This is the accessible text file for GAO report number GAO-09-586 entitled 'DOD Business Systems Modernization: Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed' which was released on May 18, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Committees: United States Government Accountability Office: GAO: May 2009: DOD Business Systems Modernization: Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed: GAO-09-586: GAO Highlights: Highlights of GAO-09-586, a report to congressional committees. Why GAO Did This Study: Since 1995, GAO has designated the Department of Defense’s (DOD) business systems modernization program as high risk, and it continues to do so today. To assist in addressing DOD’s business system modernization challenges, the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (the Act) contains provisions that require the department to take certain actions and to annually report to its congressional committees on these actions. The Act also directs GAO to review each annual report. In response, GAO performed its fifth annual review of DOD’s actions to comply with key aspects in the Act and related federal guidance. To do so, GAO reviewed, for example, the latest version of DOD’s business enterprise architecture (BEA) and transition plan, investment management policies and procedures, and information in the department’s business system data repositories. What GAO Found: The pace of DOD’s progress in defining and implementing key institutional modernization management controls has slowed compared with progress made in each of the last 4 years, leaving much still to be accomplished to fully implement the Act’s requirements and related guidance. In particular, * The corporate BEA continues to evolve and address previously identified missing elements, inconsistencies, and usability issues, but gaps still remain. For example, while the BEA now identifies information assurance laws, regulations, and policies, it still does not include business rules for all business processes. Further, little progress has been made in the last year in extending (i.e., federating) the BEA to the entire family of business mission area architectures, including using an independent verification and validation agent to assess the components’ subsidiary architectures and federation efforts. * The updated enterprise transition plan continues to identify systems and initiatives, but important elements are still missing, as are individual component plans. For example, while the plan provides a range of information, such as budgets and performance measures, for key enterprisewide and component-specific investments, it is missing information on identified investments. * The fiscal year 2009 budget submission included some, but omitted other, key information about business system investments, in part because of the lack of a reliable comprehensive inventory of all defense business systems. * Investment approval and accountability structures have been established for DOD and the Air Force, and related policies and procedures that are consistent with relevant guidance have been partially defined. However, these structures and processes are still lacking for the Navy. * Business system investments costing over $1 million continue to be certified and approved, but these decisions are not always based on complete information. For example, key Navy investments have not fully demonstrated compliance with the department’s BEA, and their economic justifications were not based on reliable estimates of cost and benefits. In addition, the information in DOD’s authoritative repository of system investments that is used to make these decisions is not always accurate. Department officials attributed this slowdown in large part to pending decisions surrounding the roles, responsibilities, authorities, and relationships among key senior leadership positions, such as DOD’s Deputy Chief Management Officer and the military departments’ Chief Management Officers. Until DOD fully implements these long-standing institutional modernization management controls provided for under the Act, addressed in GAO recommendations, and otherwise embodied in relevant guidance, its business systems modernization will likely remain a high-risk program. As a result, it is important that the department act quickly to resolve pending decisions about key positions. What GAO Recommends: Because GAO has existing recommendations that address most of the weaknesses discussed in this report, it reiterates these recommendations and further recommends that DOD resolve the issues surrounding key modernization management positions and the quality of investment-related information. DOD partially agreed with GAO’s recommendations and described either commitments or actions being planned or under way to partially address them. View [hyperlink, http://www.gao.gov/products/GAO-09-586] or key components. For more information, contact Randolph C. Hite at (202) 512- 3439 or hiter@gao.gov. [End of section] Contents: Letter: Background: DOD Continues to Take Steps to Strengthen Management of Its Business Systems Modernization, but Long-standing Challenges Remain: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objective, Scope, and Methodology: Appendix II: Comments from the Department of Defense: Appendix III: GAO Contact and Staff Acknowledgments: Tables: Table 1: DOD Business Systems Modernization Governance Entities' Roles, Responsibilities, and Composition: Table 2: DOD Investment Tiers: Figures: Figure 1: Simplified DOD Organization Structure: Figure 2: The Five ITIM Stages of Maturity with Critical Processes: Figure 3: Conceptual Representation of DOD's Business Mission Area Federated Architecture: Abbreviations: ASD(NII)/DOD CIO: Assistant Secretary of Defense (Networks and Information Integration)/Department of Defense Chief Information Officer: BEA: business enterprise architecture: BTA: Business Transformation Agency: CIO: Chief Information Officer: CMO: Chief Management Officer: DBSMC: Defense Business Systems Management Committee: DITPR: Defense Information Technology Portfolio Repository: DOD: Department of Defense: ETP: enterprise transition plan: IRB: Investment Review Board: IT: information technology: IV&V: independent verification and validation: ITIM: Information Technology Investment Management: NDAA: National Defense Authorization Act: OMB: Office of Management and Budget: SNAP-IT: Select and Native Programming Data Input System-Information Technology: [End of section] United States Government Accountability Office: Washington, DC 20548: May 18, 2009: Congressional Committees: For decades, the Department of Defense (DOD) has been challenged in modernizing its timeworn business systems.[Footnote 1] In 1995, we designated DOD's business systems modernization program as high risk, and we continue to designate it as such today.[Footnote 2] As our research on public and private sector organizations shows, two essential ingredients to a successful systems modernization program are having a well-defined enterprise architecture and an effective institutional approach to managing information technology (IT) investments.[Footnote 3] Accordingly, we made recommendations to the Secretary of Defense in May 2001 that included the means for effectively developing an enterprise architecture and establishing a corporate, architecture-centric approach to investment control and decision making.[Footnote 4] Between 2001 and 2005, we reported that the department's business systems modernization program continued to lack both of these, concluding in 2005 that hundreds of millions of dollars had been spent on a business enterprise architecture (BEA) and investment management structures that had limited value.[Footnote 5] Accordingly, we made more explicit architecture and investment management-related recommendations. To further assist DOD in addressing these modernization management challenges, Congress included provisions in the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 (the Act) that were consistent with our recommendations.[Footnote 6] More specifically, the Act requires the department to, among other things, (1) develop a BEA, (2) develop a transition plan to implement the architecture, (3) identify systems information in its annual budget submission, (4) establish a system investment approval and accountability structure, (5) establish an investment review process, and (6) certify and approve any system modernizations costing in excess of $1 million. The Act further requires that the Secretary of Defense submit an annual report to congressional defense committees on DOD's compliance with certain requirements of the Act not later than March 15 of each year from 2005 through 2009. Additionally, the Act directs us to submit to these congressional committees--within 60 days of DOD's report submission--an assessment of DOD's actions to comply with these requirements. As agreed with your offices, the objective of our review was to assess the actions taken by DOD to comply with requirements of section 2222 of Title 10, U.S. Code. To accomplish this, we used our prior annual report under the Act as a baseline, analyzing whether the department had taken actions to comply with those requirements, related guidance, and our prior recommendations that we previously identified as not yet addressed.[Footnote 7] In doing this, we also relied on the results of relevant reports that we have issued since our prior annual report. [Footnote 8] We also reviewed the department's report to Congress, which was submitted on March 18, 2009, and evaluated the information used to satisfy the budget submission and investment review, certification, and approval aspects of the Act. We conducted this performance audit at DOD offices in Arlington, Virginia, from January to May 2009, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Details on our objective, scope, and methodology are contained in appendix I. Background: DOD is a massive and complex organization and is entrusted with more taxpayer dollars than any other federal department or agency. To illustrate, Congress provided DOD with about $512 billion in appropriations for fiscal year 2009. Additionally, Congress has provided about $808 billion in supplemental emergency funding for operations in support of the Global War on Terrorism since 2001. Moreover, the recent American Recovery and Reinvestment Act of 2009 contains nearly $12.6 billion in appropriations for DOD for military construction, environmental restoration, and other purposes. Organizationally, the department includes the Office of the Secretary of Defense, the Joint Chiefs of Staff, the military departments, numerous defense agencies and field activities, and various unified combatant commands that are responsible for either specific geographic regions or specific functions. (See figure 1 for a simplified depiction of DOD's organizational structure.) Figure 1: Simplified DOD Organization Structure: [Refer to PDF for image: illustration of the DOD Organizational Structure] Top level: * Secretary of Defense; * Deputy Secretary of Defense[A]. Next level, reporting to the Secretary of Defense: * Department of the Army; * Department of the Navy; * Department of the Air Force; * Office of the Secretary of Defense: * DOD field activities; - Defense agencies; - Inspector General; * Joint Chiefs of Staff; * Combatant commands[B]. Source: GAO based on DOD documentation. [A] The Deputy Secretary of Defense serves as the Chief Management Officer, who provides focused and sustained leadership over DOD's business transformation efforts. [B] The Chairman of the Joint Chiefs of Staff serves as the spokesman for the commanders of the combatant commands, especially on the administrative requirements of the commands. [End of figure] In support of its military operations, the department performs an assortment of interrelated and interdependent business functions, including logistics management, procurement, health care management, and financial management. As we have previously reported, the DOD systems environment that supports these business functions is overly complex and error prone, and is characterized by (1) little standardization across the department, (2) multiple systems performing the same tasks, (3) the same data stored in multiple systems, and (4) the need for data to be entered manually into multiple system[Footnote 9]s. Moreover, the department recently reported that this systems environment is composed of approximately 2,480 separate business systems. For fiscal year 2009, DOD requested about $15.3 billion in funds to operate, maintain, and modernize these business systems and associated IT infrastructure. As we have previously reported, the department's nonintegrated and duplicative systems impair its ability to combat fraud, waste, and abuse.[Footnote 10] In fact, DOD currently bears responsibility, in whole or in part, for 15 of our 30 high-risk areas.[Footnote 11] Eight of these areas are specific to the department,[Footnote 12] while it shares responsibility for 7 other governmentwide high-risk areas. [Footnote 13] Collectively, these high-risk areas relate to DOD's major business operations that are inextricably linked to the department's ability to perform its overall mission, directly affect the readiness and capabilities of U.S. military forces, and can affect the success of a mission. DOD's business systems modernization is one of the high-risk areas, and it is an essential enabler to addressing many of the department's other high-risk areas. For example, modernized business systems are integral to the department's efforts to address its financial, supply chain, and information security management high-risk areas. Enterprise Architecture and IT Investment Management Controls Are Critical to Achieving Successful Systems Modernization: Effective use of an enterprise architecture--a modernization blueprint-- is a hallmark of successful public and private organizations. Since the early 1990s, we have promoted the use of architectures to guide and constrain systems modernization, recognizing them as a crucial means to meeting this challenging goal: optimally defined operational and technological environments. Congress, the Office of Management and Budget (OMB), and the federal Chief Information Officers (CIO) Council have also recognized the importance of an architecture-centric approach to modernization. The Clinger-Cohen Act of 1996 mandates that an agency's CIO develop, maintain, and facilitate the implementation of an information technology architecture.[Footnote 14] Further, the E- Government Act of 2002 requires OMB to oversee the development of enterprise architectures within and across agencies.[Footnote 15] In addition, we, OMB, and the CIO Council have issued guidance that emphasizes the need for system investments to be consistent with these architectures.[Footnote 16] For example, in April 2003, we issued a framework that emphasizes the importance of having an enterprise architecture as a critical frame of reference for organizations when they are making IT investment decisions.[Footnote 17] Also, in December 2008, OMB issued guidance that addresses system investment compliance with agency architectures.[Footnote 18] A corporate approach to IT investment management is another important characteristic of successful public and private organizations. Recognizing this, Congress enacted the Clinger-Cohen Act of 1996, [Footnote 19] which requires OMB to establish processes to analyze, track, and evaluate the risks and results of major capital investments in IT systems made by executive agencies.[Footnote 20] In response to the Clinger-Cohen Act and other statutes, OMB has developed policy and issued guidance for planning, budgeting, acquisition, and management of federal capital assets.[Footnote 21] We have also issued guidance in this area that defines institutional structures (such as investment boards), processes for developing information on investments (such as cost/benefit), and practices to inform management decisions (such as whether a given investment is aligned with an enterprise architecture. [Footnote 22] Enterprise Architecture: A Brief Description: An enterprise architecture provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., a federal department) or a functional or mission area that cuts across more than one organization (e.g., financial management). An architecture describes the enterprise in logical terms (such as interrelated business processes and business rules, information needs and flows, and work locations and users) as well as in technical terms (such as hardware, software, data, communications, security attributes, and performance standards). It provides these perspectives both for the enterprise's current, or "as is," environment, and for its target, or "to be," environment, and it provides a transition plan for moving from the "as is" to the "to be" environment. This transition plan provides a temporal road map for moving between the two environments and incorporates such considerations as technology opportunities, marketplace trends, fiscal and budgetary constraints, institutional system development and acquisition capabilities, legacy and new system dependencies and life expectancies, and the projected value of competing investments. The suite of products produced for a given entity's enterprise architecture, including its structure and content, is largely governed by the framework used to develop the architecture. Since the 1980s, various architecture frameworks have been developed, such as John A. Zachman's "A Framework for Information Systems Architecture"[Footnote 23] and the DOD Architecture Framework.[Footnote 24] The importance of developing, implementing, and maintaining an enterprise architecture is a basic tenet of both organizational transformation and systems modernization. Managed properly, an enterprise architecture can clarify and help optimize the interdependencies and relationships among an organization's business operations and the underlying IT infrastructure and applications that support these operations. Moreover, when an enterprise architecture is employed in concert with other important management controls, such as portfolio-based capital planning and investment control practices, architectures can greatly increase the chances that an organization's operational and IT environments will be configured to optimize mission performance. The alternative, as our work has shown, is the perpetuation of the kinds of operational environments that burden many agencies today, where a lack of integration among business operations and the IT resources supporting them leads to systems that are duplicative, poorly integrated, and unnecessarily costly to maintain and interface.[Footnote 25] Our framework provides federal agencies with a common benchmarking tool for planning and measuring their efforts to improve enterprise architecture management.[Footnote 26] One approach to structuring an enterprise architecture is referred to as a federated enterprise architecture. Such a structure treats the architecture as a family of coherent but distinct member architectures that conform to an overarching architectural view and rule set. This approach recognizes that each member of the federation has unique goals and needs as well as common roles and responsibilities with the levels above and below it. Under a federated approach, member architectures are substantially autonomous, although they also inherit certain rules, policies, procedures, and services from higher-level architectures. As such, a federated architecture gives autonomy to an organization's components while ensuring enterprisewide linkages and alignment where appropriate. Where commonality among components exists, there are also opportunities for identifying and leveraging shared services. A service-oriented architecture is an approach for sharing business capabilities across the enterprise by designing functions and applications as discrete, reusable, and business-oriented services. As such, service orientation permits sharing capabilities that may be under the control of different component organizations. As we have previously reported, such capabilities or services need to be, among other things, (1) self-contained, meaning that they do not depend on any other functions or applications to execute a discrete unit of work; (2) published and exposed as self-describing business capabilities that can be accessed and used; and (3) subscribed to via well-defined and standardized interfaces.