Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

7.4. Sharing Data, Information, and Information Technology (IT) Services

Topic
Previous Page Next Page

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 7 - Acquiring Information Technology

7.4. Sharing Data, Information, and Information Technology (IT) Services

7.4.1. Implementing the DoD Net-Centric Data Strategy

7.4. Sharing Data, Information, and Information Technology (IT) Services

The DoD policy instruction for sharing data and IT services is contained in the issuance: DoD Instruction 8320.02, “Sharing Data, Information, and Information Technology (IT) services in the Department of Defense”, March, 2013.

7.4.1. Implementing the DoD Net-Centric Data Strategy

The instruction provides overarching policy, procedures, and responsibilities for sharing data, information, and IT services in the DoD. It is built upon the goals for these respective areas as defined in the DoD Net-Centric Data Strategy (NCDS) (May 9, 2003) and the DoD Net-Centric Services Strategy (NCSS) (May 4, 2007).

The NCDS outlines the vision for managing data in a net-centric information sharing environment. The strategy compels a shift to a "many-to-many" exchange of data, enabling many users and applications to leverage the same data—extending beyond the previous focus on standardized, predefined, point-to-point interfaces. Hence, the objectives are to ensure that all data are visible, available, and usable—when needed and where needed—to accelerate decision cycles. Specifically, the data strategy describes 7 major net-centric data goals as presented in Table 7.4.1.T1, below.

 

Table 7.4.1.T1. Net-Centric Data Strategy Goals

Goal

Description

Goals to increase Enterprise and community data over private user and system data

Visible

Users and applications can discover the existence of data assets through catalogs, registries, and other search services. All data assets (intelligence, no intelligence, raw, and processed) are advertised or "made visible" by providing metadata, which describes the asset.

Accessible

Users and applications post data to a "shared space." Posting data implies that (1) descriptive information about the asset (metadata) has been provided to a catalog that is visible to the Enterprise and (2) the data is stored such that users and applications in the Enterprise can access it. Data assets are made available to any user or application except when limited by policy, regulation, or security.

Institutionalize

Data approaches are incorporated into Department processes and practices. The benefits of Enterprise and community data are recognized throughout the Department.

Goals to increase use of Enterprise and community data

Understandable

Users and applications can comprehend the data, both structurally and semantically, and readily determine how the data may be used for their specific needs.

Trusted

Users and applications can determine and assess the authority of the source because the pedigree, security level, and access control level of each data asset is known and available.

Interoperable

Many-to-many exchanges of data occur between systems, through interfaces that are sometimes predefined or sometimes unanticipated. Metadata is available to allow mediation or translation of data between interfaces, as needed.

Responsive to User Needs

Perspectives of users, whether data consumers or data producers, are incorporated into data approaches via continual feedback to ensure satisfaction.

The NCSS outlines a vision to establish Web services (referred to as services hereafter) as the preferred means by which data producers and capability providers make their data assets and capabilities available across the DoD and beyond. It also establishes services as the preferred means by which consumers can access and use these data assets and capabilities. As with data, services are to be made visible, accessible, understandable, and trusted. Specifically, the services strategy describes 3 major net-centric services goals as presented in Table 7.4.1 T2, below.

Table 7.4.1 T2 Net-Centric Services Strategy Goals

Goal

Description

Provide Services

Make information and functional capabilities available as appropriately secure services on the network.

Use Services

Use existing services to satisfy mission needs before creating duplicative capabilities.

Govern the Infrastructure and Services

Establish the policies and procedures for a single set of common standards, rules, and shared secure infrastructure and services throughout the DoD Enterprise to ensure interoperability.

