Best Practices and Leading Practices in Information Technology Management
Information technology (IT) management requires a sound foundation in areas such as IT strategic planning, enterprise architecture, IT investment management, and information security.
IT Strategic Planning
Advances in technology have changed and continue to change the way agencies do business—which affects how agencies need to plan strategically to manage their IT.
An agency should:
Document its IT strategic planning process, including, at a minimum,
(1) the responsibilities and accountability for IT resources across the agency; and
(2) the method by which the agency defines program information needs and develops strategies, systems, and capabilities to meet those needs.
- Document its process to integrate IT management operations and decisions with other organizational processes, including organizational planning, budget, financial management, human resources management, and program decisions.
- Integrate information security management processes with strategic and operational planning processes.
- Institute a process to account for all IT-related expenses and results.
Prepare an enterprise-wide IT strategic plan. At a minimum, the plan should
(1) describe how IT activities will be used to help accomplish agency missions and operations, including related resources; and
(2) identify a major IT acquisition program(s) or any phase or increment of that program that has significantly deviated from cost, performance, or schedule goals established for the program.
Ensure that the IT strategic plan supports the agency strategic plan and helps accomplish agency missions by
(1) describing how IT supports strategic and program goals; and
(2) identifying the resources and time periods required to implement the information security program plan required by FISMA.
Have a documented goals process to
(1) develop IT goals in support of agency needs;
(2) measure progress against these goals; and
(3) assign roles and responsibilities for achieving these goals.
Establish goals that, at a minimum, address how IT contributes to
(1) program productivity,
(3) effectiveness, and
(4) service delivery to the public (if applicable).
- Establish IT performance measures to demonstrate how IT enables progress toward agency objectives and strategic goals.
- Annually describe progress in using IT to improve agency operations and service delivery, as appropriate. This should be in a report included in the budget submission.
- Benchmark IT management processes against appropriate public and private sector organizations and/or processes in terms of costs, speed, productivity, and quality of outputs and outcomes.
An enterprise architecture (EA) is a well-defined blueprint for an organization that shows relationships among business operations and the IT infrastructure and applications supporting them. Using EA effectively provides a clear and comprehensive picture of the organization that includes analyses of current conditions, targeted conditions, and a roadmap for getting the organization from the current to the target. Successful organizations use EA when making changes or modernizing systems.
An agency should complete the steps described in the EA Management Maturity Framework, including:
Create EA awareness
- Raise awareness about the value of an EA.
Establish EA institutional commitment and direction
- Develop the foundation for an EA program by grounding EA development in policy and ensuring that top executives take ownership of the architecture.
- Establish leadership through an EA executive committee, approved EA goals, proactive outreach, and appointing and empowering a chief architect.
- Establish a management construct to measure performance and maintain accountability.
Create the management foundation for EA development and use
- Establish operational EA program offices and ensure that leadership, funding, requisite tools, and human capital are available for these program offices.
- Develop the core plans and processes needed to manage and execute the EA program.
Develop initial EA versions
- Engage stakeholders in EA development and implement human capital plans.
- Combine resources with acquired tools to execute EA management plans and schedules aimed at delivering the target architecture.
- Develop segment architectures using available tools and defined plans and schedules.
- Measure and report progress to the executive committee.
- Proactively identify and address EA development risks.
Complete and use an initial EA version for targeted results
- Obtain approval for the EA from the executive committee.
- Use the approved EA to guide and constrain capital investment selection and control decisions—e.g., using EA to identify potential duplication and overlap to inform the selection of new investments.
- Measure and report various factors to the executive committee, including EA product quality, investment compliance, subordinate architecture alignment, and results and outcomes.
Expand and evolve the EA and its use for institutional transformation
- Extend the EA’s scope to the entire organization; ensure enterprise-wide alignment and integration.
- Continuously maintain architecture products and obtain approval for major updates of the corporate EA by the head of the organization.
- Have an independent agent assess the architecture product quality and have the results reported to the chief architect and the executive committee.
Continuously improve the EA and its use to achieve corporate optimization
- Focus on continuously improving the quality of the suite of EA products and the people, processes, and tools used to govern their development, maintenance, and use.
IT Investment Management
IT projects can significantly improve an organization's performance, but they can also become costly, risky, and unproductive. Agencies can maximize the value of IT investments and minimize the risks of IT acquisitions with an effective and efficient IT investment management process.
