot of applications oriented data exist within information systems. These are either spreadsheets handling transactional data such as funding allocations, inventory measures... or light applications designed with help from Rapid Application Development tools (RAD) whose the foundation is the data model itself (e.g. Access). To enforce a full governance of these data without slowing down the delivery of light applications, it is helpful to use the Model-driven MDM and its data governance features rather than spreadsheets and RAD tools. Indeed, these data governance features are not provided by spreadsheets and RAD tools: collaborative data authoring, permission management, version management, querying data, tracking data, complete traceability and auditability, data approval workflows, etc.

83 83 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-03 Decisional data DT-GV-03-1. Data governance applied to datawarehouses Datawarehouses use ref/master data coming from operational systems but also defined within their own scopes. These latter should be managed by benefiting from data governance functions brought by the MDM. Datawrehouses should get ref/master data from the MDM repository gathering ref/master data synchronized with operational systems. Other ref/master data established within the scope of datawarehouses directly should be managed with help from data governance functions brought by the Model-driven MDM.

84 84 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-04 Data flow DT-GV-04-1. Data governance applied to data flow To give to business users an autonomy in their daily data flow management, data governance functions must be applied to data flow as well. Data flow are both internal data conveyed between systems and external data exchanged with third parties (B2B). Most of the time, these data flows gather a lot of data elements coming from scattered databases within the whole scale of the system. This means that controlling integrity rules between data is very complicated. To fix this problem, data flows should be stored within a Model-driven MDM holding a Common Information Model encompassing all integrity rules and bringing all data governance features useful to track and audit data flows.

85 85 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-05 Security information DT-GV-05-1. Data governance applied to security policies Every information system needs a lot of data defining security policies. The management of these data should also benefit from data governance functions All data defining security policies applied to data, rules and processes should be designed through semantic data models and enforced with help from a Model-driven MDM. In other words, these data should be considered as meta-data and then benefit from the data governance features brought by the Model-driven MDM. Following this approach, it is easier to set up shared and unified functions to manage security policies such as: permission management applied to security policies, collaborative data authoring, querying, data version management, etc.

86 86 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-06 Managing data as a real asset DT-GV-06-1. Data asset measurement Key indicators should be defined to follow data assets over time A lot of key indicators could be defined to follow data assets. You should distinguish key indicators applied to data models and those applied to data values. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to data assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system. Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However, the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only. Examples of key indicators: - all marks computed with help from the IS Rating Tool could provide a good first level of key indicators - other key indicators applied to data models: rate of data structures duplications, number of business objects, number of business objects' lifecycles, etc. - other key indicators applied to data values: rate of ref/master data misaligned with business regulations, number of version for every business object, rate of data modification by data domains, etc.

87 87 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-06 Managing data as a real asset DT-GV-06-2. Data asset overseeing Beyond key indicators applied to Data Assets (see DT-GV-05-1), Business Rules used to oversee some key data values should be established Overseeing ref/master data and data flow is targeted first as other transactional data should benefit from the supervision enforces by business transactions within applications. When ref/master data repository and data flow are managed with help from a Model-driven MDM, it is easier to set up business rules over the data repository to oversee data values in real time (see DT-GV-01-1 and DT-GV-03-1). For example, overseeing a customer's address could be very complicated when this address is duplicated within several databases without a real master repository. Conversely, when using a Model-driven MDM to manage customers' addresses in complement with existing databases, it is easier to set up business rules over the MDM repository, such as: when the customer's address is updated more than three times within a month then send a real-time alert to the sales department. Applied to a financial classification, such a rule could be: financial classification codes mustn't be updated more than X times within a certain period of time. If this rule is not fully enforced then a real-time alert is thrown to executive managers. To implement these rules as real IS Assets, it is recommended to use a BRMS (Business Rules Management System) and/or a CEP (Complex Event Processing) (see also Rules Assessment part of this IS Rating Tool).

88 88 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Data Governance features DT-GV-06 Managing data as a real asset DT-GV-06-3. Data asset tracking All data access should be tracked in order to enforce IS traceability. Ensuring the tracking of all access to ref/master data and data flow is targeted first as other transactional data should benefit from traceability mechanisms established within applications. When ref/master data repository and data flow are managed with help from a Model-driven MDM, a unified business audit trail should be available directly. This audit trail is used to keep track all data access stemming from actors and systems. Query features of the Model-driven MDM allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions.

89 89 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data

90 90 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data Check-list

91 91 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data DT-IT-01 Reference and Master Data repository DT-IT-01-1. Model-driven MDM To enforce agility and scalability of ref/master data repository, it is recommended to use a Model-driven MDM rather than a vertical MDM. A Model-driven MDM is able to manage any type of data, from basic enumerations data and parameters to complex data structures (Product configuration, Structure and Organization, Chart of Accounts, Customer Information, etc.). These data models take benefit from a rich representation of knowledge, which means they enforce all capabilities brought by the semantic data modeling, as described in DT-KN-03. Using a Model-driven MDM tool allows to generate user interface and services (CRUD) automatically. To achieve this goal, the MDM must combine relational oriented approach with object oriented and hierarchical approaches. It means that the MDM shouldn't rely on a relational approach only (RDBMS/OLTP with poor SQL data description language) but it should take benefit from relational, object and hierarchical data management approaches at the same time. In other words, it should bring ORM (Object Relational Mapping) features over usual RDBMS like Oracle, DB2, SQL-Server... with a rich data description language taking benefit from XML Schema.

92 92 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data DT-IT-02 Rules integration DT-IT-02-1. MDM with rules repository (BRMS) Rules used to enforce data integrity should be implemented through a business rules repository (BRMS) rather than an approach of hard-coding only. It means that all data governance features brought by the Model-driven MDM should be also available to manage business rules. To achieve this architecture, a generic IT interface should be established from the MDM to the BRMS. When rules are triggered by the MDM, it should send a data flow describing the context of execution without any information about rules to execute. It means that the connection from MDM to BRMS enforced the loose coupling architecture pattern. Therefore, when rules are updated there are no impacts to the MDM repository. Furthermore, it is easy to configure a new context of execution within the MDM and author new rules for this context with the BRMS. Thanks to the loose coupling pattern, this configuration can be enforced without any hard-coded software.

