7.4. Sharing Data, Information, and Information Technology (IT) Services
7.4.1. Implementing the DoD Net-Centric Data Strategy
7.4. Sharing Data, Information, and Information Technology (IT) Services
The DoD policy instruction for sharing data and IT services is contained in the issuance: DoD Instruction 8320.02, “Sharing Data, Information, and Information Technology (IT) services in the Department of Defense”, March, 2013.
7.4.1. Implementing the DoD Net-Centric Data Strategy
The instruction provides overarching policy, procedures, and responsibilities for sharing data, information, and IT services in the DoD. It is built upon the goals for these respective areas as defined in the DoD Net-Centric Data Strategy (NCDS) (May 9, 2003) and the DoD Net-Centric Services Strategy (NCSS) (May 4, 2007).
The
NCDS outlines the vision for managing data in a net-centric information sharing environment.
The strategy compels a shift to a "many-to-many" exchange of data, enabling many users and applications to leverage the same data—extending beyond the previous focus on standardized, predefined, point-to-point interfaces. Hence, the objectives are to ensure that all data are visible, available, and usable—when needed and where needed—to accelerate decision cycles. Specifically, the data strategy describes 7 major net-centric data goals as presented in Table 7.4.1.T1, below.
Table 7.4.1.T1. Net-Centric Data Strategy Goals
Goal
|
Description
|
Goals to increase Enterprise and community data over private user and system data
|
Visible
|
Users and applications can discover the existence of data assets through catalogs, registries, and other search services. All data assets (intelligence, no intelligence, raw, and processed) are advertised or "made visible" by providing metadata, which describes the asset.
|
Accessible
|
Users and applications post data to a "shared space." Posting data implies that (1) descriptive information about the asset (metadata) has been provided to a catalog that is visible to the Enterprise and (2) the data is stored such that users and applications in the Enterprise can access it. Data assets are made available to any user or application except when limited by policy, regulation, or security.
|
Institutionalize
|
Data approaches are incorporated into Department processes and practices. The benefits of Enterprise and community data are recognized throughout the Department.
|
Goals to increase use of Enterprise and community data
|
Understandable
|
Users and applications can comprehend the data, both structurally and semantically, and readily determine how the data may be used for their specific needs.
|
Trusted
|
Users and applications can determine and assess the authority of the source because the pedigree, security level, and access control level of each data asset is known and available.
|
Interoperable
|
Many-to-many exchanges of data occur between systems, through interfaces that are sometimes predefined or sometimes unanticipated. Metadata is available to allow mediation or translation of data between interfaces, as needed.
|
Responsive to User Needs
|
Perspectives of users, whether data consumers or data producers, are incorporated into data approaches via continual feedback to ensure satisfaction.
|
The NCSS outlines a vision to establish Web services (referred to as services hereafter) as the preferred means by which data producers and capability providers make their data assets and capabilities available across the DoD and beyond. It also establishes services as the preferred means by which consumers can access and use these data assets and capabilities. As with data, services are to be made visible, accessible, understandable, and trusted. Specifically, the services strategy describes 3 major net-centric services goals as presented in Table 7.4.1 T2, below.
Table 7.4.1 T2 Net-Centric Services Strategy Goals
Goal
|
Description
|
Provide Services
|
Make information and functional capabilities available as appropriately secure services on the network.
|
Use Services
|
Use existing services to satisfy mission needs before creating duplicative capabilities.
|
Govern the Infrastructure and Services
|
Establish the policies and procedures for a single set of common standards, rules, and shared secure infrastructure and services throughout the DoD Enterprise to ensure interoperability.
|
Monitor and Manage Services via GIG NetOps
|
Implement services in accordance with DoD's GIG NetOps Strategy and concept of operations to ensure situational awareness of the NCE.
|