Whole of Government ICT Strategy and
Architectural JourneyBy Abhishek Singh, Chief Information Officer
Confidentiality-I1-A1
HeadingINSERT TEXT HERE
This is a placeholder text. This text can be replaced with your
own text. The text demonstrates how your own text will This is
a placeholder text. This text can be This is a placeholder text.
This text can be replaced with your own text. The text
demonstrates how your own text will This is a placeholder text.
This text can be replaced with The text demonstrates how your
own text will This
Topic-1Recently we applied Architectural approach to
define the WofG ICT Services strategy
Confidentiality-I#-A#
Better Access
A Connected Government
Seamless Service Delivery
We are enabling a better digital experience for
government employees and citizens by transforming our
identity management and centralised network
Better Access
Contemporary Architecture
Our Key Objectives
We are enhancing integration and collaboration
across SA Government to deliver shared outcomes
A Connected Government
We are readying central digital services for the era
of hybrid and multi-cloud IT environments
Seamless Service Delivery
We are lifting our capability to make it easy for
citizens to access services through innovative IT
architecture across SA Government
Contemporary Architecture
Confidentiality-I1-A1
Collaboration
Cloud Services
Industrial Scale Enablers
Securely manage credentials
within the agency
Implement WofG staff Identity
capability to manage agency
credentials
Identity & Access
Management
Hosting
Connectivity
There are opportunities to use
Cloud model (IaaS or PaaS) and
use local commercial datacentres
to achieve High Availability and
DR capability
Modernise Central Data Network
Wider transmission coverage
Abundant and redundant Internet
services
Enabled by feature rich business
communications service, and
voice and unified communications
Microsoft Office 365 (O365)
Application Programming Interface
Instrumentation
ITSM
Cloud Management
Advanced Analytics
RPA
Whole of Government ICT Services
Confidentiality-I1-A1
Strategy Dimensions
Confidentiality-I1-A1
• An effective technology Strategy cannot just focus on technology. How we manage our holistic capability, in terms of processes, people, organisation, sourcing and finances, is just as critical to success as the technical issues and strategic intent.
Identity & Access Management
Confidentiality-I1-A1
Principles
Principle 1 - Segregate and decouple authentication and authorization
Principle 2 - Management of user credentials and authorizations are the responsibility of Agencies to manage
Principle 3 - Master credentials to only be stored inside SAGov (iewithin the agency )
Principle 4 - Use single sign on where applicablePrinciple 5 - Standardize semantics and naming conventions
access to WofG services aligned to Conditions of Authentication
Principle 6 - Enable access to services in a trusted mannerPrinciple 7 - Be true to the ethos of ‘One Government, One
Employer’
Burning Platform for Change WofG
• Single access gateway to provide access to WofGservices.
• Need for consistency between on premises and cloud connectivity
• Greater ease of handling MOG changes• Consolidation of processes for verification of
identity via DVS (Document Verification System) • Current landscape of active directories across
agencies needs central orchestration to access WofG.
Capability Map
Confidentiality-I1-A1
Cloud Hosting Services
Connectivity and Integration Security and Admin
Management and Governance
Identity and Access Management
User Management
Privileged Access Management (PAM)
Access Management
Enterprise Directory Management
Federation ServicesCloud Authorisation
Sync Services
DNS
Certificate Management
Resource Domain Function
Forest Functional Risk Assessment
(ADRAP)
Inter forest Trusts
Authentication(Types)
Application Client Management
Security / Event Logs
Governance and Policies
Management
Single Sign on
Change Management
Incident Management
Billing
Shared Domain Services
Multi Factor Authentication
Service Consultancy
Support Services
Consent Management
Infrastructure
Recovery Management
Reporting
Monitoring
Identity broker
Self ProvisioningAdaptive Authentication
PKI
Aligned to Principles Establish or mature capability
LEGEND:
Take-away Points
• Used EA concepts to communicate the engage the
stakeholders
• Applied EA approach to describe the service
• Applying EA approach to define actionable plans based on
the strategic intent
• Established ARB to Govern projects adherence to the
agreed architecture
Confidentiality-I1-A1
HeadingINSERT TEXT HERE
This is a placeholder text. This text can be replaced with your
own text. The text demonstrates how your own text will This is
a placeholder text. This text can be This is a placeholder text.
This text can be replaced with your own text. The text
demonstrates how your own text will This is a placeholder text.
This text can be replaced with The text demonstrates how your
own text will This
Topic-2We are maturing Architecture Capability within
Whole-of-Government (WofG) ICT Group
Confidentiality-I#-A#
No architectural
competency
Gap analysis
Define Architecture
Services
Kick-off ARB
Success
Established new Method
Applied EA approach to WofG strategy
definition
WofG ICT Architectural Maturity
Roadmap
January 2018
Architecture
discipline is well
established
November 2018
onwards
February 2018 – July 2018
August 2018 – November 2018
April 2018 onwards
October 2018
Confidentiality-I1-A1