As described in the guide to effective IT investment management, an agency should:
- Create awareness
- Raise awareness about the importance of disciplined investment management processes.
- Build the foundation
- Create an investment review board and define its membership, guiding policies, operations, roles, responsibilities, and authorities.
- For each project, develop a business case that identifies the key executive sponsor, business customers (or end-users), and the business needs that the IT project will support.
- Define a process that the organization can use to select new IT proposals and reselect ongoing projects.
- Monitor projects against cost and schedule expectations as well as anticipated benefits and risks.
- Develop a complete investment portfolio
- Define criteria for determining which investments to include in the investment portfolio. Criteria could include quantitative or qualitative factors such as cost, benefit, schedule, and risk.
- Use the criteria to select investments for the portfolio.
- Evaluate the portfolio by adding the element of portfolio performance to the organization's control process activities.
- Review IT projects by comparing actual results to estimates in order to learn from past investments and initiatives.
- Improve the process
- Evaluate the performance of the portfolio to improve both current IT investment management processes and the future performance of the IT portfolio.
- Analyze and manage the replacement of IT investments and assets with their higher-value successors.
- Leverage IT for strategic outcomes
- Optimize the investment management process used to exploit IT decision making to improve the value of an IT investment management process.
- Learn about and implement other organizations' best practices for IT investment.
- Use IT to renovate and transform work processes and to push the organization to explore new and better ways to execute its mission.
Federal agencies rely extensively on IT systems and electronic data to carry out their missions. Effective security for these systems and data is essential to prevent data tampering, disruptions in critical operations, fraud, and inappropriate disclosure of sensitive information. The Federal Information Security Modernization Act (FISMA) of 2014 helps ensure agencies have adequate security safeguards.
An agency should:
- Periodically assess the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of its information and information systems.
- Develop risk-based policies and procedures that cost-effectively reduce information security risks throughout the life cycle of each information system in its information security programs.
- Develop subordinate system security plans for providing adequate security for networks, facilities, and systems or groups of information systems (as appropriate).
- Provide appropriate security awareness training to personnel, including contractors and other users of information systems that support its operations and assets.
- Test and evaluate the effectiveness of information security policies, procedures, and practices as frequently as the risk level requires but no less than annually.
- Create a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in information security policies, procedures, and practices.
- Establish procedures for detecting, reporting, and responding to security incidents, which may include using automated tools; mitigating risks associated with such incidents before substantial damage is done; and notifying and consulting with the information security incident center and other entities, as appropriate, including law enforcement agencies and other relevant officials.
- Establish plans and procedures to ensure continuity of operations for information systems that support its operations and assets. Test plans to ensure they work.
- Develop, maintain, and annually update an inventory of major information systems.
GAO-10-846G: Published: Aug 5, 2010. Publicly Released: Aug 5, 2010.
This publication supersedes GAO-03-584G Information Technology: A Framework for Assessing and Improving Enterprise Architecture Management (Version 1.1), April 2003, and Information Technology: A Practical Guide to Federal Enterprise Architecture, Version 1.0, February 2001.Effective use of an enterprise architecture (EA) is a hallmark of successful organizations and an essential means to achievin...
GAO-09-232G: Published: Feb 2, 2009. Publicly Released: Feb 2, 2009.
FISCAM presents a methodology for performing information system (IS) control audits of federal and other governmental entities in accordance with professional standards. This version supersedes the prior version, Federal Information System Controls Audit Manual: Volume I Financial Statement Audits, AIMD-12.19.6, January 1, 2001. The FISCAM is designed to be used primarily on financial and performa...
GAO-04-394G: Published: Mar 1, 2004. Publicly Released: Mar 1, 2004.
This publication supersedes AIMD-10.1.23, Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity (Exposure Draft), May 2000. In 2000, GAO published an exposure draft of Information Technology Investment Management: A Framework for Assessing and Improving Process Maturity (ITIM). Built around the select/control/evaluate approach described in the Cling...
GAO-04-49: Published: Jan 12, 2004. Publicly Released: Feb 11, 2004.