[Footnote 27] A service-oriented architecture approach is thus intended not only to reduce redundancy and increase integration, but also to provide the kind of flexibility needed to support a quicker response to changing and evolving business requirements and emerging conditions. IT Investment Management: A Brief Description: IT investment management is a process for linking IT investment decisions to an organization's strategic objectives and business plans that focuses on selecting, controlling, and evaluating investments in a manner that minimizes risks while maximizing the return of investment.[Footnote 28] * During the selection phase, the organization (1) identifies and analyzes each project's risks and returns before committing significant funds to any project and (2) selects those IT projects that will best support its mission needs. * During the control phase, the organization ensures that as projects develop and investment expenditures continue, they continue to meet mission needs at the expected levels of cost and risk. If the project is not meeting expectations, or if problems arise, steps are quickly taken to address the deficiencies. * During the evaluation phase, actual versus expected results are compared once a project has been fully implemented. This is done to (1) assess the project's impact on mission performance, (2) identify any changes or modifications to the project that may be needed, and (3) revise the investment management process based on lessons learned. Consistent with this guidance, our IT Investment Management (ITIM) framework consists of five progressive stages of maturity for any given agency relative to selecting, controlling, and evaluating its investment management capabilities.[Footnote 29] (See figure 2 for the five ITIM stages of maturity.) The overriding purpose of the framework is to encourage investment selection and control and to evaluate processes that promote business value and mission performance, reduce risk, and increase accountability and transparency. We have used the framework in several of our evaluations, and a number of agencies have adopted it.[Footnote 30] In our ITIM framework, with the exception of the first stage, each maturity stage is composed of "critical processes" that must be implemented and institutionalized in order for the organization to achieve that stage. Each ITIM critical process consists of "key practices"--to include organizational structures, policies, and procedures--that must be executed to implement the critical process. Our research shows that agency efforts to improve investment management capabilities should focus on implementing all lower-stage practices before addressing higher-stage practices. Figure 2: The Five ITIM Stages of Maturity with Critical Processes: [Refer to PDF for image: illustration] Maturity Stage: Stage 1: Creating investment awareness; Critical processes: * IT spending without disciplined investment processes. Maturity Stage: Stage 2: Building the investment foundation; Critical processes: * Instituting the investment board; * Meeting business needs; * Selecting an investment; * Providing investment oversight; * Capturing investment information. Maturity Stage: Stage 3: Developing a complete investment portfolio; Critical processes: * Defining the portfolio criteria; * Creating the portfolio; * Evaluating the portfolio; * Conducting postimplementation reviews. Maturity Stage: Stage 4: Improving the investment process; Critical processes: * Improving the portfolio's performance; * Managing the succession of information systems. Maturity Stage: Stage 5: Leveraging IT for strategic outcomes. Critical processes: * Optimizing the investment process; * Using IT to drive strategic business change. Source: GAO. [End of figure] Stage 2 critical processes lay the foundation by establishing successful, predictable, and repeatable investment control processes at the project level. Stage 3 is where the agency moves from project- centric processes to portfolio-based processes and evaluates potential investments according to how well they support the agency's missions, strategies, and goals. Organizations implementing these Stage 2 and 3 practices have in place selection, control, and evaluation processes that are consistent with the Clinger-Cohen Act.[Footnote 31] Stages 4 and 5 require the use of evaluation techniques to continuously improve both investment processes and portfolios in order to better achieve strategic outcomes. DOD's Institutional Approach to Business Systems Modernization: The National Defense Authorization Act (NDAA) for Fiscal Year 2008 designated the Deputy Secretary of Defense as the Chief Management Officer (CMO) for DOD and created a Deputy CMO position.[Footnote 32] The CMO's responsibilities include developing and maintaining a departmentwide strategic plan for business reform and establishing performance goals and measures for improving and evaluating overall economy, efficiency, and effectiveness and monitoring and measuring the progress of the department. The Deputy CMO's responsibilities include recommending to the CMO methodologies and measurement criteria to better synchronize, integrate, and coordinate the business operations to ensure alignment in support of the warfighting mission. The Business Transformation Agency (BTA) supports the Deputy CMO in leading and coordinating business transformation efforts across the department. The CMO and Deputy CMO are to interact with several entities to provide executive leadership for the direction, oversight, and execution of DOD's business transformation efforts, which include business systems modernization. These entities include the Defense Business Systems Management Committee (DBSMC), which serves as the highest-ranking investment review and decision-making body for business systems modernization activities and is chaired by the Deputy Secretary of Defense; the Principal Staff Assistants, who serve as the certification authorities for business system modernizations in their respective core business missions; the Investment Review Boards (IRB), which are chaired by the certifying authorities and form the review and decision- making bodies for business system investments in their respective areas of responsibility; and the BTA, which is responsible for supporting the IRBs, and for leading and coordinating business transformation efforts across the department. Table 1 lists these entities and provides greater detail on their roles, responsibilities, and composition. Table 1: DOD Business Systems Modernization Governance Entities' Roles, Responsibilities, and Composition: Entity: DBSMC; Roles and responsibilities: * Provides strategic direction and plans for the business mission area in coordination with the warfighting and enterprise information environment mission areas[A]; * Recommends policies and procedures required to integrate DOD business transformation and attain cross-department, end-to-end interoperability of business systems and processes; * Serves as approving authority for business system modernization; * Establishes policies and approves the business mission area strategic plan, the enterprise transition plan for implementation of business systems modernization, the transformation program baseline, and the BEA; Composition: Chaired by the Deputy Secretary of Defense/CMO; the Vice Chair is the Under Secretary of Defense for Acquisition, Technology, and Logistics. Includes senior leadership in the Office of the Secretary of Defense such as the Assistant Secretary of Defense (Networks and Information Integration)/Department of Defense Chief Information Officer (ASD(NII)/DOD CIO), the military departments' Secretaries and defense agencies' heads, the Vice Chairman of the Joint Chiefs of Staff, and the Commanders of the U.S. Transportation Command and Joint Forces Command. Entity: Principal Staff Assistants/Certification Authorities; Roles and responsibilities: * Support the DBSMC's management of enterprise business IT investments; * Serve as the certification authorities accountable for the obligation of funds for respective business system modernizations within designated core business missions[B]; * Provide the DBSMC with recommendations for system investment approval; Composition: Under Secretaries of Defense for Acquisition, Technology, and Logistics; Comptroller; and Personnel and Readiness; ASD(NII)/DOD CIO; and the Deputy Secretary of Defense. Entity: IRBs; Roles and responsibilities: * Serve as the oversight and investment decision-making bodies for those business capabilities that support activities under their designated areas of responsibility; * Recommend certification for all business systems investments costing more than $1 million that are integrated and compliant with the BEA; Composition: Includes the Principal Staff Assistants, Joint Staff, ASD(NII)/DOD CIO, core business mission area representatives, military departments, defense agencies, and combatant commands. Entity: Component Precertification Authority; Roles and responsibilities: * Ensures component-level investment review processes integrate with the investment management system; * Identifies those component systems that require IRB certification and prepare, review, approve, validate, and transfer investment documentation as required; * Assesses and precertifies architecture compliance of component systems submitted for certification and annual review; * Acts as the component's principal point of contact for communication with the IRBs; Composition: Includes the CIO from the Air Force; the Principal Director of Governance, Acquisition, and Chief Knowledge Office from the Army; the CIO from the Navy; and comparable representatives from other defense agencies. Entity: BTA; Roles and responsibilities: * Operates under the authority of the Deputy CMO; * Maintains and updates the department's BEA and enterprise transition plan; * Ensures that functional priorities and requirements of various defense components, such as the Army and the Defense Logistics Agency, are reflected in the architecture; * Ensures adoption of DOD-wide information and process standards as defined in the architecture; * Serves as the day-to-day management entity of the business transformation effort at the DOD enterprise level; * Provides support to the IRBs; Composition: Composed of eight directorates (Chief of Staff, Defense Business Systems Acquisition Executive, Enterprise Integration, Enterprise Planning and Investment, Transformation Priorities and Requirements Financial Management, Transformation Priorities and Requirements Human Resource Management, Transformation Priorities and Requirements Supply Chain Management, and Warfighter Requirements). Source: GAO based on DOD documentation. [A] According to DOD, the business mission area is responsible for ensuring that capabilities, resources, and materiel are reliably delivered to the warfighter. Specifically, the business mission area addresses areas such as real property and human resources management. [B] DOD has five core business missions: Human Resources Management, Weapon System Lifecycle Management, Materiel Supply and Service Management, Real Property and Installations Lifecycle Management, and Financial Management. [End of table] Tiered Accountability: In 2005, DOD reported that it had adopted a "tiered accountability" approach to business systems modernization. Under this approach, responsibility and accountability for business architectures and systems investment management are assigned to different levels in the organization. For example, the BTA is responsible for developing the corporate BEA (i.e., the thin layer of DOD-wide policies, capabilities, standards, and rules) and the associated enterprise transition plan (ETP). The components are responsible for defining a component-level architecture and transition plans associated with their own tiers of responsibility and for doing so in a manner that is aligned with (i.e., does not violate) the corporate BEA. Similarly, program managers are responsible for developing program-level architectures and plans and ensuring alignment with the architectures and transition plans above them. This concept is to allow for autonomy while also ensuring linkages and alignment from the program level through the component level to the corporate level. Table 2 describes the four investment tiers and identifies the associated reviewing and approving entities. Table 2: DOD Investment Tiers: Tier 1; Tier description: Major Automated Information System[A] or Major Defense Acquisition Program[B]; Reviewing/approving entities: IRB and DBSMC. Tier 2; Tier description: Exceeding $10 million in total development/ modernization costs, but not designated as a Major Automated Information System or Major Defense Acquisition Program; Reviewing/approving entities: IRB and DBSMC. Tier 3; Tier description: Exceeding $1 million and up to $10 million in total development/modernization costs; Reviewing/approving entities: IRB and DBSMC. Tier 4; Tier description: Investment funding required up to $1 million; Reviewing/approving entities: Component-level review only (unless the system or line of business it supports is designated as an interest program by the IRB chair). Source: GAO based on DOD documentation. [A] A Major Automated Information System is a program or initiative that is so designated by the ASD(NII)/DOD CIO or that is estimated to require program costs in any single year in excess of $32 million, total program costs in excess of $126 million, or total life cycle costs in excess of $378 million in fiscal year 2000 constant dollars. [B] A Major Defense Acquisition Program is an acquisition program that is so designated or estimated by the Under Secretary of Defense for Acquisition, Technology, and Logistics to require an eventual total expenditure for research, development, and test and evaluation of more than $365 million or, for procurement, of more than $2.190 billion in fiscal year 2000 constant dollars. [End of table] Consistent with the tiered accountability approach, the NDAA for Fiscal Year 2008 required the Secretaries of the military departments to designate the department Under Secretaries as CMOs with primary responsibility for business operations.[Footnote 33] Moreover, the Duncan Hunter NDAA for Fiscal Year 2009 requires the military departments to establish business transformation offices to assist their CMOs.[Footnote 34] Summary of Fiscal Year 2005 NDAA Requirements: Congress included six provisions in the fiscal year 2005 NDAA that are aimed at ensuring DOD's development of a well-defined BEA and associated ETP, as well as the establishment and implementation of effective investment management structures and processes.[Footnote 35] The requirements are as follows: 1. Develop a BEA that includes an information infrastructure that, at a minimum, would enable DOD to: * comply with all federal accounting, financial management, and reporting requirements; * routinely produce timely, accurate, and reliable financial information for management purposes; * integrate budget, accounting, and program information and systems; and: * provide for the systematic measurement of performance, including the ability to produce timely, relevant, and reliable cost information. In addition, the BEA must: * include policies, procedures, data standards, and system interface requirements that are to be applied uniformly throughout the department and: * be consistent with OMB policies and procedures. 2. Develop an ETP for implementing the architecture that includes: * an acquisition strategy for new systems needed to complete the enterprise architecture; * a list and schedule of legacy business systems to be terminated; * a list and strategy of modifications to legacy business systems; and: * time-phased milestones, performance metrics, and a statement of financial and nonfinancial resource needs. 3. Identify each business system proposed for funding in DOD's fiscal year budget submissions and include: * a description of the certification made on each business system proposed for funding in that budget; * funds, identified by appropriations, for current services and for business systems modernization; and: * the designated approval authority for each business system. 4. Delegate the responsibility for business systems to designated approval authorities within the Office of the Secretary of Defense. 5. Require each approval authority to establish investment review structures and processes, including a hierarchy of IRBs--each with appropriate representation from across the department. The review process must include: * a review and approval of each business system by an IRB before funds are obligated; * at least an annual review of every business system investment; * the use of threshold criteria to ensure an appropriate level of review and accountability; * the use of procedures for making architecture compliance certifications; * the use of procedures consistent with DOD guidance; and: * the incorporation of common decision criteria. 6. Effective October 1, 2005, DOD may not obligate appropriated funds for a defense business system modernization with a total cost of more than $1 million unless the approval authority certifies that the business system modernization: * complies with the BEA; or: * is necessary to achieve a critical national security capability or address a critical requirement in an area such as safety or security, or is necessary to prevent a significant adverse effect on an essential project in consideration of alternative solutions; and: * the certification is approved by the DBSMC. The fiscal year 2005 NDAA also requires that the Secretary of Defense submit to the congressional defense committees a report on the department's compliance with the above provisions. Summary of Recent GAO Reviews of DOD's Business Systems Modernization and Business Transformation Efforts: Since 2005, we have reported that DOD has each year taken increasing steps to comply with the requirements of the fiscal year 2005 NDAA and to satisfy relevant systems modernization management guidance.[Footnote 36] Moreover, we concluded that DOD had made important progress each year relative to architecture development, transition plan development, budgetary disclosure, and investment review; however, aspects of these requirements and relevant guidance had yet to be fully satisfied. We also reported that DOD had fully satisfied the requirement concerning designated approval authorities and continued to certify and approve modernizations costing more than $1 million. However, each report also concluded that much remained to be accomplished relative to the Act's requirements and relevant guidance, as these examples illustrate: * The BEA lacked important content, such as business rules for, and information flows among, certain business activities, and it had yet to be extended (i.e., federated) throughout the DOD component organizations. * The ETP did not include investments for all components and did not reflect key factors associated with properly sequencing planned investments, such as dependencies among investments and the capability to execute the plan. * DOD and the military departments had yet to fully establish key investment review structures and define related policies and procedures for effectively performing both project-level and portfolio-based investment management. Accordingly, we either provided new or reiterated existing recommendations to address each of these areas. DOD largely agreed with our recommendations. In August 2008, we also reported on issues with the process used to certify investments as compliant with DOD's BEA [Footnote 37]. Specifically, we reported that key DOD business systems modernization programs did not adequately demonstrate compliance with the department's federated BEA, even though each program had largely followed DOD's existing compliance guidance, used its compliance assessment tool, and was certified and approved as being compliant by department investment oversight and decision-making entities. In addition, we reported that even though the department's investment oversight and decision-making authorities had certified and approved these business system programs as compliant with the BEA, these certification and approval entities did not validate each program's compliance assessment and assertions. Accordingly, we made recommendations to address each of those shortcomings, which DOD agreed with. With respect to departmentwide business transformation, we recently reported that implementation of DOD's overall management framework for business transformation is not yet complete because key aspects had not been defined.