Enhancing Business Governance through Life Cycle Management and Process Monitoring
This document outlines trends and evolutions in business governance, focusing on life cycle management and process monitoring. It emphasizes the principles of composition, cohesion, completeness, and functionality in business operations. Highlighting relevant aspects such as product choices, make/buy decisions, and system design, it provides a comprehensive view of security requirements and operational management across various business functions. The content serves as a guide for organizations to align their processes with strategic business objectives effectively.
Enhancing Business Governance through Life Cycle Management and Process Monitoring
E N D
Presentation Transcript
Trends and evolutions LIFE CYCLE MNGT (PROCESS) Business GOVERNANCE (ORGANIZATION) MONITORING • Composition Principles • Guarantee: • - Cohesion • Completeness • Synergy • Changeability • Functionality • Manageability PRODUCTS SERVICES TARGETS ASSETS SECURITY Processes MONITORING VISION ROLES BUSINESS FUNCTIONS BUSINESS COMPONENTS VALUE CHAINS ACTIVITIES PROCESS RULES SEMANTICS • Product choices • Make/buy decisions • Engineering • Dimensioning • CIA (Security requirem.) • System topology • Geography (locations) • Guarantee: • Makeability • Scalability • Performance DECISIONS SECURITY DEPARTMENTS EMPLOYEES BUSINESS PARTNERS CUSTOMERS SUPPLIERS ARCHITECTURE RESPONSI- BILITIES Business Applications MONITORING CDM DESIGN MANDATES EDM SPECIFIC SOFTWARE GENERIC SOFTWARE BPM EDA SOA BAM SECURITY ERD BUILD POLICIES ApplicationInfrastructure Buy/make Construct Make working MONITORING WEB BROWSER APPLICATION SERVER FILE XFER (ESB) MESSAGING (ESB) TERMINAL SERVICES MASTER DATA MNGT DATA WAREHOUSE RELEASE OWNERSHIP SECURITY Deployment Make operational WEB SERVER PROCESS SERVER EVENT PROCESSOR B2B GATEWAY PRESENTATION (PORTAL) DBMS OPERATE PROVIDERS TechnicalInfrastructure MONITORING Keep alive Keep running Monitoring Tuning DIRECTORY SERVICES IDENTITY MANAGEMENT ACCESS MANAGEMENT VIRTUAL MACHINE OPERATING SYSTEM NETWORK SERVICES STORAGE (NAS/SAN) REMOVE (END OF LIFE) SECURITY Hardware Phase out Eliminate MONITORING SERVERS DESKTOPS LAPTOPS PDA’S DEDICATED DEVICES PRINTERS ROUTERS WIRING SECURITY SWITCHES RADIO Locations MONITORING DATA CENTERS OFFICE HOME MOBILE SECURITY IT Services Stack – public domain – v0.1 Jack van Hoof, releasedMarch 29, 2008