whole of government ict strategy and architectural journey

20
Whole of Government ICT Strategy and Architectural Journey By Abhishek Singh, Chief Information Officer Confidentiality-I1-A1

Upload: others

Post on 25-Jan-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Whole of Government ICT Strategy and

Architectural JourneyBy Abhishek Singh, Chief Information Officer

Confidentiality-I1-A1

HeadingINSERT TEXT HERE

This is a placeholder text. This text can be replaced with your

own text. The text demonstrates how your own text will This is

a placeholder text. This text can be This is a placeholder text.

This text can be replaced with your own text. The text

demonstrates how your own text will This is a placeholder text.

This text can be replaced with The text demonstrates how your

own text will This

Topic-1Recently we applied Architectural approach to

define the WofG ICT Services strategy

Confidentiality-I#-A#

Confidentiality-I1-A1

Better Access

A Connected Government

Seamless Service Delivery

We are enabling a better digital experience for

government employees and citizens by transforming our

identity management and centralised network

Better Access

Contemporary Architecture

Our Key Objectives

We are enhancing integration and collaboration

across SA Government to deliver shared outcomes

A Connected Government

We are readying central digital services for the era

of hybrid and multi-cloud IT environments

Seamless Service Delivery

We are lifting our capability to make it easy for

citizens to access services through innovative IT

architecture across SA Government

Contemporary Architecture

Confidentiality-I1-A1

Collaboration

Cloud Services

Industrial Scale Enablers

Securely manage credentials

within the agency

Implement WofG staff Identity

capability to manage agency

credentials

Identity & Access

Management

Hosting

Connectivity

There are opportunities to use

Cloud model (IaaS or PaaS) and

use local commercial datacentres

to achieve High Availability and

DR capability

Modernise Central Data Network

Wider transmission coverage

Abundant and redundant Internet

services

Enabled by feature rich business

communications service, and

voice and unified communications

Microsoft Office 365 (O365)

Application Programming Interface

Instrumentation

ITSM

Cloud Management

Advanced Analytics

RPA

Whole of Government ICT Services

Confidentiality-I1-A1

Strategy Dimensions

Confidentiality-I1-A1

• An effective technology Strategy cannot just focus on technology. How we manage our holistic capability, in terms of processes, people, organisation, sourcing and finances, is just as critical to success as the technical issues and strategic intent.

Identity & Access Management

Confidentiality-I1-A1

Principles

Principle 1 - Segregate and decouple authentication and authorization

Principle 2 - Management of user credentials and authorizations are the responsibility of Agencies to manage

Principle 3 - Master credentials to only be stored inside SAGov (iewithin the agency )

Principle 4 - Use single sign on where applicablePrinciple 5 - Standardize semantics and naming conventions

access to WofG services aligned to Conditions of Authentication

Principle 6 - Enable access to services in a trusted mannerPrinciple 7 - Be true to the ethos of ‘One Government, One

Employer’

Burning Platform for Change WofG

• Single access gateway to provide access to WofGservices.

• Need for consistency between on premises and cloud connectivity

• Greater ease of handling MOG changes• Consolidation of processes for verification of

identity via DVS (Document Verification System) • Current landscape of active directories across

agencies needs central orchestration to access WofG.

Capability Map

Confidentiality-I1-A1

Cloud Hosting Services

Connectivity and Integration Security and Admin

Management and Governance

Identity and Access Management

User Management

Privileged Access Management (PAM)

Access Management

Enterprise Directory Management

Federation ServicesCloud Authorisation

Sync Services

DNS

Certificate Management

Resource Domain Function

Forest Functional Risk Assessment

(ADRAP)

Inter forest Trusts

Authentication(Types)

Application Client Management

Security / Event Logs

Governance and Policies

Management

Single Sign on

Change Management

Incident Management

Billing

Shared Domain Services

Multi Factor Authentication

Service Consultancy

Support Services

Consent Management

Infrastructure

Recovery Management

Reporting

Monitoring

Identity broker

Self ProvisioningAdaptive Authentication

PKI

Aligned to Principles Establish or mature capability

LEGEND:

Current State Architecture

Confidentiality-I1-A1

Future State Architecture

Confidentiality-I1-A1

Take-away Points

• Used EA concepts to communicate the engage the

stakeholders

• Applied EA approach to describe the service

• Applying EA approach to define actionable plans based on

the strategic intent

• Established ARB to Govern projects adherence to the

agreed architecture

Confidentiality-I1-A1

HeadingINSERT TEXT HERE

This is a placeholder text. This text can be replaced with your

own text. The text demonstrates how your own text will This is

a placeholder text. This text can be This is a placeholder text.

This text can be replaced with your own text. The text

demonstrates how your own text will This is a placeholder text.

This text can be replaced with The text demonstrates how your

own text will This

Topic-2We are maturing Architecture Capability within

Whole-of-Government (WofG) ICT Group

Confidentiality-I#-A#

No architectural

competency

Gap analysis

Define Architecture

Services

Kick-off ARB

Success

Established new Method

Applied EA approach to WofG strategy

definition

WofG ICT Architectural Maturity

Roadmap

January 2018

Architecture

discipline is well

established

November 2018

onwards

February 2018 – July 2018

August 2018 – November 2018

April 2018 onwards

October 2018

Confidentiality-I1-A1

EA is Integral to IT Strategy

Confidentiality-I1-A1

Observation and Next Steps

Confidentiality-I1-A1

Architecture is Baked into Our

Process

Confidentiality-I1-A1

Draft Architectural Services

Confidentiality-I1-A1

Architecture Governance

Confidentiality-I1-A1

Thank You!

Confidentiality-I#-A#

dpc.sa.gov.au

[email protected]