[Footnote 38] For example, we reported that the authority, roles, and relationships for some positions and entities had not been clearly defined, including a clearly defined decision-making authority for the Deputy CMO, a clearly defined relationship between DOD's Deputy CMO and the CMOs of the military departments, and clearly defined unique and shared responsibilities of various governance entities, such as the Deputy's Advisory Working Group and the DBSMC. We concluded that the current administration needed to move quickly to nominate and fill key leadership positions, including the Deputy Secretary of Defense (now statutorily designated as the CMO), the Deputy CMO, the Under Secretaries of Defense, and the military department CMOs. We also concluded that, in light of the transition, it will be important for senior leaders in the current administration to further define and clarify the roles, responsibilities, and relationships among the various positions and governance entities within DOD's management framework for business transformation in order to sustain and further DOD's progress. In addition, we reported that DOD's first strategic management plan, issued in 2008, lacked key information and elements necessary for assisting in successfully achieving business management transformation. [Footnote 39] For example, it did not identify any strategic goals, objectives, and performance measures, and while it stated a purpose, the plan did not provide detailed information about business operations. Without strategic goals and objectives, we concluded that the strategic management plan could not be linked to other existing plans and tools for individual business areas, such as the ETP. DOD Continues to Take Steps to Strengthen Management of Its Business Systems Modernization, but Long-standing Challenges Remain: DOD continues to take steps to comply with the requirements of the Act and to satisfy relevant systems modernization management guidance. In particular, DOD released an update to its corporate BEA (version 6.0) and ETP, and issued its annual report to Congress describing steps that have been taken and are planned relative to the Act's requirements, among other things. Collectively, these steps address several statutory provisions and best practices concerning the BEA, transition plan, budgetary disclosure, and investment review of systems costing in excess of $1 million. However, the pace of DOD's progress in defining and implementing these key modernization management controls has slowed compared with the progress the department had made, and we have reported, each of the last 4 years. As a result, challenges that we identified last year largely remain to be addressed to fully implement the Act and relevant guidance. Most notably, the department has yet to extend and evolve its BEA and to provide the total federated family of DOD parent and subsidiary architectures for the business mission area, which are needed to comply with the Act. It also has yet to fully define IT investment management policies and procedures at the corporate and component levels, and the business system information used to support the development of the transition plan and DOD's budget requests, as well as certification and annual reviews, is of questionable reliability. DOD officials agree that additional steps are needed to fully implement the Act's requirements and related system modernization management best practices. Further, they stated that progress over the last year has been slowed by yet-to-be-resolved issues surrounding the Deputy CMO and military department CMO positions. DOD Continues to Evolve Its Corporate BEA, but a Well-Defined Plan for Federating It Has Yet to Be Developed and Progress on Component Architectures Has Been Slow: Among other things, the fiscal year 2005 NDAA requires DOD to develop a BEA that would cover all defense business systems and their related functions and activities and that would enable the entire department to (1) comply with all federal accounting, financial management, and reporting requirements and (2) routinely produce timely, accurate, and reliable financial information for management purposes. The BEA should also include policies, procedures, data standards, and system interface requirements that are to be applied throughout the department. As such, the Act requires an architecture that extends to all defense organizational components. In 2006, the department adopted an incremental and federated approach to developing such an architecture. Under this approach, the department releases new architecture versions every year that include a corporate BEA that is to be augmented by a coherent family of component architectures. As we have previously reported, such an approach is consistent with best practices and appropriate given DOD's scope and size. In 2008, we reported that the then-current version of the BEA (version 5.0) addressed, to varying degrees, missing elements, inconsistencies, and usability issues that we previously identified, but that gaps still remained.[Footnote 40] On March 13, 2009, DOD released BEA 6.0, which addresses some of these gaps. For example, it begins to address information assurance by identifying related laws, regulations, and policies.[Footnote 41] This is important because the nature and substance of institutionalized security requirements, controls, and standards should be captured in the architecture products, since information assurance permeates every aspect of an organization's operations. In addition, the latest version of the BEA begins to address the technical standards (e.g., W3C XML-Encryption[Footnote 42]) needed to allow business systems to work in an expeditionary environment, which would, among other things, allow warfighters operating in these environments to access business systems.[Footnote 43] Version 6.0 of the BEA also addresses, to varying degrees, missing elements, inconsistencies, and usability issues that we previously identified, but continues to be missing important content. Examples of these improvements and remaining issues are summarized below. * The latest version includes 35 new business rules. As we previously reported, business rules are important because they translate business policies and procedures into specific, unambiguous rules that govern what can and cannot be done. As such, they facilitate consistent implementation of laws, policies, and procedures. Examples of new business rules in the Common Supplier Engagement business priority area [Footnote 44] are (1) an accepting or inspecting organization must be provided on all contracts for goods or services and (2) both a minimum and a maximum ordering limit must be provided when the contract is an indefinite delivery/indefinite quantity contract.[Footnote 45] In addition to adding business rules, Version 6.0 reflects the deletion of 22 business rules that, according to DOD, were no longer applicable and were thus obsolete. Notwithstanding these additions and deletions, BEA 6.0 still does not provide business rules for all business processes. For example, there are no business rules for the File Discrepancy Report for Other Goods and Services business process in the Common Supplier Engagement and Materiel Visibility business priority areas. [Footnote 46] Such limitations in DOD's business rules limit the department's ability to ensure that business operations and supporting systems are properly implemented. * The latest version includes additional information on important security architecture content. For example, it now identifies information assurance laws, regulations, and policies and describes information assurance characteristics of key information exchanges (e.g., Awarded Contract is designated as a sensitive information exchange[Footnote 47]). However, not all financial information exchanges (e.g., Receipt Account Trial Balance and Ledgers[Footnote 48]) include such key information assurance characteristics as confidentiality, integrity, and nonrepudiation. Without specifying such information assurance characteristics for all relevant exchanges, DOD will be limited in its ability to implement adequate security controls into the systems that support these exchanges. * The latest version continues to add new operational activities, which describe actions performed in conducting DOD business operations (e.g., Deliver Property and Forces[Footnote 49]). These operational activities are important because they are DOD's primary basis for determining if a system is being defined in a way that is compliant with the BEA. However, key operational activities are not yet included in the BEA. For example, Version 6.0 still does not include the Foreign Military Sales operational activity, which affects multiple DOD business missions and organizations. Without including such important operational activities, programs do not have all the information necessary for determining if they are compliant with applicable constraints (e.g., data definitions and business rules). * The latest version includes updates on the information that flows among operational nodes (i.e., organizations, business operations, and system elements). Information flows are important because they define what information is needed and where and how the information moves to and from operational entities. While Version 6.0 adds approximately 50 new information exchanges (e.g., Approved Payment Request[Footnote 50]) among business functions and approximately 15 data exchanges (e.g., Payment Request for Goods[Footnote 51]) among system functions, it still contains information exchanges (e.g., Accounts Payable Account [Footnote 52]) that are not attached or linked to any operational nodes (or organizations). Further, this version's information-related architecture products contain inconsistencies. For example, information exchanges such as Final Contract or Order Costs and Estimate at Completion[Footnote 53] are listed in the information exchange integrated dictionary, but are not listed in the operational information exchange product.[Footnote 54] As a result, DOD's ability to understand how information is shared among operational entities, and subsequently develop or modernize systems that can effectively share such information, will be constrained. * The latest version also depicts end-to-end business flows (e.g., Budget to Report[Footnote 55]) with linkages to BEA business processes (e.g., Execute Apportionment and Allocate Funds[Footnote 56]). However, BEA 6.0 does not include, for each end-to-end business flow, a create, read, update, and delete matrix[Footnote 57] that shows how the business processes and their associated applications manage specific data objects (e.g., Approved Apportionment[Footnote 58]). These matrices are important because they reveal natural groupings of business activities and data objects, and thus are used to identify business activities to be automated. Without this information, DOD will be limited in its ability to develop a target architecture that effectively integrates information and systems that support its business activities. BTA officials recognize many of these issues and state that they will be addressed as the BEA continues to evolve. In this regard, the Chief Architect stated that the process for evolving the BEA is described in the architecture's Concept of Operations. Specifically, it describes a process that calls for business cases to justify proposed improvements that are then prioritized and used to create a BEA plan for DBSMC approval. However, the Concept of Operations has yet to be approved, and available documentation does not demonstrate that this process is being followed. Further, we have yet to receive an architecture plan or evidence of DBSMC approval of such a plan. As we have previously reported and recommended, BTA needs an enterprise architecture program management plan that defines what the department's incremental improvements to the architecture (and transition plan) will be, and how and when they will be accomplished, including what (and when) architecture and transition plan scope and content and architecture compliance criteria will be added into which versions.[Footnote 59] BTA has not yet developed such a plan. According to BTA officials, the department's next steps are contingent upon ongoing discussions about how architecture planning will be affected by the Deputy CMO's efforts to align the department's various planning activities in its strategic management plan, which is to be issued no later than July 1, 2009. These discussions will be further complicated by the lack of clarity surrounding the Deputy CMO's roles, responsibilities, and authorities and how the deputy will work with other senior leaders across the department who have responsibility for business operations. Beyond the above-discussed limitations, Version 6.0 also continues to represent only the thin layer of corporate architectural policies, capabilities, rules, and standards that apply DOD-wide (i.e., to all DOD federation members). This means that Version 6.0 appropriately focuses on addressing a limited set of enterprise-level (DOD-wide) priorities and providing the overarching and common architectural context that the distinct and substantially autonomous member (i.e., component) architectures inherit. However, this also means that Version 6.0 does not provide the total federated family of DOD parent and subsidiary architectures for the business mission area. DOD's Progress in Federating Its BEA Has Been Slow: Recognizing the need to address its component architecture challenges, BTA released an update to its initial business mission area federation strategy and road map in January 2008. Among other things, this strategy was to address how the corporate BEA would be extended to the military departments and defense agencies and how business services will be identified and delivered across the business mission area. (See figure 3 for a conceptual representation of DOD's federated BEA.) Figure 3: Conceptual Representation of DOD's Business Mission Area Federated Architecture: [Refer to PDF for image: illustration] BTA: Composed of: DOD BEA and enterprise transition plan; Enterprise shared services and system capabilities; Enterprise rules and standards for interoperability (DOD-enterprise layer). Component layer (Military departments and example defense agencies): Army: - Architectures; - Transition plans; - Systems solutions. Navy: - Architectures; - Transition plans; - Systems solutions. Air Force: - Architectures; - Transition plans; - Systems solutions. Defense Logistics Agency: - Architectures; - Transition plans; - Systems solutions. Defense Finance and Accounting Service: - Architectures; - Transition plans; - Systems solutions. United States Transportation Command: - Architectures; - Transition plans; - Systems solutions. Program layer (example programs): Army: - General Fund Enterprise Business System; - Logistics Modernization Program. Navy: - Navy Enterprise Resource Planning; - Navy Tactical Command Support System. Air Force: - Expeditionary Combat Support System; - Technical Training Management System. Defense Logistics Agency: - Business Systems Modernization; - Distribution Planning Management System. Defense Finance and Accounting Service: - Automated Disbursing System; - Defense Joint Military Pay System. United States Transportation Command: - Defense Enterprise Accounting and Management System; - Defense Personal Property System. Source: GAO analysis of DOD data. [End of figure] In September 2006, DOD issued its initial business mission area federated strategy and road map, which we reported lacked adequately defined tasks needed to achieve the strategy's goals, such as addressing how strategy execution will be governed, component architectures will be aligned with the latest version of the BEA, and common applications and systems across the department will be identified and reused. Accordingly, we reiterated our prior recommendation for a BEA management plan, and recommended that DOD ensure that this plan describes, at a minimum, how the business mission area architecture federation would be governed; how the business mission area federation strategy alignment with the DOD architecture federation strategy would be achieved; how component business architectures' alignment with incremental versions of the BEA would be achieved; how shared services would be identified, exposed, and subscribed to; and what milestones would be used to measure progress and results.[Footnote 60] In January 2008, DOD issued an updated strategy, and in May 2008, we reported that the update, along with the associated global information grid strategy,[Footnote 61] partially addressed our recommendations. [Footnote 62] Specifically, we reported that the strategies provided high-level roles and responsibilities for federating the architecture and additional definition around the tasks needed to achieve alignment among DOD and component architectures. We also noted that the strategy for the business mission area provided for conducting pilot programs across the components to demonstrate the technical feasibility of architecture federation, and for using the lessons learned from the pilots to improve and update the strategies. To their credit, BTA and other DOD entities, such as ASD(NII)/DOD CIO and the Department of the Army, are collaboratively taking steps to establish the foundation for implementing the strategy. For example, they have: * selected the Department of the Army's Defense Knowledge Online to be BTA's federated enterprise portal, which is to be the point of access to information about all DOD and component architectures, and is to allow users to search and navigate through this information; * established and are using the DOD Architecture Registry System, which is maintained by ASD(NII)/DOD CIO, as the repository to contain architecture content; * conducted five pilots at three military departments and two defense agencies to evaluate various aspects of architecture federation and develop lessons learned about, for example, approaches for capturing and managing architecture metadata[Footnote 63] (Air Force pilot), and enterprise search and discovery methods[Footnote 64] (Navy pilot); and: * developed guidance on identifying and registering business services and, as of November 2008, identified and registered 25 business services, such as a service that provides detailed information on each aircraft at the base (e.g., an aircraft's mission capability and maintenance status), and a service that allows aircraft maintenance data to be retrieved, created, updated, and removed. According to officials from ASD(NII)/DOD CIO, which is responsible for overall DOD architecture federation, the results of the pilots are being used to determine future federation steps for all DOD mission areas. In addition, BTA officials said that both BTA and ASD(NII)/DOD CIO are defining a basic set of standard architecture models,[Footnote 65] including a common vocabulary for using architecture information across DOD, to allow for uniform representation of architecture content. Establishing such a common framework is important because DOD's current lack of uniform representation for enterprise architecture content, according to BTA and ASD(NII)/DOD CIO officials, will limit the understanding and utility of the federated architecture. Notwithstanding the above steps, BTA's strategy for federating the BEA still does not contain sufficient detail to permit effective and efficient execution and adequately address our recommendations. For example, the business mission area's federation implementation road map only outlines high-level, near-term milestones, such as milestones for developing a governance charter for the DOD CIO Enterprise Guidance Board, which is DOD's senior forum for guiding the development and approval of enterprise-level guidance (including IT policy, architecture, and standards) on enterprise architecture, and conducting a pilot with Defense Knowledge Online to test an access control mechanism.[Footnote 66] It does not, for example, specify tasks to be performed to achieve those milestones, identify milestones or tasks beyond fiscal year 2010, or identify resources needed to perform tasks (e.g., funding, staffing, tools, and training). Further, the strategy does not describe how the various architecture federation activities taking place across DOD come together over time to achieve a federated BEA, including measurement of progress, results, and the component architectures' alignment with the latest version of the BEA. BTA and ASD(NII)/DOD CIO officials stated that these details have yet to be described because of unresolved issues surrounding the Deputy CMO and military department CMO positions. Moreover, DOD's federation efforts have yet to benefit from any independent verification and validation (IV&V) assessments.