Difference between revisions of "Strategy and Governance"

From EITBOK
Jump to: navigation, search
(Created page with "<h2>Introduction</h2> <p>IT strategic planning defines and communicates goals, assesses their impact on the organization, drives change to achieve those goals, and provides a...")
 
Line 330: Line 330:
 
</ul>
 
</ul>
 
<p>It is becoming common for senior managers to have compensation in part or in-whole driven by these performance measurement results. </p>
 
<p>It is becoming common for senior managers to have compensation in part or in-whole driven by these performance measurement results. </p>
<h2>Effective Strategy and Governance</ h2>
+
<h2>Effective Strategy and Governance</h2>
IT governance is effective only if cultural and management buy-in are deeply established and carried on in a continuous manner to the appropriate level of management with a communication plan, however that is not even enough to assure governance success. Reasons for ineffective governance include:  
+
<p>IT governance is effective only if cultural and management buy-in are deeply established and carried on in a continuous manner to the appropriate level of management with a communication plan, however that is not even enough to assure governance success. Reasons for ineffective governance include:</p>
 
<ul>
 
<ul>
 
<li>Compliance activities and reporting without any review, action or consequences</li>
 
<li>Compliance activities and reporting without any review, action or consequences</li>

Revision as of 19:39, 8 September 2015

1 Introduction

IT strategic planning defines and communicates goals, assesses their impact on the organization, drives change to achieve those goals, and provides a basis for governing and assessing success. Taking various perspectives (financial, historical, environmental, future projections), a strategic plan is a framework for action and change both vertically and horizontally across the IT organization. IT governance is established through the IT and enterprise strategic plans as a control framework to achieve and sustain strategic goals and objectives. IT governance is completely interdependent with the IT strategy.

This chapter provides an overview of IT strategic planning and governance including the approaches to create an IT strategic plan based on enterprise strategy, and the role of the IT enterprise architecture. The strategic planning and governance context diagram is shown in Figure 2.1.

2 Goals and Principles

  1. IT strategy — To achieve a common understanding of IT and enterprise intent:
    • Enterprise strategy drives IT strategy.
    • Understand your purpose for creating an IT strategy.
    • Understand current IT operations.
    • Plan for working on the things that matter to enterprise.
    • Take a multi-year perspective, and revisit the plan on a periodic basis for confirmation or changes.
    • Enable reliable, nimble, and efficient response to strategic objectives.
    • Sustain IT capability.
  2. IT governance — The goal of governance is to direct activities in a way that fulfills the IT strategy. These are critical activities required to achieve this goal:
    • Plan for flexibility and change in governance structure, accountability, and priorities.
    • Measure progress and performance against the strategic roadmap as well as on a project and operations basis.
    • Enable change, even to the plan itself, as required.
    • Advise and align other IT discipline strategic plans into an overall framework for delivery.
    • Foster communications and understanding between IT and enterprise.
    • Set expectations within a code of ethics framework.
    • Foster a continuous learning organization.
    • Look ahead for continuity planning as part of risk management planning.

Figure 2.1: Strategy and Governance Knowledge Area

3 Description

Strategic planning occurs at different organization levels and on a lateral scope. Enterprise IT strategy is developed by senior management supported by IT standards, frameworks, and guides setting direction and mandating many IT management activities. Goals and objectives depend on the type, status, and size of the enterprise. For example, the main goal of IT development for a trading company may be to support the rate of turnover of the warehouse, but for a consulting company the important goal may be the efficient use of personnel.

The inputs to strategy and governance include various enterprise planning and strategy inputs, financials (budgets and plans and performance), and enterprise architecture and enterprise governance artifacts including policies.

The roles involved in supplying input to and drafting IT strategy and governance include C-level executives, senior management, and certain specialists such as communications personnel and architects.

Deliverables from the strategic planning process include the strategic plan, the communication plan, and the socialization plan. They inform a governance framework necessary to deploy those plans in IT. These deliverables are consumed by C-level executives and business and IT management.

3.1 IT Strategic Planning

3.1.1 Introduction: IT Strategy is a Business Strategy

IT is a business unit within the enterprise. The business strategy document is the most significant single input to the IT strategy document. The business strategy frames the scope and expectations for the IT strategy.

Any supply chain, outsourcing, onboarding, or other scenario that is practiced by IT and the business should be driven out of strategy. For example, if the business chooses to streamline vendor relationships, the focus would be on a value stream called “onboard supplier,” and capabilities that would include partner management, asset management, agreement management, and related capabilities that are supported by associated IT capabilities in these areas.

The enterprise as a whole should have a shared strategy for addressing how to improve operations and IT should participate in and leverage the results of strategic objectives and action items tied to these abstractions.