Monitor and Manage Services via GIG NetOps

Implement services in accordance with DoD's GIG NetOps Strategy and concept of operations to ensure situational awareness of the NCE.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifForeword
https://acc.dau.mil/UI/img/bo/plus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/plus.gif2.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif2.1. Program Strategies—General
https://acc.dau.mil/UI/img/bo/plus.gif2.2. Program Strategy Document...
https://acc.dau.mil/UI/img/bo/plus.gif2.3. Program Strategy Relationship to...
https://acc.dau.mil/UI/img/bo/plus.gif2.4. Relationship to Request for...
https://acc.dau.mil/UI/img/bo/plus.gif2.5. Program Strategy Classification...
https://acc.dau.mil/UI/img/bo/plus.gif2.6. Program Strategy Document Approval...
https://acc.dau.mil/UI/img/bo/plus.gif2.7. Acquisition Strategy versus...
https://acc.dau.mil/UI/img/bo/plus.gif2.8. Technology Development...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gif3.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif3.1. Life-Cycle Costs/Total Ownership...
https://acc.dau.mil/UI/img/bo/plus.gif3.2. Affordability
https://acc.dau.mil/UI/img/bo/plus.gif3.3. Analysis of Alternatives
https://acc.dau.mil/UI/img/bo/plus.gif3.4. Cost Estimation for Major Defense...
https://acc.dau.mil/UI/img/bo/plus.gif3.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif3.6. Major Automated Information Systems...
https://acc.dau.mil/UI/img/bo/plus.gif3.7. Principles for Life-Cycle Cost...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/plus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/plus.gif7.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif7.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif7.2. DoD Information Enterprise
https://acc.dau.mil/UI/img/bo/minus.gif7.3. Interoperability and Supportability...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.2. Mandatory Policies
https://acc.dau.mil/UI/img/bo/plus.gif7.3.3. Interoperability and...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.4. Net-Ready Key Performance...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.5. Net-Ready Key Performance...
https://acc.dau.mil/UI/img/bo/minus.gif7.3.6. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.2. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.3. Estimated Information Support...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.6. Points of Contacts
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.7. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.8. Tailored Information Support...
https://acc.dau.mil/UI/img/bo/minus.gif7.3.6.9. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.4. Sharing Data, Information, and...
https://acc.dau.mil/UI/img/bo/plus.gif7.5. Information Assurance (IA)
https://acc.dau.mil/UI/img/bo/plus.gif7.6. Electromagnetic Spectrum
https://acc.dau.mil/UI/img/bo/plus.gif7.7. Accessibility of Electronic and...
https://acc.dau.mil/UI/img/bo/minus.gif7.8. The Clinger-Cohen Act (CCA) --...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.4. Title 40/Clinger-Cohen Act (CCA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.5. Other Title 40/Clinger-Cohen Act...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.6. Title 40 Subtitle...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.7. Procedure for Risk-Based...
https://acc.dau.mil/UI/img/bo/plus.gif7.9. Post-Implementation Review (PIR)
https://acc.dau.mil/UI/img/bo/plus.gif7.10. Commercial Off-the-Shelf (COTS)...
https://acc.dau.mil/UI/img/bo/plus.gif7.11. Space Mission Architectures
https://acc.dau.mil/UI/img/bo/plus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/plus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif13.1 The Program Protection Process
https://acc.dau.mil/UI/img/bo/plus.gif13.2 The Program Protection Plan (PPP)
https://acc.dau.mil/UI/img/bo/plus.gif13.3 Critical Program Information (CPI)...
https://acc.dau.mil/UI/img/bo/plus.gif13.4. Intelligence and...
https://acc.dau.mil/UI/img/bo/plus.gif13.5. Vulnerability Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.6. Risk Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.7. Countermeasures
https://acc.dau.mil/UI/img/bo/plus.gif13.8. Horizontal Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.9. Foreign Involvement
https://acc.dau.mil/UI/img/bo/plus.gif13.10. Managing and Implementing PPPs
https://acc.dau.mil/UI/img/bo/plus.gif13.11. Compromises
https://acc.dau.mil/UI/img/bo/plus.gif13.12. Costs
https://acc.dau.mil/UI/img/bo/plus.gif13.13. Contracting
https://acc.dau.mil/UI/img/bo/plus.gif13.14. Detailed System Security...
https://acc.dau.mil/UI/img/bo/plus.gif13.15. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gif13.16. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gif14.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif14.1. Introduction to the Acquisition of...
https://acc.dau.mil/UI/img/bo/plus.gif14.2. The Planning Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.3. The Development Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.4. The Execution Phase
https://acc.dau.mil/UI/img/bo/plus.gifAppendix A -- REQUIREMENTS ROADMAP...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix B -- SERVICE ACQUISITION...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix C -- SERVICE ACQUISITION MALL...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix D -- MARKET RESEARCH RESOURCES
https://acc.dau.mil/UI/img/bo/plus.gifAppendix E -- GLOSSARY
https://acc.dau.mil/UI/img/bo/minus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifENCLOSURE 1 ADDITIONAL POLICY
https://acc.dau.mil/UI/img/bo/plus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/minus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/plus.gifDownload the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifWeapon Systems Acquisition Reform Act of...
https://acc.dau.mil/UI/img/bo/minus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/plus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9