[Footnote 67] As we previously reported, such assessments are important to ensure the completeness, consistency, understandability, and usability of the federated family of architectures.[Footnote 68] Accordingly, we recommended that DOD have its BEA IV&V contractor perform such assessments and disclose the results in its annual report to Congress. However, DOD's March 2009 annual report does not include this information. According to BTA officials, from October 2007 through March 2009, BTA expended approximately $3 million on BEA-related IV&V activities. However, these activities have focused on the corporate BEA and not the entire federated family of architectures. BTA officials also stated that future IV&V activities are not currently focused on the federated family of architectures. They added that they are engaged in discussions with ASD(NII)/DOD CIO on how and who to best perform such assessments, given that the federated BEA is a part of DOD's overall federated enterprise architecture, which is led by ASD(NII)/DOD CIO. The challenges that the department faces in federating its BEA, and the importance of disclosing to congressional defense committees the state of its federation efforts, are amplified by the current state of the military departments' enterprise architecture programs. Specifically, we recently reported that none of the three military departments could demonstrate through verifiable documentation that it had established all of the core foundational commitments and capabilities needed to effectively manage the development, maintenance, and implementation of an architecture,[Footnote 69] which are outlined in our Enterprise Architecture Management Maturity Framework.[Footnote 70] While the Air Force's architecture efforts are well ahead of those of the Navy and Army, all three had yet to fully satisfy important aspects of our framework. Examples of their architecture limitations are discussed below: * None of the military departments had fully defined its "as is" and "to be" architecture environments and associated transition plans. This is important because without a full understanding of architecture-based capability gaps, the departments would not have an adequate basis for defining and sequencing their ongoing and planned business system investments. * None of the military departments had fully addressed security as part of its respective "as is" and "to be" environments. This is important because security is relevant and essential to every aspect of an organization's operations, and therefore the nature and substance of institutionalized security requirements, controls, and standards should be embedded throughout the architecture, and reflected in each system investment. * None of the military departments was using an IV&V agent to help ensure the quality of its architecture products. IV&V is a proven means for obtaining unbiased insight into such essential architecture qualities as completeness, understandability, usability, and consistency. * None of the military departments could demonstrate that its IT investments were actually in compliance with its architecture. This is relevant because the benefits from using an architecture, such as improved information sharing, increased consolidation, enhanced productivity, and lower costs, cannot be fully realized unless individual investments are actually in compliance with, among other things, architectural rules and standards. To address these limitations, we made recommendations aimed at improving the management and content of these architectures. DOD agreed with our recommendations. However, our recommendations have yet to be fully implemented. Specifically, none of the military departments provided documentation demonstrating that the above-cited limitations have been addressed. Until DOD has a well-defined family of architectures for its business mission area, it will not fully implement the requirements of the Act and will remain challenged in its ability to effectively manage its business system modernization efforts. DOD Continues to Update Its ETP, but Important Elements Are Still Missing, as Are Individual Component Plans: Among other things, the Act requires DOD to develop an ETP for implementing its BEA that includes listings of the legacy systems that will and will not be part of the target business systems environment and specific time-phased milestones and performance metrics for each business system investment. On September 30, 2008, DOD released the latest version of its ETP, [Footnote 71] which in general provides information on about 645 business systems, including, to varying degrees, the required information on 54 systems that are linked to key transformational objectives and priorities.[Footnote 72] For example, it includes specific time-phased milestones with status indicators (e.g., met, on track, or deleted) for about 47 out of the 54 systems, and it includes performance metrics (e.g., voucher payment time and integration test progress) for about 26 of these.[Footnote 73] Further, the latest version of the ETP discusses progress made since March 2008 on business system investments, as well as descriptions of planned near-term activities (e.g., next 12 months). However, previously identified limitations in the scope and completeness of the latest version of the ETP remain. Examples of improvements and remaining issues are summarized below. * The ETP provides a range of information for some, but not all, business system investments, such as 3 years of budget information for about 342 out of 645 systems (about 50 percent), 46 of which are linked to key transformation objectives and priorities. However, the ETP does not yet include system and budget information for all the business systems identified in the department's IT systems repository. According to the ETP, it does not include budget information for about half of the business systems identified because the budget data for some of these systems were not included in the fiscal year 2009 budget submission. Further, according to BTA officials, the ETP continues to focus on tier 1 and 2 business systems. However, not all DOD components have developed subordinate transition plans that would address all the business system investments. For example, as we reported last year, the Navy and Army have not yet developed subordinate transition plans. [Footnote 74] More specifically, Navy officials stated that they are revising their enterprise architecture development and governance approach and, according to draft Navy enterprise architecture documentation associated with this approach, an enterprise architecture transition plan will be developed. Further, as we reported, the Air Force's transition plan is limited. For example, it is not based on an analysis of the gap in capabilities between the department's "as is" and "to be" environments. Collectively, this means that a complete family of DOD and component transition plans does not exist. According to the BTA official responsible for the ETP, BTA and the military departments are currently discussing whether component-level plans should be published separately from or incorporated into the corporate ETP. This is further complicated by the uncertainty surrounding how the Deputy CMO will work with other senior leaders who have responsibility for business operations, including the military department CMOs. * The ETP continues to provide performance measures for some, but not all, enterprise and component investments (i.e., programs), including key milestones (e.g., initial operating capability) and status indicators. However, the plan has yet to include other important information needed to understand the sequencing of new systems becoming operational and legacy systems being phased out. In particular, the planned investments have not been sequenced based on a range of important factors cited in federal guidance, such as technology opportunities, marketplace trends, fiscal and budgetary constraints, institutional system development and acquisition capabilities, new and legacy system dependencies and life expectancies, and the projected value of competing investments.[Footnote 75] Rather, the ETP continues to be largely based on a bottom-up process in which ongoing programs have been compiled and categorized in the plan around business enterprise priorities. For example, many of these investments are dependent on Net-Centric Enterprise Services, and as such the plans and milestones for each should reflect the incremental capability deployment of these enterprise services.[Footnote 76] * The ETP and the business mission area federation strategy describe the department's approach to enterprise application integration, including plans for using specific services and standards for integrating financial application systems.[Footnote 77] Including such information in the ETP and associated documentation will help to clarify relationships and dependencies among legacy applications and systems and new or modernized applications and systems. However, all systems needed to achieve integration are not specified. For example, the ETP does not identify all of the systems that must be integrated for each end-to-end business flow (e.g., budget-to-report) to support activities that are cross-functional and cross-cutting across organizational boundaries. * The ETP does not include all legacy systems that will not be part of the target BEA and does not provide the schedule for terminating these legacy systems, as required by the Act. For example, while the Navy Enterprise Resource Planning program's August 2008 investment review board documentation identifies 41 legacy systems, the ETP identifies only 25 of these systems.[Footnote 78] In addition, the plan is missing information about some legacy systems and modernization programs. Specifically, the plan does not include termination dates for 40 out of 514 legacy systems. Including a comprehensive and reliable list of legacy systems is important for the department to have a meaningful and reliable basis for managing the disposition of legacy systems and for sequencing the introduction of modernized business operations and supporting systems. BTA officials said that a number of actions are envisioned to address the above-cited areas and further improve the ETP, such as working with the military departments and defense agencies to determine which systems should be included in the corporate-level ETP and ensuring that the next version of the ETP includes more information about dependencies among systems. Until the ETP, or a federated family of such plans, either directly or by reference includes relevant information on the full inventory of investments across the department (and does so in a manner that reflects consideration of the range of variables associated with a well-defined transition plan, such as timing dependencies among investments and the department's capability to manage them), it will not provide a sufficient basis for sequencing the introduction of modernized systems. To help DOD improve its ETP, we have previously made recommendations that the department is in the process of addressing aimed at formalizing its plans for incrementally improving its transition plan. Fiscal Year 2009 Budget Submission Did Not Include Key Information on All Business Systems: Another requirement of the Act is that DOD's annual IT budget submission must include key information on each business system for which funding is being requested, such as the system's designated approval authority and the appropriation type and amount of funds associated with development/modernization and current services (i.e., operation and maintenance). As we reported last year, the department's fiscal year 2009 budget submission included a range of information required by the Act on business system investments.[Footnote 79] Specifically, for 273 investments that involve development/modernization activities, the submission included such information as the system's (1) name, (2) approval authority, and (3) appropriation type. The submission also identified the amount of the fiscal year 2009 request that was for development/modernization versus operations/maintenance. Further, for those system investments in excess of $1 million in modernization funding, the submission cited the certification status (e.g., approved, approved with conditions, not applicable, and withdrawing) and the DBSMC approval date, where applicable. However, the fiscal year 2009 budget submission does not reflect all business system investments. To prepare the submission, DOD relied on business system investment information (e.g., funds requested, mission area, and system description) that is entered by the components into DOD's Select and Native Programming Data Input System-Information Technology (SNAP-IT). In accordance with DOD guidance and according to ASD(NII)/DOD CIO officials, the business systems listed in SNAP-IT should match the systems listed in the Defense Information Technology Portfolio Repository (DITPR)--the department's authoritative business systems inventory. However, the number of business systems in DITPR is unclear. Specifically, in March 2009, DITPR data provided by DOD included about 6,800 systems, and in April 2009, BTA officials stated that the number of operational business systems in the repository was 2,480, adding that the 6,800 number included systems that were not business systems and systems that may no longer be operational. However, they have yet to provide support for this revised number of business systems. Regardless, SNAP-IT is potentially missing thousands of business systems that are identified in DITPR. Specifically, SNAP-IT contains about 2,100 systems, of which only about 1,500 are categorized as business systems.[Footnote 80] Restated, the fiscal year 2009 budget submission is missing somewhere between 980 and 5,300 business systems. For example, the Department of the Navy's Personnel Information System for Training, Operations, and Logistics and the Air Force's Contractor Responsibility Information System are listed in DITPR but not listed in SNAP-IT. Moreover, as stated earlier in the report, DOD has also recognized limitations in its budget submission in its ETP. The ASD(NII)/DOD CIO official responsible for administering the SNAP-IT data said that while the components are responsible for ensuring that information about their respective systems is accurate and complete, the department recognizes the need to reconcile the information between SNAP-IT and DITPR to improve the systems' comprehensiveness and accuracy. However, the department has yet to develop a plan or time frame for doing so. Without a reliable comprehensive inventory of all defense business systems, DOD will not be able to ensure the completeness and reliability of its IT budget submissions. DOD Has Made Progress in Establishing Corporate and Component Investment Management Structures, but Associated Policies and Procedures Are Not Yet Fully Defined and Implemented: The Act also requires DOD to establish business system investment review structures, such as the previously discussed DBSMC and five IRBs, as well as processes that are consistent with the investment management provisions of the Clinger-Cohen Act.[Footnote 81] As we have previously reported, organizations that satisfy Stages 2 and 3 of our ITIM framework have the investment selection, control, and evaluation structures, and the related policies, procedures, and practices that are consistent with the investment management provisions of the Clinger- Cohen Act. DOD and the Air Force have largely established the kind of investment management structures provided for in the Act and our ITIM framework. [Footnote 82] However, the Navy has not. Moreover, neither DOD nor these components have defined the full range of related investment management policies and procedures that our framework identifies as necessary to effectively manage investments as individual business system programs (Stage 2) and as portfolios of programs (Stage 3). Until all of DOD has put these requisite investment management structures and supporting policies and procedures into place, the billions of dollars that the department and its components invest annually in business systems will remain at risk. Corporate and Air Force Investment Management Structures Are Largely Established, but Navy Structures Remain a Work in Progress: DOD has largely established corporate-level organizational structures that are associated with Stages 2 and 3 of our framework. As we reported in May 2008, the department has an enterprisewide investment board and four subordinate boards, and has assigned them responsibility for business systems investment governance, including conducting investment certification and approval reviews and annual reviews as provided for in the Act.[Footnote 83] The enterprisewide board--the DBSMC--is composed of the department's top executives, such as the Deputy Secretary of Defense and the ASD(NII)/DOD CIO, as provided for in the Act. Among other things, the DBSMC is responsible for establishing and implementing policies governing the organization's investment process and approving lower-level investment board processes and procedures. The subordinate boards include four IRBs that are composed of senior officials representing their respective business areas, including representatives from the combatant commands, defense agencies, military departments, and Joint Chiefs of Staff.[Footnote 84] Among other things, the IRBs are responsible and accountable for overseeing and controlling certain business system investments, including ensuring compliance and consistency with the BEA. The department has also assigned responsibility to the Under Secretary of Defense for Acquisition, Technology, and Logistics for managing business system portfolio selection criteria. Since 2008, the department has taken additional steps to establish a fifth IRB, the DOD Chief Information Officer's review board, which is to oversee investments in business systems whose primary purpose is to support infrastructure and information assurance activities. According to DOD officials, this board is to replace the Enterprise Information Environment Mission Area review board, which was the fifth board required by the Act, and its charter has been drafted, but not approved.[Footnote 85] With respect to the military departments' investment management structures, we reported in May 2008 that the Air Force had established the organizational structures associated with Stages 2 and 3 of our framework, such as a business systems IRB consisting of senior executives from the functional business units, including the Office of the Air Force CIO.[Footnote 86] Among other things, this board is responsible for business system investment governance, including conducting investment precertification, approval, and annual reviews, as required by the Act. We recently reported that, in contrast to the Air Force, the Navy had not yet established an enterprisewide IRB composed of senior executives from its IT and business units, to define and implement a Navy-wide business system governance process.[Footnote 87] We concluded that without such structures, the Navy's ability to ensure that business system investment decisions are made consistently and reflect the needs of the organization was limited. Accordingly, we recommended that the Navy establish these management structures. Navy officials told us that a Secretary of the Navy Instruction that is intended to address these limitations has been drafted but not yet approved.[Footnote 88] Corporate and Air Force Investment Management Policies and Procedures Are Being Established, but Navy's Remain Largely Undefined: DOD has partially defined the full range of corporate and component- level policies and procedures that we previously recommended it establish to effectively support project-level (Stage 2) and portfolio- based (Stage 3) investment management practices.[Footnote 89] Specifically, DOD recently issued new corporate-level policies and procedures that further address key practices in our ITIM framework associated with project-level investment management (Stage 2), such as instituting the investment board and providing investment oversight. In particular, DOD's revised 2008 acquisition policy[Footnote 90] and draft business capability life cycle acquisition policy and guidance outline aspects of how the business investment review processes are to be coordinated with other decision-support processes used at DOD, such as the Joint Capabilities Integration and Development System and the Defense Acquisition System.