The resulting activities could involve consolidating and improving automation around this value stream and capabilities as well as numerous other non-technical activities that do not involve systems and technology. Specific topics may include best practices on:

  • Outsourcing of systems, process, maintenance, technical risk management and transition approaches, cloud contracting advice, mobile strategies, data and information management and integration strategies, SLA framework strategies, logistical and business cultural constraints, and resource optimization options.
  • IT strategy is a component of an enterprise strategy when considering activities that include designing, building, and managing information and information technology for business change. [1]

3.1.2 Perform Environmental Scan

There are multiple ways to leverage the concepts portrayed in Figure 2.1. However, the process begins with strategy mapping.

Strategy mapping articulates a strategy in such a way that it can be readily interpreted and acted upon. Strategy maps vary but are essentially a graphical depiction of goals, objectives, and related courses of action, often aligned against an organizational and broader environmental backdrop.

Shifts in technology in the marketplace, regulatory change for transparency, corporate marketing channels, and competitor’s enterprise models are a few environmental considerations when building an IT strategy.

A current assessment of IT systems, capabilities, and resources is necessary to complete the full 360 degree scan.

IT maturity assessment results are input to strategy mapping and desired outcomes (see Section 2.4.3 Maturity Management for overview of the assessment process).

Strategy mapping has existed in one form or another for some time. Sample strategy mapping approaches that apply to enterprise and IT strategies are listed below:

  1. Strength/weakness/opportunity/threat (SWOT) analysis
  2. SWOT surfaces internal and external perspectives that should be capitalized upon or otherwise addressed. SWOT findings are one input to strategy formulation providing possible focal points in strategy development.
  3. The Norton Kaplan Strategy Map [2] links actions to value creation along four dimensions: financial, customer, internal (employees), and learning and growth. The strategy map offers a complete, in-context perspective on the strategy.
  4. Hoshin Kanri [3] provides similar cross-mapping concepts include tying mission, goals and objectives with action items, and key performance indicators (KPIs).
  5. The business motivation model (BMM) [4] provides a mapping between the “ends” to be achieved (i.e., goals and objectives) and strategies and tactics (i.e., the “means”) needed to achieve those ends.

Generally only one approach is selected for a strategy map. Regardless of approach taken, the end result of any strategic IT planning process is a clear set of measurable objectives, priorities, and action items that management can then act upon to deliver change leading to improved IT performance.

3.1.3 Establish an IT Strategic Planning Framework

The strategic planning context diagram shown in figure 2.1 provides a good focal point for strategic planning from a business, process, and IT perspective. In practice, IT strategy formulation incorporates business strategy as a fundamental driver.

IT strategy is deployed by leveraging best architecture, design practices, and technologies. The tension between delivering systems that meet business objectives, particularly from a tactical perspective, must deliver solutions in a delicate balance between forward-looking tools and techniques, current practices, and pressures to implement quickly.

3.1.4 IT Strategy Formulation

Drafting an IT strategy requires alignment to enterprise and business strategies, measured adherence and compliance to IT best practices, and governance. While enterprise and business strategies come from business, adherence to best practices falls within the IT domain. Of course, best practices continue to evolve and differ from organization to organization and even project to project. Therefore, IT faces the challenge of satisfying strategic business objectives through the application of evolving and situational best practices.

Best practice conformance can be difficult when IT owns numerous systems that were designed and developed in a prior era. Sometimes we call these legacy or heritage systems, and, in most cases, these older systems suffer from challenges. These systems were typically developed using older technologies and their architecture often does not conform to modern design principles (e.g., SOA) or to the current business needs. Further, changing business architecture and rules overtime can lead to data and information quality issues. Lack of business alignment and data-quality issues are some of the more difficult and time-consuming issues to address.

IT organizations typically address technical debt through legacy modernization (upgrade or replacement), but often do not tie these projects to strategic business objectives. Additionally, the costs are often high and the business benefits for continuing to deliver the same functionality as before upon completion of the project can be a hard sell to the business.

The following six-stage framework for IT strategic planning ensures that business strategy is integrated into the planning process and that IT strategy is not driven solely by technological upgrades:

  1. Craft the IT strategy and plan to support well-articulated enterprise and business objectives.
  2. Leverage EA to feed the strategy. Vet various perspectives.
  3. Highlight IT focal points for each objective.
  4. Establish KPIs for each strategic enterprise objective and related action item.
  5. Establish a plan timeline roadmap including a review plan.
  6. Establish or leverage IT governance to ensure that business strategy is realized.

Each of the above IT strategy development activities presents a unique challenge and occasionally can be in conflict. For example, adherence to best IT architecture practices is difficult when older legacy systems that are architecturally inelegant must be updated to accommodate alignment to business strategy, or when time-to-implement constraints override preferred plans. When this occurs, the organization begins to build technical debt. Technical debt is a “term used to describe the negative effects of applying ill-advised or problematic changes or additions to software systems and their data, negatively impacting the delivery of future business value.” [5]

The steps in the planning process, as depicted in the context diagram in Figure 2.1 should work for most organizations as they embark upon their business and IT planning efforts, keeping in mind that the framework provides a guide into what should specifically be addressed at each stage of the planning process. Finally, much of what is considered as strategic planning within IT is just a portion of the broader context for business planning. Therefore, planning for IT and business scenarios that are essentially the same scenario, such as outsourcing a capability or managing suppliers, should take an integrated, holistic, and enterprise view of the planning process.

3.1.5 Establish Planning Approach

A defined IT strategy provides the roadmap needed for getting from where the enterprise is at present to where it needs to be. It identifies how the enterprise needs to change. IT must determine effective ways to take the enterprise strategy and transform it into IT strategic change.

Strategic change employs a wide array of disciplines and techniques to enable change on a large scale and on an incremental basis. These techniques are often discussed in the context of types of focuses, such as: [6]

  • Governance
  • Information/data
  • Solution
  • Technology
  • Security

Each focus has constraints that must be understood and reflected explicitly in the strategy. These typically include time, quality, and cost. The focus may also include organizational scope such as Western Hemisphere operations only, or a time horizon such as a 2-year horizon, as well as constraints from the environmental scan such as regulatory requirements for the industry. An IT strategy also acknowledges existing IT constraints through enterprise architecture (EA) and human resources, legacy systems, staff capability, and capacity to deliver.

The strategic planning team takes risk into account within the plan. They recognize the risk appetite of the organization as a potential constraint in the plan. They also suggest risk responses that require vetting and approval as part of overall strategy adoption.

3.1.6 Role of Architecture in Strategy Planning

Enterprise architecture (EA) informs the IT strategic plan in a number of ways. EA supplies “A blueprint of the enterprise that provides a common understanding of the organization and is used to align strategic objectives and tactical demands.” [7]

Standard methods include strategy maps, capability maps, information maps, value maps, and organization maps.

Some other artifacts include operating models, product maps, stakeholder maps, process models, dynamic rules based routing maps, data models, network models, systems models, vitality and renewal plans, and a wide range of hybrid blueprints and models that have specialty uses based on the challenge at hand.

Blueprints and models are valuable to have as an input to the IT strategic plan. Typically, many artifacts do not exist when initiating a strategic planning effort and either they must be developed together with business input. The IT strategy document then becomes an extrapolation from the enterprise strategy with an IT lens.

3.1.6.1 Blueprints and Models — Business and IT

Blueprints and models require consistent, standardized components. These components draw from the abstract representations of the business shown in Figure 2.2. In the figure, the center circle represents concepts and includes capability, value, organization, and information. These concepts are considered core, because they are very stable business and IT perspectives that remain relatively constant. Changes occur as required to accommodate business and IT as they evolve. IT inherits some of these blueprints from the Business and transforms them into aligned IT focused forms.

The yellow circle in the figure shows influencing perspectives. For example, strategies continue to evolve in real time while new business and IT products and services are introduced routinely. These examples show how the outer circle of business abstractions are more dynamic than the stable core. Collectively the core and extended views, when mapped and presented appropriately, provide a complete and holistic planning view.

Figure 2.2: Business Architecture Ecosystem [8]

Very sophisticated blueprint mappings can emerge from the collection of components shown in Figure 2.2, which represents the business ecosystem. Even simple concepts, like value stream or capability cross-mapping, serve as a basis for business-driven roadmaps and investment planning. Collectively, all of these perspectives answer important questions such as why take action, what is impacted, or how to accomplish a particular task.

3.1.7 Turn Business Strategy into Actionable Results

3.1.7.1 Using Blueprints and Models

The reason for developing the various blueprints and models is to use them in some way to achieve strategic and tactical needs. Strategy drives changes that can be collectively represented by abstractions depicted in Figure 2.2. When management has the ability to view the impact change using these abstractions, everyone from the executives and planning teams to the deployment teams can have a shared perspective of the context and scope of these changes.

For example, consider the goal to “provide more customer and transactional transparency throughout the product sales cycle”; where “transparency” across the sales cycle means visibility into transaction history and sales potential. Business architects would determine that this strategy targets the Acquire Product value stream and Account File Management, Customer Management, and Account Routing capabilities. Other enterprise and solution architects would then look at the goal from their delivery perspectives. These perspectives very likely are implemented today using a cross-section of technologies and processes, some of which are well understood and adaptive, while others are not. The IT strategy together with EA provides a framework for assessing current state implementations, crafting target-state solutions, and establishing a transition strategy for moving from current-to-target state solutions.

There is a multitude of strategic planning approaches. Regardless of the approach selected, turning strategies into actionable results requires identifying the IT delivery impacts on the current state and current future state plans.

Figure 2.3: Turning Strategy into Actionable Results via Enterprise Architecture

Figure 2.3 represents the ability to leverage perspectives to identify specific areas of IT that require initiative investment. These investments in turn result in projects that incorporate business and IT transformations.

  • Enterprise Business Strategy represents all motivational factors including policy, regulation, goals and objectives, product and stakeholder considerations, and the resulting action items required to achieve various goals and objectives.
  • EIT Strategy represents the IT perspective of the enterprise business strategy and includes capability, capacity, ROI, information, organizations, responsibilities, funding plan, stakeholders, initiatives, products and decisions.
  • Enterprise Architecture identifies actionable items as inputs to design concepts, IT business priorities, business-driven roadmaps, fundable initiatives, and business-driven IT architecture transformation.
3.1.7.2 Using Enterprise Architecture to Interpret Business Strategy [9]

EA is both an input to the strategy by supplying methods and “as-is” architectures, and a follow-on activity that interprets, performs gap analysis, and supports execution the strategic plan and adjusts the “to-be” architectures to new or changed direction from the plan.

A brilliant business design can be too costly and take too long to satisfy executive demands, or can be technologically infeasible. This is where enterprise architecture can help ensure that selected business designs and innovation options are not only desirable, but cost effective and implementable.

We stated earlier that EA includes business, solution, information, and technology architectures. Business architecture has a direct relationship to and reciprocal impact on the remaining aspects of EA — particularly solution and information architectures. For example, information architecture leverages the information aspects of business architecture to craft a wide range of technology options for maximizing accessibility and usage to a various information categories. These range from “big data” to more traditional relational database architectures. Information architecture establishes the critical underpinnings for business automation solutions.

The solution architecture is the implementation perspective of the business architecture and includes business design concepts such as case management and process management. Business capabilities drive the evolution of applications and service oriented architecture (SOA) service deployments. Value streams provide the framework for service orchestration, business design options, and stakeholder interface requirements.

The technology architecture plays two important roles. First, it enables delivery of business solutions as articulated through the blueprints and models. Second, it ensures that the required degree of technological innovation is in place to maximize business solutions while ensuring stability, security, and business continuity.

Figure 2.4: Business Architecture and Continuous Business/IT Alignment

The two-way relationship between business architecture and solution, information, and technology architecture is depicted in Figure 2.4. Continuous business / IT alignment reflects the value of maintaining these interdependent relationships across business and IT. A change in any one of these aligned layers should be transparent, duly assessed to determine reciprocal impacts, clearly linked to a specific business objective, and addressed through a funded initiative.

Business needs, mapped appropriately to IT current and future IT plans, ensures that business objectives are known, quantified, clearly articulated, and linked to business value. Conversely, any IT investment must equally demonstrate a link back to business value. For example, an application change may require significant funding. Architects should be able to trace the planned application process changes back to the business capabilities, value streams, and information it implements, and back to business objectives and link the change to value. A network planning team, for example, should be able to trace the usability of that network up the chain, through the solution architecture and directly into the business architecture. In this way, all technology IT activities can be tied back to business impacts, and business strategy.

Business architecture not only helps identify change impacts and investment focal points derived from a given business strategy, but also provides a basis for business design and innovation analysis.

Consolidated platforms (CP) are emerging as multi-vendor pre-packaged solutions that can be efficient use of resources in operations and release management activities with the providers in an oversight role; however, evaluating the detailed solution for suitability and viable exit planning becomes more complex. CP can be seen as a mid-way solution between complete solution insourcing and complete outsourcing.

3.1.8 IT Strategy Execution

Poor strategy execution is the most significant management challenge facing public and private organizations in the 21st century according to Gartner (Lapkin & Young, 2011).[10]

Figure 2.5: From Chapter 1

All strategies must be grounded with the following rigorous practices:

  • Outline the means for achieving desired outcomes:
    • Specify timeframes and business scope that reflects needs and priorities.
    • Link all IT strategies to business goals and objectives.
    • Create and support a means to generate and capture ideas for innovation and change, and their evaluation.
    • Support change management processes with top down and bottom up validation.
    • Provide properly scaled strategies for business problems.
    • Acknowledge and propose change within known constraints and risks including staffing capability and EA plans.
    • Refer to existing funding and planning engagement processes to move the strategy into portfolios and projects.
    • Create or refer to control processes an organizations that can give oversight to strategy execution (are we doing the right things and are the right things being done well?)
  • Ensure that the strategy is a living document and ‘game plan’:
    • Give targets for strategy achievement and specify reporting to an oversight body.
  • Create and live a culture of collaboration between Business and IT through specification of communications and training plans and change management support.
  • Provide adequate and sustained funding.
  • Propose active monitoring and adjustment of the strategic plan with renewal cycles.

3.2 Governance

IT governance establishes a conformance process and authority to make sure the strategic plan is executed. IT governance accomplishes this by setting into place policies that mandate the instigation of controls in all areas of IT including cost controls reporting, project oversight, service management, risk assessment and management, ethical behaviors, and change control. All of these controls fit within a framework of overall organization controls and policies, and are aligned to them.

To ensure full engagement across the business/IT boundary business and IT executive sponsors provide oversight for IT governance. IT governance must set expectations at all levels in IT for compliance using an enterprise and local interaction model for monitoring, guiding, and reporting. The following guidelines will help in this process:

  • Understand and work through the people side and the organizational side of proposed change and existing culture impacts. This is critical to the long-term success of strategy implementation and oversight (governance) efforts.
  • Establish business/IT collaboration and communication governance model.
  • Ensure that open communication and collaboration from a business-to-business, business-to-IT, and across IT perspectives.
  • Establish collaborative principles, measurements, and escalation procedures as required.
  • Ensure that external regulations and laws, market perspectives, and external perspectives are included.