Over the years, the Congress has promulgated laws and the Office of Management and Budget and GAO have issued policies and guidance, respectively, on (1) information technology (IT) strategic planning/performance measurement (which defines what an organization seeks to accomplish, identifies the strategies it will use to achieve desired results, and then determines how well it is succeeding in rea...
GAO-18-703T: Published: Sep 27, 2018. Publicly Released: Sep 27, 2018.
The Social Security Administration (SSA) has improved its management of information technology (IT) acquisitions and operations by addressing 14 of the 15 recommendations that GAO has made to the agency. For example,Incremental development. The Office of Management and Budget (OMB) has emphasized the need for agencies to deliver IT investments in smaller increments to reduce risk and deliver capab...
GAO-18-326: Published: May 24, 2018. Publicly Released: May 24, 2018.
The strength of Department of Defense's (DOD) policies for managing and overseeing major automated information system (MAIS) programs varies. Specifically, the policy for managing 24 non-business MAIS programs adheres to leading information technology (IT) management practices, but the policy for managing 10 MAIS business programs does not always do so (see table).Analysis of Department of Defense...
GAO-18-566T: Published: May 23, 2018. Publicly Released: May 23, 2018.
The Office of Management and Budget (OMB) and federal agencies have taken steps to improve the management of information technology (IT) acquisitions and operations and ensure the security of federal IT through a series of initiatives. As of May 2018, agencies had fully implemented about 61 percent of the approximately 800 IT management-related recommendations that GAO made from fiscal years 2010...
GAO-18-264: Published: May 23, 2018. Publicly Released: May 23, 2018.
The 24 agencies participating in the Office of Management and Budget's (OMB) Data Center Optimization Initiative (DCOI) reported mixed progress toward achieving OMB's goals for closing data centers by September 2018. Over half of the agencies reported that they had either already met, or planned to meet, all of their OMB-assigned goals by the deadline. This would result in the closure of 7,221 of...
GAO-18-460T: Published: Mar 14, 2018. Publicly Released: Mar 14, 2018.
The Office of Management and Budget (OMB) and federal agencies have taken steps to improve the management of information technology (IT) acquisitions and operations through a series of initiatives, to include (1) data center consolidation, (2) implementation of incremental development practices, (3) approval of IT acquisitions, (4) implementation of key IT workforce practices, and (5) addressing a...
GAO-18-267T: Published: Dec 7, 2017. Publicly Released: Dec 7, 2017.
For nearly two decades, the Department of Veterans Affairs (VA) has undertaken multiple efforts to modernize its health information system—the Veterans Health Information Systems and Technology Architecture (known as VistA). Two of VA's most recent efforts included the Integrated Electronic Health Record (iEHR) program, a joint program with the Department of Defense (DOD) intended to replace sep...
GAO-18-234T: Published: Nov 15, 2017. Publicly Released: Nov 15, 2017.
The Office of Management and Budget (OMB) and federal agencies have taken steps to improve the management of information technology (IT) acquisitions and operations through a series of initiatives, and as of November 2017, had fully implemented about 56 percent of the approximately 800 related GAO recommendations made between fiscal years 2010 through 2015. However, important additional actions ar...
GAO-18-148: Published: Nov 7, 2017. Publicly Released: Nov 7, 2017.
Agencies reported that 62 percent of major information technology (IT) software development investments were certified by the agency Chief Information Officer (CIO) for implementing adequate incremental development in fiscal year 2017, as required by the Federal IT Acquisition Reform Act (FITARA) as of August 2016. However, a number of responses for the remaining investments were incorrectly repor...
GAO-18-153T: Published: Oct 4, 2017. Publicly Released: Oct 4, 2017.
GAO has issued a series of reports in recent years which have identified numerous opportunities for the Internal Revenue Service (IRS) to improve the management of its major acquisitions and operational, or legacy, information technology (IT) investments. For example,In June 2016, GAO reported that IRS had developed a structured process for allocating funding to its operations activities, consiste...
GAO-17-533T: Published: Apr 4, 2017. Publicly Released: Apr 4, 2017.
GAO and others have identified a number of key challenges facing federal agencies in ensuring that they have an effective cybersecurity workforce:Identifying skills gaps: As GAO reported in 2011, 2015, and 2016, federal agencies have faced challenges in effectively implementing workforce planning processes for information technology (IT) and defining cybersecurity staffing needs. GAO also reporte...