[Footnote 91] For example, the revised policies and guidance now require a team to assess the risks associated with each Major Automated Information System and to share the results with the program manager and component functional sponsor,[Footnote 92] who in turn are to collaboratively report the risks to both the IRB and the program's milestone decision authority prior to each milestone decision.[Footnote 93] They further require the DBSMC to approve the obligation of funds prior to the first milestone review of each major business system. In addition, DOD also recently revised its policy for overseeing the acquisition of systems that provide joint capabilities, to require all business system investments to comply with the business system investment review process and the business capability life cycle process.[Footnote 94] The department has also recently established guidance associated with portfolio-level investment management (Stage 3) practices. However, DOD's updated corporate-level policies and procedures are still missing critical project-and portfolio-based investment management practices that we previously recommended, as discussed below.[Footnote 95] * Policies and procedures for instituting the investment board do not address how all investments that are past the development/modernization stage (i.e., in operations and maintenance) are to be governed. Given that DOD invests billions of dollars annually in operating and maintaining business systems, this is significant. For example, while the 2009 update to the IRB guidance now requires an annual review of all investments previously certified by IRBs, including those in operations and maintenance, this review is not required for systems in operations and maintenance that were not previously certified by the IRBs. Our ITIM framework emphasizes that the corporate investment boards should review important information about an investment, such as cost and performance baselines, throughout the investment's life cycle. In addition, while the department's investment process addresses how investment-related processes are to be coordinated with the Joint Capabilities Integration and Development System and the Defense Acquisition System, these processes do not apply to all business systems. For example, DOD's updated acquisition policy states that IRB involvement in acquisition decisions is required only for Major Automated Information Systems. Moreover, the 2008 acquisition policy and draft business capability life cycle acquisition policy and guidance do not address how these processes are to be coordinated with the Planning, Programming, Budgeting, and Execution process.[Footnote 96] Furthermore, the business capability life cycle acquisition policy and guidance has yet to be approved. Without approved policies and procedures that provide clear visibility into all investments, including linkages to related management systems, inconsistent investment decisions may result. * Procedures for selecting an investment do not specify how the IRBs use the full range of cost, schedule, and benefit data in making selection (i.e., certification) decisions. Specifically, while the revised 2009 IRB guidance states that the IRBs will consider cost, schedule, and benefit data in making certification decisions, the guidance does not define how the boards are to consider these factors. According to our ITIM guidance, a structured selection method should provide investment boards, business units, and IT developers with a common understanding of the selection process to be followed, including how cost, schedule, and benefit data are to be used to compare and select projects. Furthermore, while DOD issued an IRB roles and responsibilities policy in January 2009 that states that the certification authorities will define the selection criteria for determining whether an investment is to be an enterprisewide system or remain component specific,[Footnote 97] those certification authorities have yet to do so.[Footnote 98] Without documenting how the IRBs employ such factors when making selection decisions, the department cannot ensure that the boards consistently and objectively select proposals that best meet the department's needs and priorities. * Policies and procedures for overseeing an investment do not provide for sufficient visibility into component-level investment management activities, including component reviews of systems in operations and maintenance and smaller investments, commonly referred to as tier 4 investments. Such visibility is important because DOD reports that only 346 system modernization efforts have been IRB certified and DBSMC approved. This means that the vast majority of business systems are reviewed and approved only within the component organizations. While the January 2009 IRB roles and responsibilities policy requires that each component submit an end-of-the-fiscal-year report listing those systems that have been reviewed by the cognizant IRB, this report lacks important project information. For example, it does not address components' adherence to cost, schedule, and risk investment selection and control criteria. According to our ITIM framework, an investment board should have visibility into each project's performance and progress toward predefined cost, schedule, and benefit expectations as well as each project's exposure to risk. Without such visibility, DOD components risk making investment decisions that are inconsistent and not fully grounded in objective data. * Policies and procedures have not been fully established for defining the portfolio selection criteria or for creating and evaluating the portfolio of business systems. Specifically, the department has assigned responsibility to its certification authorities for defining the criteria to be used for making portfolio selection decisions, creating portfolios, and evaluating the performance of portfolio investments. However, these authorities have yet to fulfill these responsibilities. According to our ITIM framework, the development and use of portfolio selection criteria focuses on the synergistic benefits to be found among an agency's entire collection of investments, rather than just from the sum of the individual investments. * Policies and procedures for conducting postimplementation reviews do not address all business systems. Specifically, in its January 2009 update to its IRB guidance, the department added a new type of review, called a closeout annual review, to be performed when a business system modernization has been completed. According to the guidance, this review is to function as a postimplementation review for IRB-certified systems and is to provide the IRBs with lessons learned and metrics about completed investment efforts. However, the guidance does not address how expected benefits were achieved. According to our ITIM framework, examining the differences between estimated and actual investment costs and benefits is a key aspect of conducting postimplementation reviews. According to BTA officials, these limitations are due to the newness of its investment review policies and procedures, which they said will be revised over time to address the limitations. Adequately documenting both the policies and the associated procedures that provide predictable, repeatable, and reliable investment selection and that control and govern how an organization manages its IT investment portfolios reduces investment risk of failure and provides the basis for rigor, discipline, and repeatability in how investments are selected and controlled across the entire organization. With respect to the military departments' investment management policies and procedures, we recently reported that the Air Force and the Navy did not have fully documented policies and procedures for overseeing the management of business system investments and for developing and managing complete business systems investment portfolios.[Footnote 99] To address these areas, we made recommendations aimed at implementing our framework's Stage 2 and 3 practices, and DOD partially agreed with these recommendations. Under DOD's tiered accountability approach to reviewing and approving business systems investments, in which investment review begins at the component level and proceeds through a hierarchy of review and approval authorities, depending on the size and significance of the investment, it is vital that DOD components implement these practices. BTA officials told us that the success of the department's overall process for managing business system investments depends on each component performing a thorough analysis and making informed decisions relative to each business system before it is submitted for higher-level review and approval. To the Air Force's credit, it has recently updated its policies and procedures to address our project-level investment management recommendations (Stage 2 of our framework).[Footnote 100] For example, the Air Force's recently developed IT investment review guidance provides for the review of all business systems, to include those in operations and maintenance, and it defines the process by which its IRB will review these systems. Further, the guidance specifies how business investments, including those in operations and maintenance, are to be prioritized using factors such as mission and strategic value and risk. The Air Force has also addressed key practices associated with portfolio-level investment management (Stage 3), such as creating and modifying IT portfolio selection criteria and assigning responsibility for the development and modification of IT portfolio selection criteria. Specifically, the guidance describes the criteria to be used to make portfolio selection, assigns responsibility for developing the criteria to an integrated working team, and assigns responsibility for approval of the criteria to a senior working group. However, the Air Force's recent investment review guidance is still missing critical elements needed to effectively carry out essential investment management activities. For example, the guidance does not yet specify how the business investment management activities are coordinated with other DOD management systems, such as the Joint Capabilities Integration and Development System, the Defense Acquisition System, and the Planning, Programming, Budgeting, and Execution process. Further, the guidance does not provide for sufficient oversight and visibility into investment management activities. Specifically, while the Air Force has predefined criteria for adherence to cost, schedule, and performance milestones, and requires the development of corrective actions when a system deviates from milestones, it does not have policies and procedures that guide the implementation of these corrective actions when program expectations are not met. Moreover, the Air Force has yet to develop policies and procedures for maintaining investment portfolios. According to the Air Force, such key practices will be addressed in future revisions to its guidance. In contrast, the Navy has not made as much progress as the Air Force in addressing either our project-level or portfolio-level recommendations. For example, the Navy has yet to fully document policies and procedures for overseeing the management of business system investments and for developing and managing complete business systems investment portfolios. Among other things, it does not have policies and procedures that specify decision-making processes for program oversight and describe how corrective actions should be taken when projects deviate from their project management plans. According to the Navy, a policy for addressing our recommendations has been drafted, but has yet to be approved. As discussed in our ITIM framework, adequately documenting both the policies and associated procedures that govern how an organization manages its IT projects and investment portfolios is important because doing so provides the basis for rigor, discipline, and repeatability in how investments are selected and controlled across the entire organization. Until these missing policies and procedures are fully defined at both the corporate and the component levels, it is unlikely that the thousands of DOD business system investments will be managed in a consistent, repeatable, and effective manner. DOD Continues to Certify and Approve Business Systems, but Decisions Are Sometimes Based on Limited Information: The Act specifies two basic requirements that took effect October 1, 2005, relative to DOD's use of funds for business system modernization investments that involve more than $1 million in obligations. First, it requires that these investments be certified by a designated approval authority[Footnote 101] as meeting specific criteria, such as demonstrating compliance with the BEA.[Footnote 102] Second, it requires that the DBSMC approve each of these certifications, adding that failure to do so before the obligation of funds for any such investment constitutes a violation of the Anti-deficiency Act.[Footnote 103] In addition, DOD's business system approval and certification guidance directs programs to submit additional information, such as a program's economic analysis, to designated approval authorities. As it has since 2005, DOD continues to certify and approve business system modernization investments in excess of $1 million. However, since 2006, we have identified limitations in the information used to certify and to approve several major programs.[Footnote 104] Moreover, although IRB certification and annual review guidance calls for DOD's authoritative business systems repository (i.e., DITPR) to be used to inform business system investment certification and annual review decisions, information in this repository is not always current and accurate. As a result, DOD risks making certification and approval decisions that are not prudent and justified. DOD Has Continued to Certify and Approve Business Modernizations in Excess of $1 Million: The department has established an approach to meeting the Act's requirements that reflects its philosophy of tiered accountability. Under this approach, investment review begins within the military departments and defense agencies and advances through a hierarchy of review and decision-making authorities, depending on the size, nature, and significance of the investment. For those investments that meet the Act's dollar thresholds, this sequence of review and decision making includes component precertification, IRB certification, and DBMSC approval. For those investments that do not, investment decision-making authority remains with the component. This review and decision-making approach has two types of reviews for business systems: certification/ approval reviews and annual reviews. Certification/approval reviews. Certification/approval reviews apply to new modernization investments with planned obligations in excess of $1 million. These reviews focus on program alignment with the BEA and must be completed before components obligate modernization funds. Tier 1, 2, and 3 investments that involve development and modernization funds are certified and approved at three levels--component precertification, IRB certification, and DBSMC approval. At the component level, program managers are responsible for the information about their respective programs that is in DITPR. Examples of information contained in DITPR are regulatory compliance reports, architectural profiles, financial benefit information (i.e., benefit- to-cost ratio), and system life cycle costs. According to the process, the component precertification authority is responsible for precertifying BEA compliance and reviewing system modernization funding requests, in addition to ensuring that IRBs receive complete, current, and accurate information within the prescribed deadlines. The precertification authority asserts the status and validity of the investment information by submitting a component precertification letter to the appropriate IRB. At the corporate level, the IRB reviews the precertification letter and related material, and if it decides to certify the investment, prepares a certification memorandum for the designated certification authority's signature that documents the IRB's decisions and any related conditions. The memorandum is forwarded to the DBSMC, which either approves or disapproves the IRB's decisions and issues a memorandum containing its decisions. If the DBSMC disapproves a system investment's certification, it is up to the component precertification authority to decide whether to resubmit the investment after it has resolved the relevant issues. Annual reviews. The annual reviews apply to all business system investments and are intended to determine whether the investment is continuing to comply with the BEA, meeting its milestones, and addressing its IRB certification conditions. Tier 1, 2, and 3 business system investments are annually reviewed by the relevant component and IRB. At the component level, program managers update information on all tiers of system investments that are identified in their component's data repository. For Tier 1, 2, or 3 systems that are in development or being modernized, information is updated on cost, milestones, and risk variances and actions or issues related to certification conditions. The component precertification authority then verifies and submits the information for these investments to the appropriate IRB in an annual memo. At the IRB level, Tier 1, 2, and 3 business system development or modernization investment reviews focus on program compliance with the BEA, program cost and performance milestones, and progress in meeting certification conditions. IRBs can advise the DBSMC to revoke a certification when the investment has significantly failed to achieve performance commitments (i.e., capabilities, schedule, and costs). When this occurs, the component must address the IRB's concerns and resubmit the investment for certification. Since October 1, 2005 (the effective date of the relevant provision of the Act), DOD has continued to certify and approve investments with obligations in excess of $1 million. Since fiscal year 2005, DOD has reported that the DBSMC had approved system modernization efforts for a total of 346 systems. According to DOD: * All but one of the 346 system modernization efforts were certified and approved as meeting the first condition in the Act--being in compliance with the BEA.[Footnote 105] These systems involved about $8.5 billion in development/modernization funding. * About 60 percent of the 346 system modernization efforts (208) are owned by the military departments and were accordingly precertified within the military departments. More specifically, 63 were precertified within the Air Force, 79 within the Army, and 66 within the Navy. DOD Certification and Approval Decisions Have Been Based on Limited Information: Although DOD has been meeting the Act's requirement to certify and approve business system modernization programs, it has at times relied on limited information in doing so. For example, we recently reported that two large Navy business system programs did not adequately demonstrate compliance with the department's federated BEA, even though each program largely followed DOD's existing compliance guidance, used its compliance assessment tool, and was certified and approved as being compliant by department investment oversight and decision-making entities.[Footnote 106] In particular, these programs' BEA compliance assessments did not (1) include all relevant architecture products, such as products that specify the technical standards needed to promote interoperability among related systems; (2) examine overlaps with other business systems, even though a stated goal of the BEA is to identify duplication and thereby promote the use of shared services; and (3) address compliance with the Department of the Navy's enterprise architecture, which is a major BEA federation member. We attributed these limitations to various reasons, including the fact that the department's guidance did not provide for performing these steps. In addition, we reported that although the department's investment oversight and decision-making authorities certified and approved these business system programs as compliant with the BEA, they did not validate each program's compliance assessment and assertions. According to DOD officials, this was because responsibility for doing so is assigned to DOD's component organizations, such as the Department of the Navy, under the department's tiered accountability approach. However, the Department of the Navy oversight and decision-making authorities also did not validate the programs' assessments and assertions. We concluded that such architecture compliance limitations increase the risk of DOD programs being defined and implemented in a way that does not sufficiently ensure interoperability and avoid duplication and overlap. Accordingly, we made a number of recommendations to address these limitations, which the department agreed to implement. Another example of limited information used to certify and approve business system investments is the unreliable economic justifications for the programs. According to relevant DOD guidance, the economic viability of system investments is to be analyzed on the basis of reliable estimates of costs and benefits. However, we have continued to report on limitations in the cost/benefit analyses used to economically justify major DOD business system investments.