Lines-of-IT business have their own special concerns that align to overall governance objectives, such as:

  • Security — for example, local objectives and measures for blocking threats
  • Data — for example, prioritizing key financial data for accuracy in transactions
  • Application — for example goals for availability
  • Enterprise architecture — for example, overall IT strategy realization

Figure 2.6: Example of a Business and Governance Engagement Model

Business staff participate at all levels as stewards or subject matter experts in areas such as legal, marketing, manufacturing requiring the IT services, as they set priorities locally that in turn set targets and thresholds for IT performance.

Enterprise architecture domain experts in application, data/information, infrastructure and business provide coaching to work teams on an as-needed basis and are the front-line representatives for IT governance. </p>

3.2.1 Governance Benefits Assessment Realization

Businesses with superior IT governance record 25 percent higher profits than those with poor governance. [11] This type of positive value assessment for IT governance is well established and clearly maps to IT governance objectives of reliable, trusted, responsive and evolving IT synced to business plans and needs.

IT audits are a specialized type of monitoring that challenges the self-reporting on governance metrics by performing direct assessment. [12] Some topics that an audit may cover include:

  • ROI
  • Data quality
  • Inventory of licenses, hardware in use/owned
  • Process performance assurance, rationalization, adherence as required from asserted levels of organization maturity
  • Security assurance
  • Maturity assessment / reassessment
  • Regulatory requirements adherence self-assessment of IT governance
  • Overall assessment of IT

The resulting reports include gaps found and remediation recommendations.

As a line management and also a virtual organization, the costs to establish and operate IT governance can be scaled to meet the strategically sensitive areas for the overall organization. Business and IT share the IT governance responsibility together. Good governance requires exceptional leaders who can communicate across business and IT subject domains.

The value of IT assets may not regularly included on balance sheets, however IT governance will be asked to participate in a valuation at a time of mergers, acquisitions, and liquidations.

3.2.2 Ethics [13]

Ethical behaviors in an organization are judged relative to their cultural and regulatory framework. In some countries, money paid to gain business advantage is neither unethical nor illegal.

  • Ethical assertions should be expressed in IT, tied to the overall business code of ethics, and signed off by all staff so that violations can be cause for reprimand or dismissal.
  • Vendors should be held to similar ethical standards.
  • A code of IT ethics is created, and socialized.
  • Lists of employees who have signed-off on the code are maintained by IT governance.

Some IT ethical topics include those that may also be illegal, such as:

  • Consideration of the social impact of the work at hand — will it cause harm
  • Alignment of business and IT strategies and policies to an ethical standard
  • Incorporation of the ideals of professionalism
  • Adherence to applicable regulatory intent
  • Whistle-blower protection

Call out these things specifically:

  • Activities that interfere with or corrupt the proper function of computers, applications and systems
  • Activities that interfere with others digital privacy, or intellectual rights
  • Respect for confidentiality, privacy, permissions, and access rights
  • Inappropriate bias (skewing) of analysis and/or reporting
  • In-action in the face of likely ethics violations

3.2.3 Policy and Process

IT governance can create numerous policies and processes to establish overall control, or can establish only a few that will drive action in various delivery areas to create and maintain their own local aligned policies and processes. Determination of the right fit for control should be based on risk assessment by IT governance and resulting level of oversight that should be maintained. For example, security policies and processes should typically be set centrally so all areas of the company are measured on exactly the same basis and changes are uniformly applied. Decentralization and therefore more coordinated information management policies and processes may be acceptable in a business that is more product oriented than service (data) oriented.

Even at the initial phase, an overall IT governance policy, driven from an enterprise policy, is required to establish its authority.

3.2.4 Cost Control

Cost control is a central activity in IT Governance. IT products and services are bundled into operations sustainment, major projects, and small changes Business cases for the work are budgeted, prioritized, and funded. See also Change Initiatives.

The business sets priorities for development and operations. Those priorities must consider the factors in the strategic environmental scan. For example, to ensure rapid expansion of business geography plans, methods and designs may be adopted that diverge from the formal IT strategies realizing cost savings. The cost control priority can be important overriding priority that guides possible easing of EA visions and plans for of controlling overall IT system evolution, but at the risk of mounting technical debt.

TCO improvements can be addressed by careful application of strategies, such as:

  • Infrastructure allocation/management
  • Application rationalization
  • Device and data access policies
  • Process assessment (identification of wasted effort)
  • Application lessons learned
  • Feedback loops
  • Process improvement/re-engineering
  • Licensing re-negotiation
  • Various outsourcing initiatives

3.2.5 Investment Concept/Business Case Management

Outside all operations and sustainment work all activities are proposed through a standard funding process as in Figure 2.7.

Figure 2.7: Steps in Business Case Development

Work is prioritized and moved forward into the realization phase based on the business and IT strategic plans within Chapter 4, Change Initiatives. The process is monitored for continuing business alignment and need, feasibility factors, stakeholder interest, resourcing opportunities, competitor activity, new IT tools and approaches, and government requirements on the industry. All of these factors influence the speed at which concepts move through the process or even get dropped entirely from the plan.

Contract management with vendors including outsourcing, licensing, SLA, OLA, cloud computing, project resourcing is also the responsibility of IT governance (see also Chapter 9, Acquisition).

3.2.6 Quality [14]

Quality is a key control in IT governance that is manifested across all policies, processes and procedures. Generally there are two ways of approaching quality. The first is to take a passive approach; in effect to adhere to the idea that quality is “baked-in” to the organization through the policies, processes, and procedures, and where quality controls are established as an output measurement much like in manufacturing environments. The second approach is more active setting out a separate responsibility for quality that establishes responsibility, checks adherence, and advises and reports on quality risk and failures along many points along work streams.

Best practices adoption are an indication of a more mature organization requiring active quality assurance management as part of overall IT governance. For example, Quality standard ISO 9001 applies when an organization:

  • Needs to demonstrate its ability to consistently provide product that meets customer and applicable statutory and regulatory requirements.
  • Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements.

Monitoring and performing impact analysis of regulatory and changes in industry standards is also a quality assurance activity shared with legal and enterprise architecture.

An organization can, address information leakage and misinterpretation with accompanying risk for regulatory and customer exposure to reputation and even fines by adopting data quality assurance stemming from a data governance program. [15]

The following IT functions (Sections 2.2.3-2.2.7) all have quality dimensions to their activities. See also Chapter 6, Quality.

3.2.7 IT Risk Management and Regulatory Compliance [16]

IT policies, standards, and processes all deal with risk to some degree. Policies typically include explicit sections on risk approaches that the organization wants to adopt including any of: IT security policy, IT governance policy, IT financial management policy, data privacy and classification policy, disaster preparedness policy, supply chain management, vendor management, employee ethics, and regulation adherence policy. Risk management in IT involves the following activities:

  • Risk identification — Relevant IT risk profiles on systems are specified. Types of risks are financial, reputational, regulatory (projected and current), security, IT disaster, market innovation speed, and supplier performance.
  • Risk evaluation — All identified risks are evaluated for their severity and likelihood.
  • Risk response — Response plans are generated for the most severe and likely risks. Generally, the response is either to accept the risk and do nothing because likelihood or organization concern is low, to accept the risk and plan contingencies for the occurrence, or to transfer the risk to a third party via insurance.

3.2.8 IT Maturity Management [17]

The maturity of IT functions directly relates to the ability to execute the IT strategy therefore there is a need to assess maturity as an input to a realistic plan and as a guide to maturing IT to desired levels. In other words, unless the IT organization “knows itself,” it can’t make plans to do more or to improve. Adoption of “lessons learned” is a key improvement strategy.

Some principles in mounting and actioning maturity assessments are:

missing bullets??

Business and IT culture and interaction are key elements to capability and performance and cannot be ignored in an evaluation.

Outputs of the maturity analysis are direct inputs to planning and the strategy plan execution roadmap.

Maturity assessment involves scoring against criteria and a ranking scheme; generally organized in ascending steps with strategies on how to move up the maturity scale. Scales are often 1-5 and indicate increasing levels of maturity. Some schemes allow for scoring that includes decimal points (e.g., 2.5).

  1. Performed: Activities are performed in an ad hoc manner
  2. Managed: Activities are performed with managed processes
  3. Defined: Activities are defined so the organization can performed them in a uniformed manner
  4. Measured: Oversight to the performed activities to assure performance and uniformity
  5. Optimized: Continuous improvement processes are in place on the defined and measured processes

Periodic reassessments are performed in order to gauge progress against the baseline assessment and prior periods. Adjustments to the efforts to maintain and improve maturity can then be made against possible strategic priority changes, governance initiatives, and roadmap resets.

Maturity assessment on internationally recognized frameworks generally involve external auditors with certification and recertification requirements. Engagement in the maturity assessment and improvement process requires a minimum level of organization self-awareness to the issues and commitment to the improvements necessary. A cultural readiness, resistance, and capability assessment may be built into a maturity assessment.

  • Bodies of Knowledge guides exist as capability and light maturity assessment frameworks many of which are referenced EITBOK.

CMMI [18] is standard reference model for process improvement with cross sector applicability with special focuses:

  1. Product and service development — CMMI for Development (CMMI-DEV)
  2. Service establishment, management, — CMMI for Services (CMMI-SVC)
  3. Product and service acquisition — CMMI for Acquisition (CMMI-ACQ)
  4. Data management — CMM for Data (CMM-DMM)

When reviewed and areas prioritized by management, a maturity assessment is an input to IT roadmap development for change.

Organizing and communicating for change in order to move up the maturity scale is managed by IT governance.

IT governance also provides ‘reality checks’ on the goals and timing to the desired objectives as materialized through IT change initiatives. (See also Chapter 3, Change Initiatives).

3.2.9 Service Management [19]

Service management in IT will have its own strategic plan encompassing the full system life cycle support from concept to deployment and retirement. It is the IT function that designs and implements control structures within the IT governance framework including:

  • Service strategy — demand and financial management for service portfolio management x ref general IT strategy
  • Service Design — x ref Enterprise Architecture, Requirements, and Design and Construction chapters
  • Service Transition — Transition chapter
  • Service Operations — Operations chapter
  • Continual Service Improvement — measurement, monitoring, reporting including monitoring for compliance, financial performance, monitoring customer and employee satisfaction

3.2.10 Project Management Oversight [20]

Project management is an integral part of IT governance, and a requirement for all change initiatives in IT including new projects, enhancements, upgrades, and significant operations changes. These include traditional IT activities as well as supporting activities such as communications and human resources.

IT governance mandates that project-level controls are initiated and sustained at a level appropriate for the scale of the work that satisfies IT governance reporting requirements. Required project-level controls include quality, cost, risk, schedule, deliverables, process, and authority.

  • All IT activities require a planning horizon and it is IT governance that assures that the adequate resources (including staff, material and funding) are available to approved activities in a timely manner. In this way, IT governance at the CIO-level works closely with vendors, project managers, financial management staff, and suppliers to achieve these aims.
  • The Project Management Office supports a subset of all projects. This formal oversight body is setup to instantiate best repeatable practices in project management and to assist in reporting status. PMO scope is usually limited to those projects holding significant risk to the organization, and/ or significant cost.

3.2.11 IT Portfolio and Program Management

Reporting and oversight is also applied to aggregates of projects into portfolios and programs. IT Portfolios are a set of scoped applications and systems that are closely interrelated; for example, the accounts payable, accounts receivable, and ledger production in an organization. Programs may span portfolios as multi-phase, multi-year initiatives. Project and portfolio grouping allows for more holistic views on change, impact analysis and synergies, business case development, upgrading, operations problem identification, communication and recovery, vendor and business relationship management and multi-project oversight.

Portfolio managers work closely with project managers, architects, operations managers and business users to make sure the relationships and understanding between the business and IT are strong and transparent.

Programs can affect multiple portfolios and often have their own multi-year separate organization structure and board level interest and oversight. In this way, activities are:

  • A new layer of activity, which introduces broader change that impacts large parts of existing IT through replacement, incremental improvements, and significant new approaches, such as mobile application, CP, and cloud computing.
  • Geared tightly to high business priorities and strategies. Every program is directly linked to achieving specific business (and by inheritance IT strategy) goals and objectives.

3.2.12 IT Change Management [21]

The change management function exercises authority to introduce change into the IT environment and is the responsibility of both the business and IT. Governing change management activities occur at varying levels of detail depending on the nature of the change. Any change, whether a commissioning of a new system, an application enhancement, a sustainment activity to maintain operations or corrective action to repair a defect, is approved through governance processes.

  • Changes may be at the strategic re-alignment level as plans and architecture responses move to adjust projects and programs that are prioritized or in-flight, including the possibility of activity shutdown.
  • Changes may be at the operational level, where a Change Control Board or Change Advisory Board approves code or systems, or data changes into the production environments and can include planned and unplanned (emergency) changes, projects and releases.
  • Incidents occurring from change handling activities are reported to IT governance for possible response particularly if additional funding is required for corrective action. Other incident handling occurs at a more local response level.
  • Change patterns are monitored and advice on adjustments to programs and procedures are generated for IT governance consideration.

Chapter 11, Transition, discusses both project and release management including the preparation of the environment prior promotions into production operations.

3.2.13 IT Governance Reporting

Governance reporting keeps an eye on strategic themes, potentials for intervention on processes and projects at-risk and offers opportunities for supported learning and improvement underperforming areas. Appropriate accountability drives change and control authority and can assure that active oversight is in place for handling of possible performance penalties to third parties. See also Chapter 9, Acquisition.

  • Build feedback or action model to ensure that issues are addressed quickly. Review and remediation actions are authorized at the appropriate level.
  • Typical IT governance reporting consists of interval reports to C-level officers in a steering committee, oversight committee, or operations committee with measures of performance and issues from the governance management streams described in brief. Reporting at a board of directors level integrates a smaller set of measures from IT governance.

Metrics [22] standardize the reports and allow tracking of progress over time. Some metrics can be characterized as KPI that are of special significance to IT and business as they are considered to best support the highest priorities.

  • General themes are based on strategic plan, project and operations demands:
    • Adherence to action plan and funding
    • Goal achievement measures (e.g., balanced scorecard)
    • Plan execution achievement
    • Organization change
    • Financial position trending, demand forecast
    • Outstanding work tickets
    • Emergency preparedness /disaster drills results
    • Quality scorecard
  • All metrics should have measurable targets. There are a number of reporting approaches; with scorecard approach being the most common. [23]
  • Participant reporting from IT areas often have more stringent targets set in order to assure higher level aggregate successful target achievement overall. Participant reporting may also combine with other lateral participant reporting metrics in an additive or algorithmic manner to construct higher level metrics and measures.

It is becoming common for senior managers to have compensation in part or in-whole driven by these performance measurement results.

4 Effective Strategy and Governance

IT governance is effective only if cultural and management buy-in are deeply established and carried on in a continuous manner to the appropriate level of management with a communication plan, however that is not even enough to assure governance success. Reasons for ineffective governance include:

  • Compliance activities and reporting without any review, action or consequences
  • Poorly designed engagement model
  • Uneven authority in governance oversight
  • Ineffective delegation of authority
  • Untimely actioning of governance issues
  • Poorly thought out governance metrics (measuring the wrong thing, or encouraging the wrong activities)
  • Inaccurate data collection and spotty reporting
  • Drifting from the enterprise and business strategies over time so that governance is mis-focused

5 Relevant SFIA Skills

  • Business Architecture Team — Enterprise and business architecture development — Business strategy and planning
  • Business Management Team — Business modeling — Business change management
  • Data Management Team Data management — Technical strategy and planning
  • User Experience Team User experience evaluation — Human factors
  • Internal Messaging Team Information management — Information strategy
  • Solution Management Team Enterprise and business architecture development — Business strategy and planning

6 Roles

  • Board of Directors
  • C-Level Officer
  • Business Partner
  • Architect
  • Governance Body
  • Regulatory Authority
  • Stockholder
  • Vendor
  • 7 Standards

    The list of IEEE CS standards is at https://computer.centraldesktop.com/itbok/folder/3895640/#folder:4137641 If you have questions about the standards, ask Chuck.

    Commonly used risk standards include:

    • ISO 31000 2009 — Risk Management Principles and Guidelines
    • A Risk Management Standard — IRM/Alarm/AIRMIC 2002 — developed in 2002 by the UK’s 3 main risk organizations
    • ISO/IEC 31010:2009 — Risk Management — Risk Assessment Techniques
    • COSO 2004 — Enterprise Risk Management — Integrated Framework
    • OCEG “Red Book” 2.0: 2009 — a Governance, Risk and Compliance Capability Model

    8 References

    [1] See also Control Objectives for Information and related Technology (COBIT)

    [2] R. S. Kaplan and D. P. Norton, Strategy Maps: Converting Intangible Assets into Tangible Outcomes (Boston: Harvard Business School Press, 2004)

    [3] http://www.hoshinkanripro.com

    [4] Business Motivation Model (BMM), www.omg.org/spec/BMM

    [5] “A Guide to the Business Architecture Body of Knowledge” (BIZBOK® Guide), Release 4.1, Glossary, Business Architecture Guild, www.businessarchitectureguild.org

    [6] Adapted in part from A Common Perspective on Enterprise Architecture, The Federation of Enterprise Architecture Professional Organizations (FEAPO), 2013, www.feapo.org

    [7] OMG Business Architecture Special Interest Group, http://bawg.omg.org, and Business Architecture Institute, www.businessarchitectureinstitute.org

    [8] “A Guide to the Business Architecture Body of Knowledge” (BIZBOK® Guide), Release 4.1, Section 1, Introduction, Business Architecture Guild, www.businessarchitectureguild.org

    [9] Enterprise Architecture as Strategy: Creating a Foundation for Business Execution. Peter Weill and Jeanne Ross, Harvard Business School Press, 2006.

    [10] A Common Perspective on Enterprise Architecture, The Federation of Enterprise Architecture Professional Organizations (FEAPO), 2013, www.feapo.org

    [11] IT Governance: How Top Performers Manage IT Decision Rights for Superior Results Hardcover. Peter Weill and Jeanne Ross, Harvard Business School Press, 2004.

    [12] See also ITGC — IT Global Controls - Global Technology Audit Guide (GTAG), Institute of Internal Auditors

    [13] See also IEEE Code of Ethics, ACM Code of Ethics and Professional Conduct as examples

    [14] See Also Control Objectives for Information and related Technology (COBIT)

    [15] See also DAMA-DMBOK Guide to the Data Management Body of Knowledge (DAMA-DMBOK), Chapter 4 Data Governance

    [16] See also IT Risk Management guidance - ISACA

    [17] See also Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) for assessing primarily software development processes, but can be applied to other processes.

    [18] Capability and Maturity Model Integration

    [19] See also Information Technology Infrastructure Library (ITIL)

    [20] See also Project Management Institute, Project Management Body of Knowledge guide (PMBOK)

    [21] For Change Management guidance — Project Management Body of Knowledge Chapter 4 Version 5 December 31, 2012

    [22] Metric is the algorithm or mathematical and logical description of how measurement are to be taken. A measurement or measure is a score given at a point in time on that metric.

    [23] R. Kaplan and D. Norton, Using the Balanced Scorecard as a Strategic Management System, July 10, 2015, https://hbr.org/2007/07/using-the-balanced-scorecard-as-a-strategic-management-system