93 93 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data DT-IT-02 Rules integration DT-IT-02-2. MDM with events management (CEP) CEP (Complex Event Processing) is complementary to BRMS. It allows to enforce an active overseeing of data in real time. The BRMS waits for an invocation coming from the MDM, whereas the CEP listens to the MDM repository and executes rules depending on data behaviors. The added-value of this mechanism has been measured in DT-GV-05-02. From an IT point of view, the integration of CEP with MDM depends on the ability of the MDM to publish in real-time a full data log containing a detailed description of modifications applied to the repository.

94 94 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data DT-IT-03 Data Integration DT-IT-03-1. MDM integration with the rest of the system To streamline the MDM integration with the rest of the system, business objects' lifecycles should be used when throwing synchronization events through the integration layer (ETL, EAI, ESB). It means that when a data is updated within the MDM its synchronization with the rest of the system can depend on business objects' states. Then rather than throwing atomic events for every modification occurring within the MDM repository, higher events are used depending on business objects' states. This architecture helps to streamline and secure data integration. To succeed in business objects' lifecycles modeling, you should take into consideration the semantic modeling (DT-KN-03).

95 95 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage data DT-IT-03 Data Integration DT-IT-03-2. Data mapping To streamline the data mapping required when conveying data flow between systems, a pivot format should be established. If this pivot format is IT oriented only then it cannot be used as a real shared and common data model usable at the whole scale of the integration scope. In this situation, a lot of hard-coded developments are required to enrich the pivot format, which means an heavy IT development for every data mapping and troubles when updating existing ones. To fix this problem, semantic data models should be used as pivot formats to conduct data mapping. In other words, this is a model-driven approach applied to the data mapping. When deploying a semantic data modeling (see DT-KN-03) it is valuable to reuse data models as pivot formats. From an IT point of view, it is needed to use a semantic data integration tool able to manage rich data models designed with the semantic data modeling. Semantic data integration tool brings all mapping features needed but also a version management of mapping configurations and tests/debugs functions.

96 96 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 6. Rules Assessment part

97 97 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge Check-list

98 98 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture Enterprise Rules Architecture should be seen as a part of the Enterprise Architecture. Indeed, it tackles rules and complements with Data Enterprise Architecture (see the Data Assessment part) and with Process Enterprise Architecture (see the Processes Assessment part) The goals targeted by the Enterprise Rules Architecture are similar to ones established for Enterprise Data Architecture but applied to rules: full knowledge management of rules enforcing a politics encouraging a unified rules modeling at the whole scale of the system rather than siloed rules modeling and implementations only within opaque IT languages About the strategy formulation The rules management is a key topic as it allows to write down the company's business and organizational strategy. To achieve this goal in a right way, the strategy should be described by benefiting from Enterprise Data Architecture (Business objects and their lifecycles) and Enterprise Processes Architecture (Processes and uses cases). This is a key point to enforce a real alignment of the company's strategy with its data and processes definitions

99 99 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture Core Business Rules Organizational Rules Security Rules applied to BR-KN-01-2 Business strategy formulation The business strategy deals with all rules defining the core business of the company regardless of any organizational issues. Organizations rules can change frequently over time whereas business rules are more stable and represent the company's raison d‘être BR-KN-01-3 Organizational strategy formulation The organizational strategy deals with all rules defining how actors must/should act to deliver the business strategy in a cost-effective and optimum way BR-KN-01-4 Security policies formulation The securities policies gather all rules defining the permissions management applied to enforce the business strategy and the organizational strategy Enterprise Data Architecture – Business Objects Enterprise Processes Architecture – Processes, uses cases linked to BR-KN-01-1 Rules Classification The IS Rating Tool provides a first level of classification that should be seen as the minimum to ensure

100 100 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture BR-KN-01-1. Rules Classification At least you should have a classification relying on these three types of rules: Core business rules. These rules are independent of any organizational issue. Whatever working procedures or workflows enforced within the system, core business rules are identical, Organizational rules. These rules depend on organizational choices such as working procedures and workflows. When organizations change then organizational rules must be updated and/or extended, Security rules. These rules are dedicated to security issues. They can enforce security policies both at the core business level and the organizational level. Even though this classification could be enriched differently from one company to another, it should be the basis to enforce. Other types could be added such as: functional, calculation, IT, internal rules versus those related to business regulations, etc.

101 101 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture BR-KN-01-2. Business strategy formulation Business rules should be established by benefiting from the business objects modeling as described in the Enterprise Data Architecture (see Data Assessment part). It means that every business rule should be attached to a well-identified business object or a specific domain of business objects. The business objects' lifecycles allow to establish business rules updating states of business objects (see Data Assessment part). State machine (business object’s lifecycle) to discover business rules Business Object BR Business Object BR Classification scheme to manage business rules Business Object BR: Business Rules

102 102 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture BR-KN-01-3. Organizational strategy formulation Organizational rules should be established by benefiting from the modeling of processes and working procedures as described in the Enterprise Processes Architecture (see Processes Assessment part). It means that every organizational rules should be attached to well-identified processes or working procedures (uses cases). process (long- running transaction) use case (atomic transaction)

103 103 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-01 Enterprise Rules Architecture BR-KN-01-4. Security policies formulation Security policies should be distinguished from other types of rules such as business and organizational rules. By isolating these rules it becomes easier to oversee them and ensure specific control. Even though they are isolated, they should rely on the same description process as one used to establish business and organizational rules. It means that security policies should be attached to either business objects stemming from the Enterprise Data Architecture or processes and uses cases stemming from the Enterprise Processes Architecture.

104 104 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-1. Rules grammar A rules grammar should be used to author all types of rules as described in BR-KN-01-1: core business rules, organizational rules, security policies. Many languages can be used depending on the company's culture. It could be a specific grammar such as a functional pseudo-code, a standard approach such as SBVR (Semantics of Business Vocabulary and Rules) from OMG, but also a rules grammar stemming from a rules engine also known as a BRMS (Business Rules Management System). In any case, this grammar should be meaningful for all IS Stakeholders (not only IT specialists) and should be either IT runnable directly or translatable into runnable IT components. Example of business rules from OMG SBVR specification (January 2008)

105 105 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-2. Rules naming A unified rules naming should be enforced to support the knowledge sharing. It should follow the rules classification as defined in BR-KN-01-1 by enforcing code such as: COR (core business rules), ORG (organizational rules) and SEC (security policies). Moreover, this naming rules should not include any specific code stemming from projects as reuse must be encouraged. It means that the rules naming should be aligned with Enterprise Architecture's concepts such as domains of business objects, processes... as defined through the Enterprise Data Architecture and the Enterprise Processes Architecture.

106 106 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-3. Rules set and dependencies Rules can be linked to each other to meet business requirements. Therefore, it becomes necessary to define sets of rules and links between rules. In order to encourage readability and reusability of rules, it should be possible to define sets of rules. Moreover, links between rules and sets of rules should be available to establish complete executions flows of rules meeting requirements. Example of rules flow (Ilog) – Quote from “Sustainable IT Architecture” book, Wiley

107 107 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-4. Rules template Rules can be linked to each other to meet business requirements. Therefore, it becomes necessary to define sets of rules and links between rules. In order to encourage readability and reusability of rules, it should be possible to define sets of rules. Moreover, links between rules and sets of rules should be available to establish complete executions flows of rules meeting requirements. Business Object Rule Template predefined operators predefined values Rule authoring Subset of data

108 108 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-5. Reference and Master Data values applied to rules definitions When authoring rules, many reference and master data values are used. For example: types of clients, products hierarchy codes, marketing codes, pricing configurations, discounts values depending on countries, structures and organizations codes, functional and IT parameters, etc. All reference and master data values should be retrieved from a unified data repository ensuring a high quality of data. It means that the rules definitions are aligned with ref/master data values stemming from the MDM (Master Data management). To get more details about the MDM see the Data Assessment part. Rules repository Ref/master data repository Authoring rules uses data defined in the ref/master data repository (BRMS)(MDM)

109 109 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-02 Rules modeling BR-KN-02-6. Transactional data subsets Applied to rules Modeling procedures should exist to establish the default transactional data set on which a rule can be defined and executed. These data sets should be established with help from the Enterprise Data Architecture and the Enterprise Processes Architecture. For example, a rule applied to the business object Customer can use all data related to this business object's data structure. It means that rather than designing a specific data set for each rule, it is recommended to reuse data structures stemming from the Enterprise Architecture. In doing so, readability and maintainability of rules and data knowledge are reinforced. Enterprise Data Architecture Vocabulary, Information Architecture Enterprise Rules Architecture reuse

110 110 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-03 Rules enforcement BR-KN-03-1 Explicit demand versus event activation Most of the time, rules are executed through explicit demands submitted by human actors and IT systems. However, beyond this usual approach, rules should be also executed when events are thrown within the system, regardless of explicit demands. Using events to enforce rules is very powerful and complements with usual explicit execution mode. From an IT point of view, this approach requires a CEP tool (Complex Event Processing) which complements with the BRMS (Business Rules Management System). On each stock variation greater than 100 within the last 20 seconds then execute > Example of a rule executed only if well-identified events are validated (BRMS extended to CEP – Complex Events Processing)

111 111 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-04 Ability to act BR-KN-04-1 Funding The decision to raise a funding is dependent on the ROI. Spending time to establish a unified and shared rules classification and grammar is expensive. Therefore, the drivers to engage such a funding should be well-argued. At the very least, they include these four benefits: - better readability of rules which is a significant gain to ensure business-IT alignment and audit operations, - better reusability of rules which can be a real gain to streamline design and maintenance costs, - ability to set up a translation of rules into runnable IT components which is a right way to decrease IT costs and enforce the business-IT alignment, - reinforce the knowledge management applied to rules. It means a better command of the strategy formulation benefiting from a full and unified description, aligned with the Enterprise Data Architecture and the Enterprise Processes Architecture. When these benefits are not well-understood within the organization it becomes difficult to engage sustainable funds supporting the Enterprise Rules Architecture. It means that the knowledge management of rules is not viewed as a key factor to support the business and its formulation.

112 112 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Knowledge BR-KN-04 Ability to act BR-KN-04-2 Replacement Value Ability of your organization to (re)author rules from scratch (blank page). The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When rules documentations are up-to-date and teams have a good command of rules modeling procedures then your score is high. Conversely, when it is difficult to gather the knowledge of rules because of poor documentations and/or lack of specialists in rules authoring, then your score should be decreased.

113 113 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features

114 114 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features Check-list

115 115 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features Rules governance features are the business functions used by IS Stakeholders to manage rules. This is a list of business features brought by the BRMS, such as rules authoring, version management, auditability, etc. The way of these functions are used through processes execution and organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of rules governance features, not the quality or maturity levels of organizations to use them Amongst these features, a detailed assessment is required to measure the rules lifecycles and version management function

116 116 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-01 Rules governance BR-GV-01-1 Unified rules governance All rules are managed through unified and shared governance functions such as: authoring rules, version management, traceability of rules executions, rules history, rules tests, rights management, etc. These functions are applied to every type of rules: core business rules, organizational rules and security policies (see BR-KN-01-1). From an IT point of view, these business governance functions are brought by a BRMS (Business Rules Management System).

117 117 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-01 Rules governance BR-GV-01-2 Rules lifecycles and version management The lifecycle and version management of rules is vitally important to enforce a real rules governance. Two types of features are needed: - It should be possible to create versions of rules and compare versions, - it should be possible to manage stages of rules from their inceptions to their retirements. It means that at any time, it should be possible to reverse rules changes by benefiting from a full version history of rules authoring. Rules used data which should benefit from the version management brought by the MDM applied to ref/master data structures and values (see Data Assessment part). It means that every rule should have a context identifier defining in which version of data its execution is issued. In doing so, when the BRMS looks up the MDM to retrieve ref/master data values, it provides the context in which this request is issued, then the version. Rules repository Ref/master data repository Get data in a specified version and context (BRMS)(MDM) context: headquarter, subsidiary, territory, language, etc. version: working, production, training, regulatory, etc.

118 118 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-01 Rules governance BR-GV-01-3 Rules authoring A unified rules authoring function should be available for all IS Stakeholders and managed through a secured authentication. It means that authoring rules should not be dedicated to IT specialists only. According to the company's culture, key business users can be involved in authoring rules directly or prefer to delegate this work to IT teams. In any case, rules should rely on a business oriented grammar ensuring a full business understanding and formulation of rules (see also BR-KN-02-1 Rules grammar).

119 119 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-02 Managing Rules as a real Asset Rules are a real IS Asset changing over time. They allow to formalize the business strategy, the organization strategy and the security policies (see BR-KN-01-2, 3 and 4). It is significant valuable to measure trends rather than occasional performances only. It means that key indicators should be defined and measured over time Moreover, it is valuable to set up rules overseeing rules. This approach allows to throw alerts in real time when needed As a real IS Asset, all rules executions should be tracked through a unified business audit trail

120 120 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-02 Managing Rules as a real Asset BR-GV-02-1 Rules Asset measurement Key indicators should be defined to follow rules assets over time. A lot of key indicators could be defined to follow rules assets. You should distinguish key indicators applied to rules executions and those applied to rules definitions. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to rules assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system. Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only. Example of key indicators: - number of rules related to a business regulation, number of rules modifications within a period of time, number of rules executions within a period of time, rules not used within a period of time, rules used the greatest number of time during a period, ratio of business rules compared to organizational rules per business unit within the company, all measures brought by the IS Rating Tool, etc. Rules repository Definition Execution IS/IT Scorecard Enterprise Scorecard Other assets/indicators

121 121 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-02 Managing Rules as a real Asset BR-GV-02-2 Rules Asset overseeing Beyond key indicators applied to rules assets (see BR-GV-02-1), rules overseeing some key business and organizational rules and security policies should be also established. When rules are managed through a rules repository such as a BRMS, it becomes easier to add alerts to oversee them. These alerts can check the outcomes of rules executions but also can react depending on thresholds applied to key performance indicators (see BR-GV-02-1). Alerts are defined as rules and benefit from the rules management system. For example: - outcomes of a rule must be conformed to min/max values constraints. It means that all post-conditions applied to rules could be considered as rules overseeing, - maximum number of a rule execution within a period of time, - etc. Rules repository Definition Execution Rules overseeing Alerts/ Indicators

122 122 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Rules Governance features BR-GV-02 Managing Rules as a real Asset BR-GV-02-3 Rules Asset tracking All rules executions should be tracked in order to enforce IS traceability. When a rules repository is enforced by a BRMS, then a unified business audit trail should be available directly. This audit trail is used to keep track all rules executions. Query functions allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions.

123 123 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules

124 124 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules Check-list

125 125 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules All rules descriptions ensured with help from the Enterprise Rules Architecture (see BR-KN) and managed through rules governance functions (see BR-GV) shouldn't be diluted through an heavy and rigid hard-coded development only It means that to ensure a good Business-IT alignment, a rules engine should be used. When it is enriched with rules governance features, as discussed in BR-GV, it becomes a Business Rules Management System (BRMS)

126 126 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-01 Rules engine versus hard-coding BR-IT-01-1 BRMS applied to existing systems To leverage existing systems without overhauling them, it is recommended to extract key hard-coded rules to rewrite them with help from the BRMS. Modeling and implementation procedures should exist to enforce a progressive extracting of existing hard-coded rules for the benefit of the rules engine. In doing so, the readability, agility and ability to audit the system is really improved. When combining this approach with an efficient Enterprise Rules Architecture (see BR-KN), your company can attain a better Business-IT alignment. Example of rules extraction – Quote from “Sustainable IT Architecture” book, Wiley

127 127 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-01 Rules engine versus hard-coding BR-IT-01-2 BRMS applied to new development Every new development and software package customization should benefit from the BRMS in order to improve transparency, agility and ability to audit systems. A strategic long-term plan should be defined to endorse the BRMS use at a large scale of the system. Modeling and implementation procedures should exist to support the BRMS use rather than an approach of hard-coding only. It means that the number of rules grows when developing and acquiring new systems, including software packages such as ERP. Indeed, customizations of software packages should be put to the BRMS to ensure a better rules traceability and a better way of managing software packages upgrades.

128 128 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-01 Rules engine versus hard-coding BR-IT-01-3 Level of hard-coded rules Regardless of your mark about the BRMS applied to existing systems and new developments (BR-IT-01-1, 2), you should be able to measure the level of hard-coding of rules within the system. You should be able to estimate the level of hard-coded rules within the system. Without any rule engine, your mark is bad. When using a rule engine, your mark depends on how it is deploy within the system.

129 129 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-02 Rules execution and test BR-IT-02-1 BRMS applied to batch operations The BRMS shouldn't be limited to real-time operations only. Most of the time, a significant part of the system works in a batch mode and rules can be shared with ones used in real-time system. Moreover, it could be helpful to restructure batch treatments with a rules engine for restructuring them into more real-time executions. Most of the time the BRMS is applied to real-time operations first. However, to really improve the agility and traceability of the whole system, it is necessary to tackle rules within batch operations also. Then modeling and implementation procedures should exist to enforce the BRMS use when designing batch operations. Today's new BRMS technologies remove many IT barriers in term of rules execution performance. For example, some BRMS tools allow for automatically translating business rules into Cobol language and then compile it to run on mainframes directly. Beyond this IT ability to execute large set of rules, modeling procedures should be also well-established to redesign usual heavy batch operations in more real-time ones. As business is becoming more agile and real-time then the level of batch operations should decrease for the benefit of real-time operations.

130 130 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-02 Rules execution and test BR-IT-02-2 BRMS with MDM In order to deploy the BRMS at a large scale of the system, it is necessary to streamline data quality first. It means that reference and master data values used by rules should be retrieved through a unified data repository providing the “one version of the truth”, in other words a MDM must be enforced. When a rule is executed, it consumes two natures of data. First transactional data stemming from the system issuing the rule execution request. Second, reference and master data. For those data their origin is more complicated as they are often duplicated and scattered across the whole IS. Then when adding a new rule within the BRMS, this question is raised: where must we retrieve reference and master data values for this rule? Are they provided by the system issuing the rule execution request? Are they provided by other siloed systems? Are they provided by the integration layer? In short, adding a new rule within the BRMS could become a nightmare when ref and master data values are not well-managed. To fix this problem, it is necessary to establish a reference and master data repository first, in other words a Master Data Management solution (MDM). Moreover, to succeed in this approach, modeling and implementation procedures should exist to ensure that the unified data model designed for the MDM is well-established to support rules integration as described here. To get more information about those modeling procedures we invite you to visit the MDM Alliance Group community (www.mdmalliancegroup.com).www.mdmalliancegroup.com

131 131 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-02 Rules execution and test BR-IT-02-3 Test rules against requirements When using a BRMS, rules are both readable by business users and IT runnable directly. It avoids heavy waterfall lifecycle development where rules are testable after having implemented them only. Even though all tests cases are not runnable before some IT integration and development, the ability to test rules when using a BRMS is significant improved. Furthermore, it is highly recommended to set up non regression user acceptance tests of rules. Rules repository non regression user acceptance tests Ref/master data repository (BRMS) (MDM) data tests cases and outcomes get data

132 132 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-02 Rules execution and test BR-IT-02-4 BRMS loose-coupling architecture (1/2) To enforce a real agile rules management, it is recommended to follow the loose-coupling architecture. Then, three patterns should be used: -agnostic request: when a system issued a rule execution request, it mustn't know which rules could be run. It means that the requester is agnostic towards rules. It provides to the BRMS a context only. With this context, the BRMS must be able to compute which rules are the right ones to execute, -data context: the context provided by the requester to the BRMS must be comprised of a header and a body. The header brings the call context including the caller's identifier and from where its requests is issued such as its pre-condition or post-condition. The header should integrate other information such as a version label. The body is comprised of all data related to business objects handled by the caller. It means that rather than conveyed a specific data flow, it is more agile to send a large data flow. Thanks to this approach, when adding a new rule requiring new data values, it is more likely that these values are already conveyed by the caller, which avoids a useless software maintenance, - variation points: within the logical architecture of the system, it is highly recommended to set up some patterns establishing systematic calls to the BRMS, even if no rules are required when designing the first version of the system. For example, every pre- and post-condition of services (SOA) should integrate a call to the BRMS when implementing the software. Afterwards, when it is time to configure the system, it is easy to add new rules to customize pre- and post-conditions of services without any software maintenance. Example of BRMS loose- coupling architecture – Quote from “Sustainable IT Architecture” book, Wiley

133 133 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage rules BR-IT-02 Rules execution and test (2/2) BR-IT-02-4 BRMS loose-coupling architecture (2/2)

134 134 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 7. Processes Assessment part

135 135 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge Check-list

136 136 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture Enterprise Process Architecture should be seen as a part of the Enterprise Architecture. It complements with the Enterprise Data Architecture and the Enterprise Rules Architecture Most of the time, companies hold a good command of their processes map, by using disciplines such as City IT Planning or (in French term) “IS Urbanization” However, processes are too often documented and managed without taking care of underlying rules and data This missing link with data and rules is a significant problem because the true value of processes depends on the quality of data and rules To tackle this issue, the Enterprise Process Architecture must take into account the outcomes stemming from the Enterprise Data Architecture (Business Objects and their lifecycles) and the Enterprise Rules Architecture (organizational rules) By suggesting a classification of processes, the IS Rating Tool highlights how to align every type of process with data and rules

137 137 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture Business Line Third party Core Process Process Micro-Process (use case) Core Process Process Micro-Process (use case) PR-KN-01-3 Business line organization formulation This is an intermediate description of the organization. It allows for describing internal goals for every company's business line PR-KN-01-2 Transversal organization formulation This is the highest description of the organization, most of the time it allows for describing strategic goals related to the company's value chain PR-KN-01-4 Activity formulation This is the more detailed description of the organization. It allows for describing concrete interactions between one actor and the system through uses cases (micro-processes) PR-KN-01-1 Processes Classification The IS Rating Tool provides a first level of classification that should be seen as the minimum to ensure Enterprise Rules Architecture – Organization rules linked to Enterprise Data Architecture – Business Object linked to

138 138 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture PR-KN-01-1. Processes Classification At the very least you should have a classification relying on these three types of processes: Core process: this is transversal process, spanning several business lines within the organization, and/or through external systems under the control of third parties. A core process is composed with steps orchestrating mainly processes. In certain context, a core process can also orchestrate micro-processes directly (see below). The core processes form the company's value chain Process: this is internal process, the execution of which is limited to the scope of one business line only. A process is composed with steps corresponding to micro-processes, also called uses cases Micro-process or use case: this is a working procedure defining an inseparable set of interactions between one actor and the system. A micro-process is always embedded within a process or a core process. Micro-process (use case) is an atomic process. It means that its execution leaves the system in a stable organizational state. It involves one actor only. Core process and process are long-running processes. Their execution involves several actors, the coordination of which is ensure through a workflow mechanism (push / pull of users tasks) Even though this classification could be enriched differently from one company to another, it should be the basis to enforce. Other types could be added such as: value-chain, functional, calculation, IT, internal versus those related to business regulations, etc.

139 139 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture PR-KN-01-2. Transversal organization formulation (value chain) This is the highest description of the organization, most of the time it allows for describing strategic goals related to the company's value chain. Be cautious to not confuse this with the “company's raison d'être” which is defined in the Enterprise Data Architecture part: -“company's raison d'être” is related to the business strategy formulation. It means rules defining the core business without any organizational issues (see BR-KN-01-2) -company's value chain describes what are the goals of the company applied over its core business: customer effectiveness, cost reduction, HR incentives, stakeholders communication, etc. The transversal organizational formulation relies on the core processes description. These processes handle organization rules that should be managed as described in the Enterprise Rules Architecture (see BR-KN-01-3 Organizational strategy formulation)

140 140 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture PR-KN-01-1. Business line organization formulation This is an intermediate description of the organization. It allows for describing internal goals for every company's business line The business line organization formulation relies on the processes description. These processes handle organizational rules that should be managed as described in the Enterprise Data Architecture (see BR- KN-01-3 Organizational strategy formulation). Most of the time, a process handles one main business object, the description of which is available through its lifecycle (DT-KN-03-1 Business Objects' lifecycles). To obtain a first conceptual version of the process, it is possible to upside down the business object's lifecycle. The outcome is a set of conceptual steps describing how the business object must be handled over time, regardless of any organizational choice. With the UML notation, the state machine which describes the business object's lifecycle is translated into an activity diagram with one swimlane. This swimlane represents a conceptual organization, it means an organization which would have one actor only. In doing so, it is easier to measure the discrepancies between the core business (defining by business objects and their lifecycles = “company's raison d'être”) and the organization establishes with the business line organization formulation.

141 141 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-01 Enterprise Process Architecture PR-KN-01-4. Activity formulation This is the more detailed description of the organization. It allows for describing concrete interactions between one actor and the system through uses cases (micro-processes). The activity formulation relies on the micro-processes description (a.k.a. uses cases). Every use case orchestrates a set of activities, it means an action between one actor and the system. These micro-processes must be aligned with business objects described in the Enterprise Data Architecture (see DT- KN-01-5 Unified Data Architecture). Indeed, every activity must interact with one and only one business object. Examples of activities within an insurance company: cancel an Accident, search for a Contract, select a Client, visualize the insured Guarantees, etc. It means that activities are streamlined and don't admit data duplications. The sequencing of a set of activities describes a micro-process or use case. Organization rules applied at this level are related to the piloting of the interaction between one actor and the system. They are not strategic as ones described at the level of the transversal and business line formulations. They are more operational

142 142 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-02 Process modeling PR-KN-02-1. Processes notation Rather than a pure informal description of processes, using a well-recognized notation brings many benefits: encourages knowledge sharing, improve auditability, allows for automatically translating processes into runnable IT components A unified and recognized notation should be used to define processes as described in PR-KN-01-1 Processes classification. Core processes and processes can be defined with help from a process flow diagram (activity diagram in UML or with other DSL such as BPMN - Business Process Modeling Notation). Micro-processes (uses cases) are better designed with help from state machine, as each use case represents a set of interactions between one actor and the system; indeed only one “swimlane” is required as only one actor is involved in the process. A “swimlane” is a visual element used in process design to show the behavior of one actor. Last but not least, as processes handle business objects, it is more relevant to use a notation compliant with one used for the Enterprise Data Architecture. Most of the time, only the UML notation can support this unified view between Enterprise Processes Architecture and Enterprise Data Architecture In any case, this notation should be meaningful for all IS Stakeholders (not only IT specialists) and should be either IT runnable directly or easily translatable into runnable IT components

143 143 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-02 Process modeling PR-KN-02-2. Processes naming Every process must have a unique naming allowing its identification in an easy way. A unified processes naming should be enforced to support the knowledge sharing. It should follow the processes classification as defined in PR-KN-01-1 by enforcing code such as: COR (core processes), PRO (processes) and USE (micro-processes also called uses cases). Moreover, this naming should not include any specific code stemming from projects as reuse must be encouraged.

144 144 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-02 Process modeling PR-KN-02-3. Organization and security rules applied to processes definitions Processes execute a lot of rules to deliver their added-values. These rules should be authored with help from the grammar and naming stemming from the Enterprise Rules Architecture Beyond rules, all data defining organization behaviors and security policies over your processes are unified and managed through the master data referential (MDM) so as to benefit from all business data governance features (see also data assessment)

145 145 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-03 Ability to act PR-KN-03-1. Funding A budget is established to support the Enterprise Process Architecture. The decision to raise a funding is dependent on the ROI. Most of the time, companies are more willing to spend money on describing their core processes rather than their data and rules used across the whole system. It means that the knowledge of processes still remains rough as data and rules handled by processes are not sufficiently described. Therefore, the budget raised for the Enterprise Process Architecture should be aligned with budgets dedicated to the Enterprise Data Architecture and Enterprise Rules Architecture. It means that executive managers should have a better understanding of the benefits targeted through the Enterprise Data Architecture and Enterprise Rules Architecture. When budget applied to Enterprise Process Architecture is not aligned with rules and data management, it means that the processes knowledge is rough and not aligned with the reality of IT systems that run data and rules.

146 146 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes Knowledge PR-KN-03 Ability to act PR-KN-03-2. Replacement value Ability of your organization to (re)author processes from scratch (blank page). The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When processes documentations are up-to- date and teams have a good command of processes modeling procedures then your score is high. Conversely, when it is difficult to gather the knowledge of processes because of poor documentations and/or lack of specialists in processes authoring, then your score should be decreased.

147 147 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering Processes governance features

148 148 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Check-list Mastering Processes governance features

149 149 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV1-01 Processes governance Processes governance features are the business functions used by IS Stakeholders to manage processes. This is a list of business features brought by the BPM (for core process and process) and the BRMS (for micro-process also called use case), such as authoring, version management, auditability, etc. The way of these functions are used through the processes execution and across organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of processes governance features, not the quality or maturity levels of organizations to use them Amongst these features, a detailed assessment is required to measure the processes lifecycles and version management function A distinction between core-process, process and micro-process must be ensured, following the processes classification already established in PR-KN-01-1 Mastering Processes governance features

150 150 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-01-1. Unified processes governance applied to core processes and processes This question deals with core processes and processes only. Micro-processes are managed through other governance functions (see PR-GV-01-2). In this question, the generic term “process” is used to describe both core processes and processes. Reminder: processes are classified following these three types: core process, process (limited to the scope of one business line) and micro-process (use case). See PR-KN-01-1 Processes classification All core processes (over business lines) and processes (limited to the scope of one business line) are managed through unified and shared governance functions such as: authoring, version management, traceability and monitoring of processes, process history, process simulation and test, rights management, etc. From an IT point of view, these business governance functions are brought by a BPM tool (Business Process Management) also called workflow engine PR-GV1-01 Processes governance Mastering Processes governance features

151 151 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-01-2. Unified processes governance applied to micro-processes This question deals with micro-processes (uses cases) only. The governance functions applied to other types of processes (core process and process) are described in PR-GV-01-1 Reminder: processes are classified following these three types: core process, process (limited to the scope of one business line) and micro-process (use case). See PR-KN-01-1 Processes classification All micro-processes should benefit from a unified and shared governance approach: authoring, version management, traceability and monitoring of micro-processes, micro-process history, micro-process simulation and test, rights management, etc. However, using a process management tool such as a BPM to govern micro- processes is not always relevant. Indeed, every micro-process (or use case) describes an inseparable set of interaction between one actor an the system. Therefore pushing tasks between actors (tasks list) is not needed. Furthermore, governing these micro-processes through a formal representation (flows diagram) would be too rigid and complex due to their fine-grained dynamic and their variability. BPM is more relevant when processes are stable enough to be modeled in a formal notation and then executed. This is the case when modeling core processes and processes. But to govern the fine-grained level of processes, in other words, micro-processes (uses cases), it is more efficient to author rules (BRMS). Even if the design relies on a state machine (see PR-KN-02-1 Processes notation) the governance is carried out with the rules management rather than a BPM. In doing so, it is easier to manage variants of uses cases depending on uses contexts, thus the formal representation brought by the BPM is not required. Your company should have guidelines to conduct the choice of using BRMS rather than BPM to govern uses cases PR-GV1-01 Processes governance Mastering Processes governance features

152 152 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-01-3. Processes lifecycles and version management Amongst processes governance functions, the lifecycle and version management is a significant feature requiring a specific assessment The lifecycle and version management of processes is vitally important to enforce a real processes governance. Two types of features are needed: - It should be possible to create versions of processes and compare versions, - it should be possible to manage stages of processes from their inceptions to their retirements. It means that at any time, it should be possible to reverse processes changes by benefiting from a full version history of processes authoring. Depending on the type of process, either BPM (core process and process) or BRMS (micro-process) is used to provide unified governance functions (see also PR-GV-01-1 and PR-GV-01-2). Processes used data which should benefit from the version management brought by the MDM applied to ref/master data structures and values (see Data Assessment part). It means that every process should have a context identifier defining in which version of data its execution is issued. In doing so, when the BPM/BRMS looks up the MDM to retrieve ref/master data values, it provides the context in which this request is issued, i.e. the version. Important note: the value linking with the rules version management is not valuable as a loose-coupling IT integration should be enforced between the BPM and the BRMS. It means that the BPM knows the version/context (data) in which it executes processes, but not the rules versions that the BRMS must enforce. The BRMS is autonomous to compute the right version of set of rules to apply depending on contexts and versions information stemming from the BPM (see also PR-IT-02 BPM with BRMS) PR-GV1-01 Processes governance Mastering Processes governance features

153 153 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-01-4. Processes authoring Processes authoring should be possible for all IS Stakeholders, not for IT specialists only A unified processes authoring function should be available for all IS Stakeholders and managed through a secured authentication. It means that authoring processes should not be dedicated to IT specialists only. According to the company's culture, key business users can be involved in authoring processes directly or prefer to delegate this work to IT teams. In any case, processes should rely on a notation ensuring a full business understanding and formulation of processes (PR-KN-02-1 Processes notation). PR-GV1-01 Processes governance Mastering Processes governance features

154 154 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-02-1. Processes Asset measurement Key indicators should be defined to follow processes assets over time. A lot of key indicators could be defined to follow processes assets. You should distinguish key indicators applied to processes executions and those applied to processes definitions. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to processes assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system. Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only. Example of key indicators: - number of processes in failure during a period of time, - number of processes related to a business regulation, - number of processes modifications within a period of time, - number of processes executions within a period of time, - processes not used within a period of time, - processes used the greatest number of time during a period, - ratio of core processes compared to processes per business unit within the company, - all measures brought by the IS Rating Tool, - etc. PR-GV-02 Managing Processes as a real Asset Mastering Processes governance features

155 155 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-02-2. Processes Asset overseeing Beyond key indicators applied to processes assets (see PR-GV-02-1), rules overseeing some key processes executions should be also established. When processes are managed through a processes repository such as a BPM and/or BRMS, it becomes easier to add alerts to oversee them. These alerts can check the outcomes of processes executions but also can react depending on thresholds applied to key performance indicators (see PR-GV- 02-1). Alerts are defined as rules and benefit from the rules management system. For example: - outcomes of a process must be conformed to min/max values constraints. It means that all post-conditions applied to processes could be considered as rules overseeing, - maximum number of a process execution within a period of time, - etc. To implement these rules as real IS Assets (open to the business, not with an approach of hard-coding), it is recommended to use a BRMS (Business Rules Management System) and/or a CEP (Complex Event Processing) (see also Rules Assessment part of this IS Rating Tool). PR-GV-02 Managing Processes as a real Asset Mastering Processes governance features

156 156 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-GV-02-3. Processes Asset tracking All processes executions should be tracked in order to enforce IS traceability When a processes repository is enforced by a BPM and/or BRMS, then a unified business audit trail should be available directly. This audit trail is used to keep track all processes executions. Query functions allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions. PR-GV-02 Managing Processes as a real Asset Mastering Processes governance features

157 157 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Mastering IT approach to manage processes

158 158 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Check-list Mastering IT approach to manage processes

159 159 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-01-1. Processes engine applied to existing systems Modeling and implementation procedures should exist to enforce a progressive extracting of existing hard-coded core processes and processes for the benefit of the processes engine (BPM). In doing so, the readability, agility and ability to audit the system can be improved. When combining this approach with an efficient Enterprise Process Architecture (see PR-KN), your company can attain a better Business-IT alignment. However, this restructuring of processes is valuable only if data and rules are also extracted from hard-coded systems. The process value depends on the quality of rules and data that are used. It means that the marks applied to this question takes into account the linking value of the chain composed of MDM+BRMS+BPM Note: extracting micro-process (use case) from hard-coded software entails an in-depth overhauling of existing system, which is targeted with the next question (PR-IT-01-2) PR-IT-01 Processes engine versus hard-coding Mastering IT approach to manage processes

160 160 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-01-2. Processes engine applied to new development Every new development and software package customization should benefit from the BPM (core process, process) and BRMS (micro-process) in order to improve transparency, agility and ability to audit systems. A strategic long-term plan should be defined to endorse the BPM and BRMS use at a large scale of the system. Modeling and implementation procedures should exist to support the BPM (core process, process) and BRMS (micro-process) use rather than an approach of hard-coding only. It means that the number of processes grows when developing and acquiring new systems, including software packages such as ERP. Indeed, customizations of software packages should be put to the BPM and BRMS to ensure a better processes traceability and a better way of managing software packages upgrades. As already stated in PR-IT-01-1, this restructuring of processes is valuable only if data and rules are not implemented with an approach of hard-coding. The process value depends on the quality of rules and data that are used. It means that the marks applied to this question takes into account the linking value of the chain composed of MDM+BRMS+BPM PR-IT-01 Processes engine versus hard-coding Mastering IT approach to manage processes

161 161 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-01-3. Level of hard-coded processes Regardless of your mark about the BPM and BRMS applied to existing systems and new developments (PR-IT-01-1, 2), you should be able to measure the level of hard-coding of processes within the system. Reminder: BPM is used to govern and run core process and process. BRMS is more relevant to govern and run micro-process (also called use case). See the processes classification in PR-KN-01. You should be able to estimate the level of hard-coded processes (core process, process, micro-process) within the system. Without any processes repository (BPM, BRMS), your mark is bad. When using a BPM (core process, process) and BRMS (micro-process), your mark depends on how it is deploy within the system. PR-IT-01 Processes engine versus hard-coding Mastering IT approach to manage processes

162 162 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-02-1. BPM with BRMS (loose-coupling) Rules used to drive the process flows should be authored and governed through the Business Rules Management System (BRMS), and then should enforce a better auditability and traceability of processes executions. The value of the BPM is dependent on the value of the BRMS: linking value BPM+BRMS. From an IT point of view, the integration of the BPM with BRMS should be enforced in a loose-coupling architecture. Two level of integration should be distinguished: when using a BPM, the formal representation of the process flow must be able to launch rules managed by the BRMS in order to compute the flow execution: which step is the right one depending on the current context of execution? It is important to enforce a loose-coupling integration, therefore the BPM shouldn't be aware of rules really executed by the BRMS. It sends a data flow associated with its context execution (version, context) to the BRMS, and receives a result from the BRMS allowing to decide the next step of the process execution. This loose- coupling IT integration allows for modifying the set of rules used to compute the process flow depending on version, context (head-office, subsidiary, country, legislation, etc.) without modifying the formal process flow model carried out within the BPM, when using the BRMS directly to carry out a process, this means using the IT integration principles already defined in the Enterprise Rules Architecture. This approach is advised when carrying out micro- processes, in other words the more detailed level of processes (see PR- KN-01-1 Processes classification). PR-IT-02 Processes execution and test Mastering IT approach to manage processes

163 163 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-02-2. BPM with MDM Data used to conduct the processes executions shouldn't be hard-coded in opaque databases. Conversely, it is recommended to use the Master Data Management (MDM) repository to author and govern this data. The value of the BPM is dependent on the value of the MDM: linking value BPM+MDM. The process execution shouldn't need to retrieve directly data from the MDM directly. Indeed, this execution interacts with rules (BRMS), and these rules interact with data stemming from the MDM. However, if the need of a direct access to reference and master data is raised, then it must be carry out through the MDM (see Enterprise Data Architecture). Beyond this first mechanism, many reference and master data are used to configure the processes flows, such as the definition of contexts execution and versions. As already stated in the previous question (see PR-IT-01-1), rules executed to compute the flow execution can be different depending on the contexts execution (head-office, subsidiary, country, etc.) and versions. This configuration should be authored and governed with help from the MDM, in order to avoid a hard-coded approach, which is harmful to auditability, traceability and agility of processes PR-IT-02 Processes execution and test Mastering IT approach to manage processes

164 164 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 PR-IT-02-3. Test processes against requirements When using a BPM, it is valuable and cost-effective to establish tests procedures of processes When using a BPM, processes are both readable by business users and IT runnable directly. It avoids heavy waterfall lifecycle development where processes are testable after having implemented them only. Even though all tests cases are not runnable before some IT integration and development, the ability to test processes when using a BPM is significant improved. Furthermore, it is highly recommended to set up non regression user acceptance tests of processes. Note: regarding micro-processes, when they are implemented through BRMS as recommended, this means using the BRMS procedures tests (see BR-IT- 02-3 Test rules against requirements, Data Assessment part) PR-IT-02 Processes execution and test Mastering IT approach to manage processes

165 165 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 Any remarks and suggestions? Do not hesitate to contact the author pierre.bonnet@orchestranetworks.com And join us in our Linked group http://www.linkedin.com/groups?gid=1879652&trk=hb_side_g

166 166 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com Sustainable IT Architecture – IS Rating Tool Course – Beta V1 You can use this document for your own needs and publications under the condition to quote the source “Sustainable IT Architecture” This document is protected by a Creative Commons (see opposite figure) You can reuse this material This material is freely available on http://www.sustainableitarchitecture.com


Download ppt "Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture www.sustainableitarchitecture.com."

Similar presentations


Ads by Google