[Footnote 107] More recently, we reported that the Global Combat Support System-Marine Corps cost estimate was not reliable, as it was not based on historical data from similar programs and it did not account for schedule risks, both of which are needed for the estimate to be considered accurate and credible.[Footnote 108] In addition, we reported that the Navy Enterprise Resource Planning program did not employ similar cost- estimating practices.[Footnote 109] As a result, we concluded that neither program had a sufficient basis for deciding if it was the most cost-effective solution for meeting mission needs, and we made recommendations to address these weaknesses. DOD agreed with our recommendations. Accurate Information about Modernization Investments Is Not Maintained in DOD's IT System Repository: Since 2005, DITPR has been designated as the authoritative repository of information about all DOD business systems. According to DOD's business system certification and annual review guidance, information in DITPR is to be updated by component staff, validated by program managers, and reviewed by component precertification authorities to ensure its accuracy, and it is to be used by the IRBs and the DBSMC in making certification and approval decisions, respectively. The information in DITPR is not always accurate, and thus does not always provide an adequate basis for informed decision making. According to ASD(NII)/DOD CIO officials, information entered in DITPR at the component level is not always reliable and validated. Our analysis of selected business system information contained in DITPR confirmed such inaccuracies: * At least 900 systems, such as the Contractor Performance Assessment Reporting System[Footnote 110] and the Air Force's Virtual Personnel Service Center,[Footnote 111] showed life cycle phase start dates as the year 1900 or 1901. * At least 960 systems, such as the Armed Forces Health Longitudinal Technology Application[Footnote 112] and BTA's Wide Area Workflow System,[Footnote 113] show a life cycle phase end date of 2099 or later. Moreover, as stated earlier in this report, DOD provided inconsistent information about the number of business systems contained in DITPR. Specifically, in March 2009, DITPR data provided by DOD included about 6,800 systems, and in April 2009 BTA officials stated that the number of operational business systems in the repository was 2,480.[Footnote 114] Thus, the number of business systems in DITPR is also unclear. According to ASD(NII)/DOD CIO officials, a policy is being developed to have the DOD Inspector General periodically validate the accuracy of the information in DITPR. Given that the information from DITPR is used to make certification and approval decisions, serious limitations in the accuracy of information could affect the quality of the decisions. Conclusions: The pace of DOD's progress in defining and implementing key institutional modernization management controls has slowed relative to each of the prior 4 years, leaving much to be accomplished. Specifically, the corporate BEA continues to be missing important content, and it has yet to be federated through development of aligned subordinate architectures for each of the department's component organizations. Further, while the department has updated its strategy for federating the BEA, this strategy is still missing important content and it has yet to be implemented. Compounding this situation are recurring limitations in the scope and completeness of the department's enterprise transition plan, as well as the immaturity of the military department architecture programs, including the completeness of their own transition plans. In addition, the corporate and the military departments' approaches to business systems investment management continue to lack the requisite structures and defined policies and procedures to be considered effective investment selection, control, and evaluation mechanisms. Finally, information used to support the development of the transition plan and DOD's budget requests, as well as to inform certification and annual reviews, is of questionable reliability. Collectively, these long-standing limitations in the department's institutional modernization management controls continue to put billions of dollars spent each year on thousands of business system investments at risk. A well-defined federated architecture and accompanying transition plans for the business mission area, along with well-defined investment management policies and procedures across all levels of the department, are critical to effectively addressing DOD's business systems modernization high-risk area. Relatedly, it is important for the department to obtain independent assessments of the completeness, consistency, understandability, and usability of the federated family of business mission area architectures, including associated transition plans, and to share the results of these assessments with its authorizing and appropriations committees. Equally important is for the department to actually implement its architecture and investment management controls in the years ahead on each and every business system investment, and in doing so to ensure that it has reliable information on each investment upon which to base executive decision making. Our previous recommendations to the department have been aimed at accomplishing these and other important activities related to its business systems modernization. While not a guarantee, having an architecture-centric investment management approach, combined with the actual implementation of other key system acquisition disciplines that are reflected in our existing recommendations, can provide a recipe for the business systems modernization program's removal from our high-risk list. To the department's credit, it has agreed with these recommendations and committed to implementing them. Moreover, over the previous several years, it has made important progress in doing so, as prior reports have recognized. However, the pace of the progress has slowed over the last year as the roles, responsibilities, authorities, and relationships among recently established executive positions that are integral to defining and implementing these controls are worked out. In light of this, it is essential that the DBSMC, which is chaired by the DOD CMO, resolve these positional matters, as doing so is on the department's critical path for fully establishing the full range of institutional management controls needed to address its business systems modernization high-risk area. Recommendations for Executive Action: Because we have existing recommendations that address most of the institutional management control weaknesses discussed in this report, we reiterate these recommendations. In addition, to ensure that DOD continues to implement the full range of institutional management controls needed to address its business systems modernization high-risk area, we recommend that the Secretary of Defense direct the Deputy Secretary of Defense, as chair of the DBSMC and as DOD's CMO, to resolve the issues surrounding the roles, responsibilities, authorities, and relationships of the Deputy CMO and the military department CMOs relative to the BEA and ETP federation and business system investment management. Further, to ensure that business system investment reviews and related certification and approval decisions, as well as annual budget submissions, are based on complete and accurate information, we recommend that the Secretary of Defense direct the appropriate DOD organizations to develop and implement plans for reconciling and validating the completeness and reliability of information in its DITPR and SNAP-IT system data repositories, and to include information on the status of these efforts in the department's fiscal year 2010 report in response to the Act. Agency Comments and Our Evaluation: In written comments on a draft of this report, signed by the Assistant Deputy Chief Management Officer and reprinted in appendix II, the department stated that it has made important progress over the past year on its business system modernization, adding that this progress partly addresses our prior recommendations. We agree that the department has continued to make progress, and our report recognizes this. However, our report also recognizes that the pace of this progress has slowed in relation to prior years, and it links this slowdown to implementation of recent management structural changes within the department, which DOD's comments acknowledge have had to occur simultaneously. To facilitate implementation of these structural changes, we recommended that DOD resolve the issues surrounding the roles, responsibilities, authorities, and relationships of the Deputy CMO and the military department CMOs relative to the BEA and ETP federation and business system investment management. DOD partially agreed with this recommendation. In particular, the department agreed that additional clarity would be useful in defining the roles and responsibilities of these positions and stated that it is committed to resolving this ambiguity through formal policy in the near future. However, the department stated that it believes that the Deputy CMO has the necessary authority, working on behalf of the Deputy Secretary of Defense, and that the Deputy CMO has a sufficiently close working relationship with the Deputy CMOs of the military departments to make significant strides in the department's business operations improvement efforts, even in the absence of near-term formal guidance. We do not agree. As we have previously reported, the department has designated the role of the Deputy CMO as an advisor to the CMO, and it has not assigned the Deputy CMO clear decision-making authority.[Footnote 115] Further, the absence of clarity around the Deputy CMO's role and responsibilities, which DOD acknowledged in its comments, combined with this absence of clear decision-making authority, directly affects the nature of the Deputy CMO's relationship with other senior leaders in the department, as relationships are a function of roles, responsibilities, and authorities. Therefore, we stand by our recommendation. With regard to our second recommendation, to develop and implement plans for reconciling and validating the completeness and reliability of information in its DITPR and SNAP-IT data repositories, and to include information on the status of these efforts in the department's fiscal year 2010 report in response to the Act, DOD stated that it partially agreed with the recommendation. In particular, it agreed with the need to reconcile information between the two repositories and stated that it has begun to take actions to address this. For example, it stated that policy and guidance now require the components to enter information in both DITPR and SNAP-IT using what it described as a "one- to-one" relationship for all defense business systems, and that the DOD CIO is working with the components to facilitate implementation of this requirement. In addition, it stated that the DOD CIO and Office of Program Analysis and Evaluation are currently developing a plan to modify both DITPR and SNAP-IT to eliminate duplicate data and integrate them. Notwithstanding its actions aimed at reconciling DITPR and SNAP-IT data, DOD commented that it disagreed that the data in the two repositories are unreliable, stating that differences in the data between the two are due to differences in the purpose of each repository, and that the data in each are complete and accurate enough to support their purposes. In response, we recognize that the repositories are used for different purposes. However, DOD guidance calls for business system information in the two repositories to be consistent and maintained at the same level of detail, which, as we state in our report, is not occurring. In particular, the number of business systems in DITPR and SNAP-IT is not consistent, which means that one or both lack important information about DOD business systems. As also stated in our report, system-specific information contained in DITPR is not accurate. For example, at least 900 systems showed life cycle phase start dates as the year 1900 or 1901, and at least 960 systems show a life cycle phase end date of 2099 or later. In addition, during the course of our review, DOD officials that we interviewed and who operate these repositories recognized these data limitations and agreed that more needed to be done to ensure data reliability. DOD also provided technical comments on a draft of this report that we have incorporated throughout the report, as appropriate. We are sending copies of this report to interested congressional committees; the Director, Office of Management and Budget; and the Secretary of Defense. This report will also be available at no charge on our Web site at [hyperlink, http://www.gao.gov]. If you or your staffs have any questions on matters discussed in this report, please contact me at (202) 512-3439 or hiter@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. Signed by: Randolph C. Hite: Director: Information Technology Architecture and Systems Issues: List of Committees: The Honorable Carl Levin: Chairman: The Honorable John McCain: Ranking Member: Committee on Armed Services: United States Senate: The Honorable Daniel Inouye: Chairman: The Honorable Thad Cochran: Ranking Member: Committee on Appropriations: Subcommittee on Defense: United States Senate: The Honorable Ike Skelton: Chairman: The Honorable John M. McHugh: Ranking Member: Committee on Armed Services: House of Representatives: The Honorable John P. Murtha: Chairman: The Honorable C.W. Bill Young: Ranking Member: Committee on Appropriations: Subcommittee on Defense: House of Representatives: [End of section] Appendix I: Objective, Scope, and Methodology: As agreed with defense congressional committees, our objective was to assess the Department of Defense's (DOD) actions to comply with the requirements of section 2222 of Title 10, U.S. Code.[Footnote 116] To address this, we used our last annual report under the Act as a baseline,[Footnote 117] analyzing whether the department had taken actions to comply with five of the six requirements in section 2222, related best practices contained in federal guidance, and our prior recommendations that we previously identified as not yet addressed. Generally, these five requirements are (1) development of a business enterprise architecture (BEA), (2) development of an enterprise transition plan (ETP) for implementing the BEA, (3) inclusion of business systems information in DOD's budget submission, (4) establishment of business systems investment review processes and structures, and (5) approval of defense business systems investments with obligations in excess of $1 million. (See the background section of this report for additional information on the Act's requirements.) We did not include the sixth requirement, on delegating the responsibility for business systems to designated approval authorities, because our November 2005 report under the Act shows that it had been satisfied.[Footnote 118] Our methodology relative to each of the five requirements is as follows: * To determine whether the BEA addressed the requirements specified in the Act and related guidance, we analyzed version 6.0 of the BEA, which was released on March 13, 2009, relative to the Act's specific architectural requirements and related guidance that our last annual report under the Act identified as not being fully implemented. Specifically, we interviewed Business Transformation Agency (BTA) officials and reviewed written responses and related documentation on steps completed, under way, or planned to address these weaknesses. We then reviewed architectural artifacts in version 6.0 to validate the responses and identify any discrepancies. Further, we analyzed BEA supporting documentation (e.g., BEA compare reports) to determine the number of additions, updates, and deletions made to BEA artifacts (e.g., BEA business rules, data elements, data objects, data entities, information exchanges, system data exchanges, system entities, system functions, system interfaces, and technical standards) as compared with the architectural content of version 5.0. We also analyzed BEA supporting documentation to identify the number of additions, updates, and deletions made to BEA artifacts (e.g., BEA business rules, data objects, system data exchanges, system entities, and system functions) that were specifically associated with the financial visibility business enterprise priority area. To evaluate progress made in federating DOD's BEA, we reviewed DOD's Business Mission Area Architecture Federation Strategy and Roadmap Version 2.4, released in January 2008, comparing the strategy and any associated implementation plans with prior findings and recommendations relative to the content of the strategy. We also obtained documentation and interviewed cognizant DOD officials about efforts to establish a federated DOD business mission area enterprise architecture. Further, we reviewed the military departments' responses on actions taken or planned to address our previous recommendations on the maturity of their respective enterprise architecture programs.[Footnote 119] In addition, we reviewed the independent verification and validation (IV&V) contractor's statement of work and IV&V reports to determine whether they addressed the quality of the department's federated family of corporate and component architectures, including the federated ETPs, and we interviewed the IV&V contractor and BTA officials to determine plans for future IV&V work to address the architectures' quality. * To determine whether the DOD ETP addressed the requirements specified in the Act, we reviewed the updated version of the ETP, which was released on September 15, 2008, relative to the Act's requirements and related transition plan guidance that our last annual report under the Act identified as not being fully implemented.[Footnote 120] Specifically, we interviewed BTA officials and reviewed written responses and related documentation on steps completed, under way, or planned to address these weaknesses. We then reviewed the plan to validate the responses and identify any discrepancies. In addition, to determine the extent to which the ETP included system and budget information for all the business systems identified in the department's information technology (IT) systems repository, we reviewed and compared the number of defense business systems listed in the department's authoritative business systems inventory--the Defense Information Technology Portfolio Repository (DITPR)--with the number in its IT budget system, the Select and Native Programming Data Input System--Information Technology (SNAP-IT), with the number in the ETP. Further, we reviewed and compared business system information, such as legacy system migration information in the ETP, with the information obtained from our recently completed and ongoing business system reviews to determine whether the information was consistent. We interviewed BTA officials to discuss any discrepancies. Furthermore, we obtained and reviewed information from the Departments of the Air Force, Army, and Navy on the extent to which they have made progress in satisfying existing recommendations associated with developing their respective ETPs. * We were unable to determine whether DOD's fiscal year 2010 information technology budget submission was prepared in accordance with the criteria set forth in the Act because the budget submission was not released in time for us to review for this report. Instead, we analyzed and compared information contained in the department's system that is used to prepare its budget submission (SNAP-IT) with information in the ETP and DOD's DITPR system to determine if DOD's fiscal year 2009 budget request included all business systems. We interviewed BTA and Assistant Secretary of Defense (Networks and Information Integration)/Department of Defense Chief Information Officer (ASD(NII)/DOD CIO) officials to discuss the accuracy and comprehensiveness of information contained in the SNAP-IT system, the discrepancies in the information contained in the ETP, DITPR, and SNAP- IT systems, and efforts under way or planned to address these discrepancies. DOD officials were not able to provide the supporting data to address any discrepancies in the number of business systems contained in DITPR in time for inclusion in our report. * To determine whether DOD has established investment review structures and processes, we focused on the one Investment Review Board specified in the Act that we previously reported had yet to be established. Accordingly, we obtained documentation from and interviewed cognizant DOD officials about actions completed, under way, and planned relative to the establishment of the DOD Chief Information Officer Investment Review Board. We also obtained and reviewed documentation--such as DOD IT Defense Business Systems Investment Review Process Guidance and Operation of the Defense Acquisition System, Department of Defense Instruction Number 5000.02,[Footnote 121] as well as the Air Force Information Technology Investment Review Guide and Air Force Information Technology Portfolio Management and IT Investment Review [Footnote 122]--and interviewed knowledgeable DOD officials about efforts to address DOD corporate and component investment management- related weaknesses that we identified in previous reports. We also reviewed and leveraged our previous reports that addressed DOD corporate and component approaches to managing business system investments.[Footnote 123] * To determine whether the department was reviewing and approving business system investments exceeding $1 million, we obtained information from BTA on the number of defense business systems certified and approved since our last annual review, including information about Air Force, Army, and Navy actions that were taken in order to perform the annual systems reviews as required pursuant to the Act. In addition, we summarized the results of recent reports associated with information used during the certification and annual review process. We also interviewed BTA and ASD(NII)/DOD CIO officials to determine the steps taken, planned, or under way to validate the accuracy of the information in DITPR to be used by the review boards in making certification and approval decisions. In addition, we analyzed selected business system information contained in DITPR, such as system life cycle start and end dates, to validate the reliability of the information. We did not independently validate the reliability of the cost and budget figures provided by DOD because the specific amounts were not relevant to our findings. We conducted this performance audit at DOD offices in Arlington, Virginia, from January 2009 to May 2009, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. [End of section] Appendix II: Comments from the Department of Defense: Department of Defense: Office Of Deputy Chief Management Officer: 9010 Defense Pentagon: Washington, DC 20301-9010: May 7, 2009: Mr. Randolph C. Hite: Director, Information Technology Architecture and Systems Issues: U.S. Government Accountability Office: 441 G Street NW: Washington, DC 20548: Dear Mr. Hite: This is the Department of Defense (DoD) response to the (GAO draft report 09-586, "DOD Business Systems Modernization: Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed" dated April 27, 2009 (GAO Code 310675). The Department welcomes GAO's insight and acknowledgement of its business systems modernization progress. DOD believes that it has made important progress over the past year while simultaneously implementing recently passed statutes involving changes to the management structure for its business operations. This progress partly addresses open business systems modernization GAO recommendations and DOD will continue to take steps to address open recommendations. The Department partially concurs with GAO's recommendation to resolve issues surrounding the roles, responsibilities, authorities, and relationships of the Deputy Chief Management Officer (DCMO) and the Military Departments' Chief Management Officers (CMOs). DOD agrees that additional clarity would be useful in defining the roles and responsibilities of these positions and DOD is committed to resolving this ambiguity through formal policy sometime in the future. However, the Department believes that the DOD DCMO has the necessary authority, working on behalf of the Deputy Secretary of Defense, and a sufficiently close working relationship with the DCMOs of the Military Departments to make significant strides in the Department's business operations improvement efforts, even in the absence of near-term, formal guidance. DOD partially concurs with the recommendation regarding the alignment of the data in the Defense Information Technology Portfolio Repository (DITPR) and Select and Native Programming Data Input System -- Information Technology (SNaP-IT) system data repositories. The Department recognizes the need to reconcile the information between the two systems. and has taken some steps in recent years to accomplish this, such as updating the Financial Management Regulation to include the requirement for Components to enter data in the two systems using a one-to-one relationship for all defense business systems, and is currently developing a plan to further align the data. However, DoD believes that the quality of the data in both systems supports the purposes for which those systems are intended to he used. We appreciate the support of GAO as the Department further advances in its business transformation efforts, and look forward to continuing our partnership in achieving our shared goals. Signed by: Elizabeth A. McGrath: Assistant Deputy Chief Management Officer: [End of letter] GAO Draft Report Dated April 24, 2009: GAO-09-586 (GAO Code 310675): "DOD Business Systems Modernization: Recent Slowdown In Institutionalizing Key Management Controls Needs To Be Addressed" Department Of Defense Comment To The GAO Recommendations: Recommendation 1: The GAO recommends that the Secretary of Defense direct the Deputy Secretary of Defense to resolve the issues surrounding the roles, responsibilities, authorities, and relationships of the Deputy Chief Management Officer and the military department Chief Management Officers relative to the Business Enterprise Architecture and enterprise transition plan federation and business system investment management. (p. 61/GAO Draft Report) DOD Response: Partially Concur. The Department partially concurs with GAO's recommendation to resolve issues surrounding the roles, responsibilities, authorities, and relationships of the Deputy Chief Management Officer (DCMO) and the Military Departments' Chief Management Officers (CMOs). DoD agrees that additional clarity would be useful in defining the roles and responsibilities of these positions and DoD is committed to resolving this ambiguity through formal policy in the near future. However, the Department believes that the DoD DCMO has the necessary authority, working on behalf of the Deputy Secretary of Defense, and a sufficiently close working relationship with the DCMOs of the Military Departments to make significant strides in the Department's business operations improvement efforts, even in the absence of near-term formal guidance. Federation of the Business Enterprise Architecture and Enterprise Transition Plan and improvement or the business system investment management process remain key objectives of the Department's improvement efforts. The Office of the DoD DCMO, in conjunction with the Business Transformation Agency, is currently working with the Military Department DCMOs and other appropriate officials to advance these initiatives. Recommendation 2: The GAO recommends that the Secretary of Defense direct the appropriate DOD organizations to develop and implement plans for reconciling and validating the completeness and reliability of information in its Defense Information Technology Portfolio Repository (DITPR) and Select and Native Programming Data input System - Information Technology (SNaP-IT) system data repositories, and to include information on the status of these efforts in the department's FY 2010 report in response to the act. (p. 61/GAO Draft Report) DOD Response: Partially Concur. DOD agrees with the GAO recommendation to synchronize information stored in SNaP-IT and DITPR, and has already taken steps to address this need. Currently, a many-to-many relationship exists between "Systems" for which technical information is stored in DITPR, and "initiatives" for which financial information is stored in SNaP-IT. An update to the regulation that provides financial management policy and procedures to the DOD was issued in June 2007[Footnote 125] requiring components to start entering information in both DITPR and SNaP-IT using a one-to-one relationship for all defense business systems. The Department of Defense Chief Information Officer (DOD CIO) is now working with the components to help facilitate implementation of that policy. This policy is also stated in guidance issued in July 2008.[Footnote 126] In addition, the DOD CIO and the Office of Program Analysis and Evaluation (PA&E) are currently corking On a plan to modify both DITPR and SNaP-IT to eliminate the duplication of data and use web services to provide seamless integration of the two systems. Completion of the technical effort is expected in the next 12 months. Challenges to completing the non-technical aspects of this effort include: a) changes in component-level policies and practices for budgeting and reporting information technology (IT) systems and by alignment of IT investments currently reported in SNaP-IT and DITPR. DOD CIO will collaborate with the components to make the necessary changes to these policies and practices. However, the Department disagrees with the GAO's implication that the data in the two systems is not reliable. It should be noted that differences in information between the two systems are due to the information being collected and displayed for different purposes. Current Investment Review Board (IRB) Guidance states that a program's Program Manager (PM) ensures and the Pre-Certification Authority (PCA) validates the information in DITPR as being current. complete and accurate. In addition. the DOD CIO currently requires components to certify the completeness and accuracy of required data in both DITPR and SNaP-IT. There has been significant improvement in the quality of information in both systems since the implementation of this requirement. DOD CIO believes the quality of information in both systems is complete and accurate enough to support their purposes. [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: Randolph C. Hite, (202) 512-3439 or hiter@gao.gov: Staff Acknowledgments: In addition to the contact person named above, key contributors to this report were Neelaxi Lakhmani (Assistant Director), Justin Booth, Michael Holland, Anh Le, Emily Longcore, Lee McCracken, Christine San, Sylvia Shanks, Jennifer Stavros-Turner, and Adam Vodraska. [End of section] Footnotes: [1] Business systems support DOD's business operations, such as civilian personnel, finance, health, logistics, military personnel, procurement, and transportation. [2] GAO, High-Risk Series: An Update, [hyperlink, http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: Jan. 22, 2009). [3] An enterprise architecture, or modernization blueprint, provides a clear and comprehensive picture of an entity, whether it is an organization (e.g., federal department or agency) or a functional or mission area that cuts across more than one organization (e.g., financial management). This picture consists of snapshots of the enterprise's current or "as is" operational and technological environment and its target or "to be" environment, and contains a capital investment road map for transitioning from the current to the target environment. These snapshots consist of "views," which are basically one or more architecture products that provide conceptual or logical representations of the enterprise. [4] GAO, Information Technology: Architecture Needed to Guide Modernization of DOD's Financial Operations, [hyperlink, http://www.gao.gov/products/GAO-01-525] (Washington, D.C.: May 17, 2001). [5] See for example, GAO, DOD Business Systems Modernization: Long- standing Weaknesses in Enterprise Architecture Development Need to Be Addressed, [hyperlink, http://www.gao.gov/products/GAO-05-702] (Washington, D.C.: July 22, 2005); DOD Business Systems Modernization: Billions Being Invested without Adequate Oversight, [hyperlink, http://www.gao.gov/products/GAO-05-381] (Washington, D.C.: Apr. 29, 2005); DOD Business Systems Modernization: Limited Progress in Development of Business Enterprise Architecture and Oversight of Information Technology Investments, [hyperlink, http://www.gao.gov/products/GAO-04-731R] (Washington, D.C.: May 17, 2004); DOD Business Systems Modernization: Important Progress Made to Develop Business Enterprise Architecture, but Much Work Remains, [hyperlink, http://www.gao.gov/products/GAO-03-1018] (Washington, D.C.: Sept. 19, 2003); Business Systems Modernization: Summary of GAO's Assessment of the Department of Defense's Initial Business Enterprise Architecture, [hyperlink, http://www.gao.gov/products/GAO-03-877R] (Washington, D.C.: July 7, 2003); Information Technology: Observations on Department of Defense's Draft Enterprise Architecture, [hyperlink, http://www.gao.gov/products/GAO-03-571R] (Washington, D.C.: Mar. 28, 2003); DOD Business Systems Modernization: Improvements to Enterprise Architecture Development and Implementation Efforts Needed, [hyperlink, http://www.gao.gov/products/GAO-03-458] (Washington, D.C.: Feb. 28, 2003); and [hyperlink, http://www.gao.gov/products/GAO-01-525]. [6] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [7] GAO, DOD Business Systems Modernization: Progress in Establishing Corporate Management Controls Needs to Be Replicated Within Military Departments, [hyperlink, http://www.gao.gov/products/GAO-08-705] (Washington, D.C.: May 15, 2008). [8] See for example, GAO, DOD Business Systems Modernization: Key Marine Corps System Acquisition Needs to Be Better Justified, Defined, and Managed, [hyperlink, http://www.gao.gov/products/GAO-08-822] (Washington, D.C.: July 28, 2008); DOD Business Systems Modernization: Key Navy Programs' Compliance with DOD's Federated Business Enterprise Architecture Needs to Be Adequately Demonstrated, [hyperlink, http://www.gao.gov/products/GAO-08-972] (Washington, D.C.: Aug. 7, 2008); and DOD Business Systems Modernization: Important Management Controls Being Implemented on Major Navy Program, but Improvements Needed in Key Areas, [hyperlink, http://www.gao.gov/products/GAO-08-896] (Washington, D.C.: Sept. 8, 2008). [9] GAO, Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed, [hyperlink, http://www.gao.gov/products/GAO-06-658] (Washington, D.C.: May 15, 2006). [10] See, for example, GAO, DOD Travel Cards: Control Weaknesses Resulted in Millions of Dollars of Improper Payments, [hyperlink, http://www.gao.gov/products/GAO-04-576] (Washington, D.C.: June 9, 2004); Military Pay: Army National Guard Personnel Mobilized to Active Duty Experienced Significant Pay Problems, [hyperlink, http://www.gao.gov/products/GAO-04-89] (Washington, D.C.: Nov. 13, 2003); and Defense Inventory: Opportunities Exist to Improve Spare Parts Support Aboard Deployed Navy Ships, [hyperlink, http://www.gao.gov/products/GAO-03-887] (Washington, D.C.: Aug. 29, 2003). [11] [hyperlink, http://www.gao.gov/products/GAO-09-271]. [12] These 8 high-risk areas are DOD's overall approach to business transformation, business systems modernization, financial management, the personnel security clearance program, supply chain management, support infrastructure management, weapon systems acquisition, and contract management. [13] The 7 governmentwide high-risk areas are disability programs, ensuring the effective protection of technologies critical to U.S. national security interests, interagency contracting, information systems and critical infrastructure, information sharing for homeland security, human capital, and real property. [14] 40 U.S.C. § 11315(b)(2). [15] 44 U.S.C. § 3602(f)(14). [16] GAO, Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity, [hyperlink, http://www.gao.gov/products/GAO-04-394G] (Washington, D.C.: March 2004); Information Technology: A Framework for Assessing and Improving Enterprise Architecture Management, Version 1.1, [hyperlink, http://www.gao.gov/products/GAO-03-584G] (Washington, D.C.: April 2003); OMB Capital Programming Guide, Version 1.0 (July 1997); and CIO Council, A Practical Guide to Federal Enterprise Architecture, Version 1.0 (February 2001). [17] [hyperlink, http://www.gao.gov/products/GAO-03-584G]. [18] OMB, Improving Agency Performance Using Information and Information Technology (Enterprise Architecture Assessment Framework v3.0) (December 2008). [19] 40 U.S.C. § 11302(c)(1). The Clinger-Cohen Act of 1996 expanded the responsibilities of OMB and the agencies that had been set under the Paperwork Reduction Act with regard to IT management. See 44 U.S.C. 3504(a)(1)(B)(vi) (OMB); 44 U.S.C. 3506(h)(5) (agencies). [20] We have made recommendations to improve OMB's process for monitoring high-risk IT investments; see GAO, Information Technology: OMB Can Make More Effective Use of Its Investment Reviews, GAO-05-276 (Washington, D.C.: Apr. 15, 2005). [20] This policy is set forth and guidance is provided in OMB Circular No. A-11 (Nov. 2, 2005) (section 300), and in OMB's Capital Programming Guide, which directs agencies to develop, implement, and use a capital programming process to build their capital asset portfolios. [22] See for example, GAO, Cost Estimating and Assessment Guide: Best Practices for Developing and Managing Capital Program Costs, [hyperlink, http://www.gao.gov/products/GAO-09-3SP] (Washington, D.C.: March 2009); [hyperlink, http://www.gao.gov/products/GAO-04-394G]; [hyperlink, http://www.gao.gov/products/GAO-03-584G]; and Assessing Risks and Returns: A Guide for Evaluating Federal Agencies' IT Investment Decision-making, [hyperlink, http://www.gao.gov/products/GAO/AIMD-10.1.13] (Washington, D.C.: February 1997). [23] J. A. Zachman "A Framework for Information Systems Architecture," IBM Systems Journal 26, no. 3 (1987). [24] DOD, Department of Defense Architecture Framework, Version 1.5, Volumes I-III (April 2007). [25] See, for example, GAO, Federal Aviation Administration: Stronger Architecture Program Needed to Guide Systems Modernization Efforts, [hyperlink, http://www.gao.gov/products/GAO-05-266] (Washington, D.C.: Apr. 29, 2005); Homeland Security: Efforts Under Way to Develop Enterprise Architecture, but Much Work Remains, [hyperlink, http://www.gao.gov/products/GAO-04-777] (Washington, D.C.: Aug. 6, 2004); [hyperlink, http://www.gao.gov/products/GAO-04-731R]; Information Technology: Architecture Needed to Guide NASA's Financial Management Modernization, [hyperlink, http://www.gao.gov/products/GAO-04-43] (Washington, D.C.: Nov. 21, 2003); GAO-03-1018; [hyperlink, http://www.gao.gov/products/GAO-03-877R]; Information Technology: DLA Should Strengthen Business Systems Modernization Architecture and Investment Activities, [hyperlink, http://www.gao.gov/products/GAO-01-631] (Washington, D.C.: June 29, 2001); and Information Technology: INS Needs to Better Manage the Development of Its Enterprise Architecture, [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-212] (Washington, D.C.: Aug. 1, 2000). [26] [hyperlink, http://www.gao.gov/products/GAO-03-584G]. [27] GAO, Information Technology: FBI Has Largely Staffed Key Modernization Program, but Strategic Approach to Managing Program's Human Capital Is Needed, [hyperlink, http://www.gao.gov/products/GAO-07-19] (Washington, D.C.: Oct. 16, 2006). [28] [hyperlink, http://www.gao.gov/products/GAO-04-394G]; [hyperlink, http://www.gao.gov/products/GAO/AIMD-10.1.13]; GAO, Executive Guide: Improving Mission Performance Through Strategic Information Management and Technology, [hyperlink, http://www.gao.gov/products/GAO/AIMD-94-115] (Washington, D.C.: May 1994); and OMB, Evaluating Information Technology Investments, A Practical Guide (Washington, D.C.: November 1995). [29] [hyperlink, http://www.gao.gov/products/GAO-04-394G]. [30] GAO, Information Technology: SSA Has Taken Key Steps for Managing Its Investments, but Needs to Strengthen Oversight and Fully Define Policies and Procedures, [hyperlink, http://www.gao.gov/products/GAO-08-1020] (Washington, D.C.: Sept. 12, 2008); Information Technology: Treasury Needs to Strengthen Its Investment Board Operations and Oversight, [hyperlink, http://www.gao.gov/products/GAO-07-865] (Washington, D.C.: July 23, 2007); Information Technology: DHS Needs to Fully Define and Implement Policies and Procedures for Effectively Managing Investments, [hyperlink, http://www.gao.gov/products/GAO-07-424] (Washington, D.C.: Apr. 27, 2007); Information Technology: Centers for Medicare & Medicaid Services Needs to Establish Critical Investment Management Capabilities, [hyperlink, http://www.gao.gov/products/GAO-06-12] (Washington, D.C.: Oct. 28, 2005); Information Technology: HHS Has Several Investment Management Capabilities in Place, but Needs to Address Key Weaknesses, [hyperlink, http://www.gao.gov/products/GAO-06-11] (Washington, D.C.: Oct. 28, 2005); Information Technology Management: Census Bureau Has Implemented Many Key Practices, but Additional Actions Are Needed, [hyperlink, http://www.gao.gov/products/GAO-05-661] (Washington, D.C.: June 16, 2005); Information Technology: FAA Has Many Investment Management Capabilities in Place, but More Oversight of Operational Systems Is Needed, [hyperlink, http://www.gao.gov/products/GAO-04-822] (Washington, D.C.: Aug. 20, 2004); Information Technology: Departmental Leadership Crucial to Success of Investment Reforms at Interior, [hyperlink, http://www.gao.gov/products/GAO-03-1028] (Washington, D.C.: Sept. 12, 2003); Bureau of Land Management: Plan Needed to Sustain Progress in Establishing IT Investment Management Capabilities, [hyperlink, http://www.gao.gov/products/GAO-03-1025] (Washington, D.C.: Sept. 12, 2003); United States Postal Service: Opportunities to Strengthen IT Investment Management Capabilities, [hyperlink, http://www.gao.gov/products/GAO-03-3] (Washington, D.C.: Oct. 15, 2002); and Information Technology: DLA Needs to Strengthen Its Investment Management Capability, [hyperlink, http://www.gao.gov/products/GAO-02-314] (Washington, D.C.: Mar. 15, 2002). [31] 40 U.S.C. §§ 11311-11313. [32] Pub. L. No. 110-181 § 904 (2008). [33] Pub. L. No. 110-181 § 904 (2008). [34] Pub. L. No. 110-417 § 908 (2008). [35] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004) (codified in part at 10 U.S.C. § 2222). [36] [hyperlink, http://www.gao.gov/products/GAO-06-219], [hyperlink, http://www.gao.gov/products/GAO-06-658], [hyperlink, http://www.gao.gov/products/GAO-07-733], and [hyperlink, http://www.gao.gov/products/GAO-08-705]. [37] [hyperlink, http://www.gao.gov/products/GAO-08-972]. [38] [hyperlink, http://www.gao.gov/products/GAO-09-272R]. [39] [hyperlink, http://www.gao.gov/products/GAO-09-272R]. [40] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [41] Information assurance refers to measures that defend and protect information and information systems by ensuring their confidentiality, integrity, authenticity, availability, and utility. [42] The W3C XML-Encryption Syntax and Processing standard provides end- to-end security for applications that require secure exchange of XML data. Agile Web services applications in need of secure and reliable data can use this standard to prevent interception, alteration, and unauthorized decryption of information. [43] An expeditionary environment is one in which warfighters are deployed away from their home base and where network access, bandwidth, and reliable infrastructure are constrained in comparison with the normal DOD business environment in the continental United States. [44] The BEA is organized around six business enterprise priority areas. The Common Supplier Engagement priority area seeks to standardize the methods that DOD uses to interact with commercial and government suppliers in the acquisition of catalog, stock, as well as made-to-order and engineer-to-order goods and services. It also provides the associated visibility of supplier-related information to the warfighting and business mission areas. The other business enterprise priority areas are Personnel Visibility, Acquisition Visibility, Materiel Visibility, Real Property Accountability, and Financial Visibility. [45] An indefinite delivery/indefinite quantity contract is a type of contract that provides, within stated limits, for an indefinite quantity of supplies or services during a fixed period of time. [46] The File Discrepancy Report for Other Goods and Services business process includes listing goods or services that were not accepted, the reasons for rejection, and processing discrepancy dispute updates. [47] The Awarded Contract information exchange represents a contract that has been awarded to an external supplier. [48] The Receipt Account Trial Balance and Ledgers information exchange contains detailed receipt transactions and balances reported by DOD during the month. [49] Deliver Property and Forces describes activities for issuing, transporting, and delivering property, materiel, and forces. [50] The Approved Payment Request information exchange is a request for payment from a vendor or other party owed by the government that has been approved and confirmed to comply with the terms and conditions of the contract. [51] The Payment Request for Goods data exchange is a request for payment for goods from a vendor or other party owed by the government. [52] The Accounts Payable Account information exchange is a summary of general ledger accounts used for financial reporting. [53] The Final Contract or Order Costs information exchange is a determination of the final cost of a contract or intragovernmental order that is not firm-fixed price and must be reconciled prior to contract or order closeout; the Estimate at Completion information exchange is the estimated total cost for all authorized work. [54] The operational information exchange product describes the information exchanges associated with operational activities. [55] Budget to Report encompasses all business functions necessary to plan, formulate, create, execute against, and report on the budget and business activities of the entity, including updates to the general ledger. [56] The Execute Apportionment and Allocate Funds business process involves recording an agency's budgetary resources and supporting the establishment of legal budgetary limitations within the agency. It also involves supporting the establishment of funding to agencies that are not subject to apportionment. [57] A create, read, update, and delete matrix shows the specific business functions and applications that create, read, update, and/or delete specific data elements, which enables the organization to develop applications. [58] Approved Apportionment is the notification from OMB that DOD's apportionment request has been approved and is available for distribution to the components and/or services. [59] [hyperlink, http://www.gao.gov/products/GAO-08-705], [hyperlink, http://www.gao.gov/products/GAO-07-733], and [hyperlink, http://www.gao.gov/products/GAO-06-658]. [60] GAO, Business Systems Modernization: Strategy for Evolving DOD's Business Enterprise Architecture Offers a Conceptual Approach, but Execution Details Are Needed, [hyperlink, http://www.gao.gov/products/GAO-07-451] (Washington, D.C.: Apr. 16, 2007). [61] According to DOD, the global information grid consists of a globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policymakers, and support personnel, and as such represents the department's IT architecture. The global information grid strategy provides for federating the many and varied architectures across the department's four mission areas--Warfighting, Business, DOD Intelligence, and Enterprise Information Environment. It was issued in August 2007 by ASD(NII)/DOD CIO. [62] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [63] Metadata is information (attributes) about artifacts (e.g., a description of the artifact or author of the artifact). [64] Search and discovery capabilities are intended to enable discovery of architecture metadata and services stored in repositories. [65] An architecture model is a template for creating an architecture view. It is intended to allow understandability by users and interoperability between architectures. [66] An access control mechanism is a means for determining the permissible activities of users and authorizing or prohibiting activities by each user. [67] Use of an independent verification and validation agent is an architecture management best practice for identifying architecture strengths and weaknesses and disclosing to department and congressional oversight bodies the information they need to better ensure that DOD's family of architectures and associated transition plans satisfy key quality parameters. [68] [hyperlink, http://www.gao.gov/products/GAO-07-733]. [69] [hyperlink, http://www.gao.gov/products/GAO-08-519]. [70] [hyperlink, http://www.gao.gov/products/GAO-03-584G]. [71] From 2006 to 2008, DOD's March Congressional Report also represented an update of its ETP. However, this year's March Congressional Report does not include an ETP update. As a result, the most recent version of the ETP was released in September 2008. According to BTA, the department is revisiting its approach to releasing the ETP. [72] Key transformational objectives include the business enterprise priorities: Personnel Visibility, Acquisition Visibility, Materiel Visibility, Common Supplier Engagement, Real Property Accountability, and Financial Visibility. [73] Time-phased milestones refer to milestones, such as milestone A (which occurs at the end of the Material Solution Analysis phase), milestone B (which occurs at the completion of the Technology Development phase), milestone C (which occurs at the end of the Engineering and Manufacturing Development phase), initial operating capability, and full operating capability. [74] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [75] [hyperlink, http://www.gao.gov/products/GAO-03-584G] and CIO Council, A Practical Guide to Federal Enterprise Architecture, Version 1.0 (February 2001). [76] Net-Centric Enterprise Services is intended to provide capabilities that are key to enabling ubiquitous access to reliable decision-quality information. Its capabilities include a service- oriented architecture foundation (e.g., security and information assurance), collaboration (e.g., application sharing), content discovery and delivery (e.g., delivering information across the enterprise), and portal (e.g., user-defined Web-based presentation). [77] Enterprise application integration software is a commercial software product, commonly referred to as middleware, to permit two or more incompatible systems to exchange data from different databases. [78] The Navy Enterprise Resource Planning program is to standardize the Navy's business processes, such as acquisition and financial management. [79] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [80] Of the 2,100 systems, 600 are categorized as either national security systems (i.e., intelligence systems, cryptologic activities related to national security, military command and control systems, and equipment that is an integral part of a weapon or weapons system or is critical to the direct fulfillment of military or intelligence missions or systems that store, process, or communicate classified information) or are not within the business mission area (e.g., warfighting mission area). [81] 40 U.S.C. § 11312. [82] [hyperlink, http://www.gao.gov/products/GAO-04-394G]. [83] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [84] The four IRBs are for (1) Financial Management, (2) Weapon Systems Lifecycle Management and Materiel Supply and Services Management, (3) Real Property and Installations Lifecycle Management, and (4) Human Resources Management. [85] The Enterprise Information Environment Mission Area enables the functions of the other mission areas (e.g., Warfighting Mission Area, Business Mission Area, and Defense Intelligence Mission Area) and encompasses communications, computing, and core enterprise service systems, equipment, or software that provides a common information capability or service for enterprise use. [86] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [87] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [88] Secretary of Navy Instruction 5230.14. [89] [hyperlink, http://www.gao.gov/products/GAO-07-538]. [90] DOD Instruction 5000.02, Dec. 2, 2008. [91] The Joint Capabilities Integration and Development System is a need-driven management system used to identify future capabilities for DOD, and the Defense Acquisition System is an event-driven system for managing product development and procurement and guides the acquisition process for DOD. [92] According to DOD, the component functional sponsor is the component executive responsible for defining and managing capabilities, verifying that capability requirements are met, representing the user community's interests, and ensuring funding for defense business system investments. [93] According to DOD, the milestone decision authority is the designated individual who has overall responsibility for an investment. This person has the authority to approve an investment's progression in the acquisition process and is responsible for reporting cost, schedule, and performance results. For example, the milestone decision authority for a Major Automated Information System is the ASD(NII)/DOD CIO or a designee. [94] DOD, Chairman of the Joint Chiefs of Staff Instruction: Joint Capabilities Integration and Development System, 3170.01G, March 1, 2009. [95] [hyperlink, http://www.gao.gov/products/GAO-07-538]. [96] The Planning, Programming, Budgeting, and Execution process is a calendar-driven management system for allocating resources and comprises four phases--planning, programming, budgeting, and executing-- that define how budgets for each DOD component and the department as a whole are created, vetted, and executed. [97] Directive-Type Memorandum 08-020 "Investment Review Board Roles and Responsibilities," signed by the Deputy Secretary of Defense (Jan. 26, 2009). [98] The certification authorities are the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Under Secretary of Defense (Comptroller); Under Secretary of Defense for Personnel and Readiness; ASD(NII)/DOD CIO; and the Deputy Secretary of Defense. [99] [hyperlink, http://www.gao.gov/products/GAO-08-52] and [hyperlink, http://www.gao.gov/products/GAO-08-53]. [100] U.S. Air Force, Air Force Instruction 33-141: Air Force Information Technology Portfolio Management and IT Investment Review, Dec. 23, 2008, and Air Force Information Technology Investment Review Guide, Version 2.2, Nov. 24, 2008. [101] The approval authorities, as discussed earlier in this report, are the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Under Secretary of Defense (Comptroller); the Under Secretary of Defense for Personnel and Readiness; the ASD(NII)/DOD CIO; and the Deputy Secretary of Defense. They are responsible for the review, approval, and oversight of business systems and must establish investment review processes for systems under their cognizance. [102] The Act requires certification by designated approval authorities that the defense business system modernization is (1) in compliance with the enterprise architecture, (2) necessary to achieve critical national security capability or address a critical requirement in an area such as safety or security, or (3) necessary to prevent a significant adverse effect on a project that is needed to achieve an essential capability, taking into consideration the alternative solutions for preventing such an adverse effect. [103] 10 U.S.C.§2222(b); 31 U.S.C.§1341(a) (1) (A). [104] [hyperlink, http://www.gao.gov/products/GAO-06-171], [hyperlink, http://www.gao.gov/products/GAO-06-215], [hyperlink, http://www.gao.gov/products/GAO-08-972], [hyperlink, http://www.gao.gov/products/GAO-08-822], and [hyperlink, http://www.gao.gov/products/GAO-08-896]. [105] The one system that was not certified and approved as compliant was certified and approved as meeting the Act's other condition--being necessary to achieve a critical national security capability or address a critical requirement in an area such as safety or security. [106] [hyperlink, http://www.gao.gov/products/GAO-08-972]. [107] See, for example, [hyperlink, http://www.gao.gov/products/GAO-06-215], GAO-06-171, [hyperlink, http://www.gao.gov/products/GAO-08-822], GAO-08-896, and [hyperlink, http://www.gao.gov/products/GAO-08-922]. [108] [hyperlink, http://www.gao.gov/products/GAO-08-822]. [109] [hyperlink, http://www.gao.gov/products/GAO-08-896]. [110] The Contractor Performance Assessment Reporting System is a Web- enabled application that collects and manages a library of automated contractor performance reports. [111] The Air Force's Virtual Personnel Service Center is to provide the Air Force unique human resources services not provided by the Defense Integrated Military Human Resources System. [112] The Armed Forces Health Longitudinal Technology Application is the military's electronic health record system. [113] The Wide Area Workflow System is an enterprise solution for electronic submission, acceptance and processing of invoices and receiving reports, and matching them with contracts to authorize payment. [114] The preceding information about business system life cycle start and end dates was obtained from DOD's March 2009 DITPR data. Nevertheless, the specific examples cited in this report (e.g., BTA's Wide Area Workflow System) are defined as business systems in DOD's SNAP-IT system and were reported as business systems in DOD's fiscal year 2009 budget request. [115] [hyperlink, http://www.gao.gov/products/GAO-09-272R]. [116] Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. No. 108-375, § 332, 118 Stat. 1811, 1851-1856 (Oct. 28, 2004). [117] GAO, DOD Business Systems Modernization: Progress in Establishing Corporate Management Controls Needs to Be Replicated within Military Departments, [hyperlink, http://www.gao.gov/products/GAO-08-705] (Washington, D.C.: May 15, 2008). [118] GAO, DOD Business Systems Modernization: Important Progress Made in Establishing Foundational Architecture Products and Investment Management Practices, but Much Work Remains, [hyperlink, http://www.gao.gov/products/GAO-06-219] (Washington, D.C.: Nov. 23, 2005). [119] GAO, DOD Business Systems Modernization: Military Departments Need to Strengthen Management of Enterprise Architectures, [hyperlink, http://www.gao.gov/products/GAO-08-519] (Washington D.C.: May 12, 2008). [120] [hyperlink, http://www.gao.gov/products/GAO-08-705]. [121] DOD, DOD IT Defense Business Systems Investment Review Process Guidance, January 2009, and Operation of the Defense Acquisition System, Department of Defense Instruction Number 5000.02, Dec. 2, 2008. [1222] U.S. Air Force, Air Force Information Technology Investment Review Guide, Ver. 2.2, Nov. 24, 2008, and Air Force Instruction 33- 141: Air Force Information Technology Portfolio Management and IT Investment Review, Dec. 23, 2008. [123] GAO, Business Systems Modernization: DOD Needs to Fully Define Policies and Procedures for Institutionally Managing Investments, [hyperlink, http://www.gao.gov/products/GAO-07-538] (Washington, D.C.: May 11, 2007); Business Systems Modernization: Air Force Needs to Fully Define Policies and Procedures for Institutionally Managing Investments, [hyperlink, http://www.gao.gov/products/GAO-08-52] (Washington D.C.: Oct. 31, 2007); Business Systems Modernization: Department of the Navy Needs to Establish Management Structure and Fully Define Policies and Procedures for Institutionally Managing Investments, [hyperlink, http://www.gao.gov/products/GAO-08-53] (Washington D.C.: Oct. 31, 2007). [124] GAO, DOD Business Systems Modernization: Key Marine Corps System Acquisition Needs to Be Better Justified, Defined, and Managed, [hyperlink, http://www.gao.gov/products/GAO-08-822] (Washington, D.C.: July 28, 2008); DOD Business Systems Modernization: Key Navy Programs' Compliance with DOD's Federated Business Enterprise Architecture Needs to Be Adequately Demonstrated, [hyperlink, http://www.gao.gov/products/GAO-08-972] (Washington, D.C.: Aug. 7, 2008); and DOD Business Systems Modernization: Important Management Controls Being Implemented on Major Navy Program, but Improvements Needed in Key Areas, [hyperlink, http://www.gao.gov/products/GAO-08-896] (Washington, D.C.: Sept. 8, 2008). [125] Financial Management Regulation". DOD 7000.1.14-R. Volume 2B, Chapter 18, Section 180103.G, issued under the authority of DoD Instruction 7000.14, "DOD Financial Management Policy and Procedures." [126] Office of the Secretary of Defense (OSD) Guidance for FY2010 Information Technology Submissions. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548: