Ise enterprise architecture and common standards program
1 / 17

ISE Enterprise Architecture and Common Standards Program - PowerPoint PPT Presentation

  • Uploaded on

ISE Enterprise Architecture and Common Standards Program. IRTPA Section 1016: Creating the ISE. Section 1016, as amended*: “ The President shall –

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'ISE Enterprise Architecture and Common Standards Program' - velma

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Irtpa section 1016 creating the ise
IRTPA Section 1016: Creating the ISE

  • Section 1016, as amended*:

  • “The President shall –

  • create an information sharing environment for the sharing of terrorism information in a manner consistent with national security and with applicable legal standards relating to privacy and civil liberties;

  • designate the organizational and management structures that will be used to operate and manage the ISE; and

  • determine and enforce the policies, directives, and rules that will govern the content and usage of the ISE.”

President George W. Bush on signing

the Intelligence Reform and Terrorist Prevention Act

17 December 2004

* The Implementing Recommendations of the 9/11 Commission Act of 2007, enacted in August of this year, included amendments to section 1016. The new law expands the scope of the ISE to explicitly include homeland security and terrorism-related weapons of mass destruction information.


National strategy for information sharing
National Strategy for Information Sharing

  • National Strategy for Information Sharing: Success and Challenges in Improving Terrorism-Related Information Sharing issued on October 31, 2007 by President Bush

  • Prioritizes and unifies the Nation’s efforts to advance the sharing of terrorism-related information


Elements of national strategy for information sharing
Elements of National Strategy for Information Sharing

The Strategy will help ensure those responsible for combating terrorism and protecting our local communities have access to the timely and accurate information they need by:

  • Providing a framework for enhanced information sharing among Federal, State, local, and tribal officials, the private sector, and foreign partners

  • Describing the Federal Government's approach to support State and major urban area fusion centers

  • Protecting the legal rights of Americans especially in the area of privacy and civil liberties


Ise implementation plan
ISE Implementation Plan

  • Responds to 11 specific IRTPA requirements

  • DNI sent to Congress - Nov06

  • Described the vision and strategic goals for the future ISE

  • Laid out two-phase implementation approach

    • Phase 1: Nov 2006 – June 2007

    • Phase 2: July 2007 – June 2009

  • Incorporated responses to Presidential Information Sharing Guidelines

  • Defines ISE Enterprise Architecture Framework and common standards (chapter 6)

Who is the ise
Who is the ISE?

Multiple Communities of Interest

Multiple User Types

Multiple Governmental and Non-governmental Entities





Terrorism Info(Terrorism, Homeland Security, and WMD and Law Enforcement as it relates to Terrorism)

Command & Control

Law Enforcement



Homeland Security




State, Local, Tribal


Private Sector

Foreign Partners


Why ise architecture and common standards program
Why ISE Architecture and Common Standards Program?

  • The Problem

    • Need to weave together cross-agency, cross domain, national security and civil processes and systems to support the requirements of the ISE

    • Factors in responding to the problem

      • National security and homeland security processes and resources

      • Controlled Unclassified Information (CUI)

      • Privacy and civil liberties protections

      • Domestic intelligence - foreign intelligence

      • Seamless Federal, state, local, and tribal integration

      • Investment Strategies (consistent with governmental guidelines)

    • Acknowledgment this is a new, undefined area for government

  • Federal law and Presidential direction

    • IRTPA (December 2004)

    • Presidential Guidelines (December 16, 2005 Presidential Memo)

    • National Strategy for Information Sharing (October 2007)


Ise enterprise architecture framework version 1 0
ISE Enterprise Architecture Framework, Version 1.0

  • Purpose

    • Provide a terrorism information sharing dimension across civil and national security enterprise architectures

    • Meet IRTPA direction to “plan for” the ISE using technology

    • Aid ISE participants with integration and connection guidance to the ISE


Impact of an eaf for the ise
Impact of an EAF for the ISE

Core Services


IA Security



Enterprise Management


User Assistance



  • ISE EAF will enable the ISE by:

  • Translating ISE business process needs into a cohesive and aligned investment strategy

  • Identifying policy areas

  • Provide a program management tool for building the ISE (oversee implementation of ISE)

ISE Portal

Service Registration

ISE Documentation

ISE Status

Service Discovery

User Assistance

Search Tools

Portal Hosting

Admin Alerts




ISE Space


ISE Space


Information Sharing Environment

  • ISE EAF Aligned with the FEA

  • Priorities aligned with strategic plans and executive level direction.

  • Proactive and collaborative across the Federal government

  • Architecture development is an integral part of the capital investment process. No investment should be made without a business-driven architecture.


  • Impacts across three disciplines:

  • Business Processes

  • Policy

  • Technology

Ise eaf application and services
ISE EAF: Application and Services

  • ISE Shared Space:

  • Common Terrorism Information Sharing Standards.

  • Common IA model.





Fea ise profile version 1 0
FEA-ISE Profile, Version 1.0

  • Purpose

    • A companion document to the ISE EAF, Version 1.0 (released 30 Aug ‘07)

    • Describes how agencies use existing resources, standards, best practices and use cases to implement ISE attributes and connect to the ISE

    • Communicated compliance through OMB’s Federal Transition Framework Catalog

    • Current OMB Profiles

      • Security and Privacy

      • Geospatial

      • Records Management


Using the ise eaf and fea ise profile
Using the ISE EAF and FEA-ISE Profile

Version 1.0 (December 2006)

  • ISE Business Processes

  • ISE Performance Metrics

ISE Enterprise





Agency Capital Planning &

Investment Control (CPIC)

Process >> Exhibits 53 & 300

Department/Agency X

FEA-ISE Profile

System X Architecture

System X

Dept/ Agency X EA

ISE Core

System I Architecture

ISE Core Component Specs

System I

  • EAF: Enterprise Architecture Framework

  • FEA: Federal Enterprise Architecture

  • FTF: Federal Transition Framework


Ise standards objective
ISE Standards Objective

“The ISE must, to the extent possible, be supported by common standards that maximize the acquisition, access, retention, production, use, management, and sharing of terrorism information within the ISE consistent with the protection of intelligence, law enforcement, protective, and military sources, methods, and activities.”

President’s Memorandum for the Heads

of Executive Departments and Agencies

December 16, 2005


Taxonomy of the ctiss
Taxonomy of the CTISS

CTISS Program


Functional standards: Rules, conditions, guidelines, and characteristics

of data, mission products, and detailed operational activity supporting ISE

business process areas.

Technical standards: Specific technical methodologies and practices

to design and implement information sharing capability into ISE systems.


Common terrorism information sharing standards
Common Terrorism Information Sharing Standards

  • Better terrorism-related information sharing through standard formats, rules and conditions

  • Relationships established with the National Information Exchange Model and DOD/IC U-Core to assist in developing and harmonizing standards across the ISE




Ken Clark

Office of the PM-ISE


[email protected]