Business Projects—Information Technology: Enabled Deliverables

Business Projects—Information Technology: Enabled Deliverables (PDF 748Kb)

See long description below Description for Business Projects-IT-Enabled Full version

Image description

Legend:

This image describes the detailed Project Deliverables which may be required throughout the lifecycle of the project:

Project inception stage

Definition phase

Project identification stage

Initiation phase

Feasibility Phase

Analysis Phase

Project delivery stage

Planning Phase

Design Phase

Implementation Phase

Delivery Close Out Phase

(Due to the size of the image, it may not display properly.)

(U) = Update
(F) = Full only
(L) = Lite only
= For Investment Projects only
** = An updated PCRA for Integrated Investment Plan Projects
*** = IAR equivalent to BC + PC
**** = Business Case includes feasibility report for "Life" only

Refer to PM Handbook for more information on the Gating and Review process

Table Summary

This table describes deliverables required during the project identification stage and phases based on project areas. The table consists of five columns with the following headings under the master heading of project identification stage: blank cell, initiation, feasibility, analysis, identification close out. The table consists of seven rows. The following data is under the blank column: Business Change, Procurement, Architecture, Privacy, Security, Technical Solution, Operational Readiness. Deliverables under the initiation column are Business Requirements, Target Business Vision. Deliverables under the feasibility column are Corporate and Organizational Requirements, Architecture Solution (Conceptual Version), Concept of Operations. Deliverables under Analysis are Business Transformation Strategy, Engagement Strategy, Release Strategy, Requirements Traceability Matrix, Financial Proposal Requirements & Pricing Tables, statement of requirements, Request for Information Documents, Service Requirements Evaluation Criteria, Preliminary Privacy Impact Assessment, Privacy Impact Assessment, Certification Plan, Statement of Sensitivity, Threat Risk Assessment, Migration Strategy, Testing Strategy, ECAB Request for Change. There are no deliverables under the identification close out column.

Project identification stage
  Initiation Feasibility Analysis Identification close out
Business Change
  • Business Requirements
  • Target Business Vision
n/a
  • Business Transformation Strategy
  • Engagement Strategy
  • Release Strategy
  • Requirements Traceability Matrix
n/a
Procurement n/a
  • Corporate and Organizational Requirements
  • Financial Proposal Requirements & Pricing Tables
  • Statement of requirements
  • Request for Information Documents
  • Service Requirements Evaluation Criteria
n/a
Architecture n/a
  • Architecture Solution (Conceptual Version)
n/a n/a
Privacy n/a n/a
  • Preliminary Privacy Impact Assessment
  • Privacy Impact Assessment
n/a
Security n/a n/a
  • Certification Plan
  • Statement of Sensitivity
  • Threat Risk Assessment
n/a
Technical Solution n/a
  • Concept of Operations
  • Migration Strategy
  • Testing Strategy
n/a
Operational Readiness n/a n/a
  • ECAB Request for Change
n/a
Table Summary

This table describes deliverables required during the project delivery stage and phases based on project areas. The table consists of five columns with the following headings under the master heading of project delivery stage: blank cell, Planning, Design, Implementation, Delivery Close Out. The table consists of seven rows. The following data is under the blank column: Business Change, Procurement, Architecture, Privacy, Security, Technical Solution, Operational Readiness. Deliverables under the planning column are: Benefit Realization Report, Communication Plan, Policy Change Requirement, Release Plan, Requirements Traceability Matrix (U), Training Plan, Detailed Scoring Grid, Evaluation Criteria, Request for Acquisitions Services, Request for proposal , Security Requirements Checklist, Statement of Work, CRB Presentations, Architecture Solution (Logical Version), Privacy Impact Assessment (U), Certification Plan (U), Conceptual Security Architecture , Safeguard Plan, Concept of Operations (U), Functional Requirements, Infrastructure Requirements, Migration Plan, Non-functional Requirements, Transition Plan. Deliverables under the design column are: Architecture Solution (Detailed Version), Safeguard Plan (U), Logical Security Architecture, Threat Risk Assessment (U), Data Conversion Plan, Hardware Configuration, Physical Data Model, Migration Plan (U), System Requirement Specifications, System Testing Plan, User Acceptance Testing Plan Deliverables under the implementation column are: Communications Material, Release Plan (U), Requirements Traceability Matrix (U), Physical Security Architecture, Statement of Sensitivity (U), Threat Risk Assessment (U), Certification Evidence Report, Certification Report, Letter of Accreditation, Recommendation for Accreditation, System Testing Procedures, User Acceptance Testing Procedures, Data Migration Evaluation Summary, Operations & Maintenance Plan, Operations & Maintenance Procedures, System Testing Summary Results, Technical Overview Document, Acceptance Criteria, Platform Readiness Guide, Release Notes, Transition Plan (U), Training Guides and Other Material, User Acceptance Summary Results, User Guide. Deliverable under the delivery close out column is: Service Level Agreements.

Project delivery stage
  Planning Design Implementation Delivery Close Out
Business Change
  • Benefit Realization Report
  • Communication Plan
  • Policy Change Requirement
  • Release Plan
  • Requirements Traceability Matrix (U)
  • Training Plan
n/a
  • Communications Material
  • Release Plan (U)
  • Requirements Traceability Matrix (U)
n/a
Procurement
  • Detailed Scoring Grid
  • Evaluation Criteria
  • Request for Acquisitions Services
  • Request for proposal
  • Security Requirements Checklist
  • Statement of Work
  • CRB Presentations
n/a n/a n/a
Architecture
  • Architecture Solution (Logical Version)
  • Architecture Solution (Detailed Version)
n/a n/a
Privacy
  • Privacy Impact Assessment (U)
n/a n/a n/a
Security
  • Certification Plan (U)
  • Conceptual Security Architecture
  • Safeguard Plan
  • Safeguard Plan (U)
  • Logical Security Architecture
  • Threat Risk Assessment (U)
  • Physical Security Architecture
  • Statement of Sensitivity (U)
  • Threat Risk Assessment (U)
  • Certification Evidence Report
  • Certification Report
  • Letter of Accreditation
  • Recommendation for Accreditation
n/a
Technical Solution
  • Concept of Operations (U)
  • Functional Requirements
  • Infrastructure Requirements
  • Migration Plan
  • Non-functional Requirements
  • Data Conversion Plan
  • Hardware Configuration
  • Physical Data Model
  • Migration Plan (U)
  • System Requirement Specifications
  • System Testing Plan
  • User Acceptance Testing Plan
  • System Testing Procedures
  • User Acceptance Testing Procedures
  • Data Migration Evaluation Summary
  • Operations & Maintenance Plan
  • Operations & Maintenance Procedures
  • System Testing Summary Results
  • Technical Overview Document
n/a
Operational Readiness
  • Transition Plan
n/a
  • Acceptance Criteria
  • Platform Readiness Guide
  • Release Notes
  • Transition Plan (U)
  • Training Guides and Other Material
  • User Acceptance Summary Results
  • User Guide
  • Service Level Agreements
Date modified: