U.S. Department of Education: Promoting Educational Excellence for all Americans

E-Authentication

Exhibit 300: Capital Asset Plan and Business Case Summary
Part I: Summary Information And Justification

Section A: Overview

  1. Date of submission: Sep 10, 2007
  2. Agency: 018
  3. Bureau: 24
  4. Name of this Capital Asset: E-Authentication
  5. Unique Project (Investment) Identifier: 018-24-01-06-01-0260-00
  6. What kind of investment will this be in FY2010? Mixed Life Cycle
  7. What was the first budget year this investment was submitted to OMB? FY2005
  8. Provide a brief summary and justification for this investment, including a brief description of how this closes in part or in whole an identified agency performance gap: DoED OCIO, E-Authentication minimizes the burden on businesses, public and government users when obtaining services on-line by providing a secure user authentication infrastructure for web-based transactions, eliminating the need for separate processes for the verification of identity and electronic signatures. This initiative provides the capability of validating electronic identity credentials for a user when accessing a web-based government service/system. DoED customers come from a wide spectrum however the majority are from universities, colleges, lenders, servicers and agencies. The higher education community has been working towards federated identities, allowing the sharing of identity credentials across multiple applications across organizations. Since some of our main customers are the same higher education community members, it is feasible to participate in federated identity. In addition, other business partners and student/parent customers have requested that we accept other credentials. This initiative enables the E-Authentication functionality to perform federated authentication in which the Department's systems can begin to use electronic user identity credentials from external credential service providers (i.e. schools, financial institutions, etc.). The Department's FY06 OMB Budget Passback for E-Authentication requires the agency to implement E-Authentication. DoED has committed to this initiative by engaging in a federation agreement with the General Services Agency, managing partner of the E-Authentication initiative as well as a MOU for the G5 grants initiative. The G5 initiative builds on the DoED OCFO/OCIO e-Payments application implemented in 2006. The G5 initiative will enable shared services for grants management to be provided to other federal agencies. DoED FSA the eCampus Based (eCB) application has also implement e-Authentication and is the first FSA application to use the E-Authentication service in FY 2008. With eCB using the E-Authentication functionality, between 2,000 and 3,000 schools are benefitting from how eCB performs authentication. In FY2009, it is planned to implement e-Authentication with two more FSA applications and one application from OPE. FY2010 has six more applications scheduled for e-Authentication implementation.
  9. Did the Agency's Executive/Investment Committee approve this request? yes
    1. If "yes," what was the date of this approval? Jun 14, 2007
  10. Did the Project Manager review this Exhibit? yes
  11. Contact information of Program/Project Manager?
Name  
Phone Number  
E-mail  
    1. What is the current FAC-P/PM (for civilian agencies) or DAWIA (for defense agencies) certification level of the program/project manager? Senior/Expert/DAWIA-Level 3
  1. Has the agency developed and/or promoted cost effective, energy efficient and environmentally sustainable techniques or practices for this project. no
    1. Will this investment include electronic assets (including computers)? yes
    2. Is this investment for new construction or major retrofit of a Federal building or facility? (answer applicable to non-IT assets only) no
      1. If "yes," is an ESPC or UESC being used to help fund this investment? [Not answered]
      2. If "yes," will this investment meet sustainable design principles? [Not answered]
      3. If "yes," is it designed to be 30% more energy efficient than relevant code? [Not answered]
  2. Does this investment directly support one of the PMA initiatives? yes
    Expanded E-Government
    1. Briefly and specifically describe for each selected how this asset directly supports the identified initiative(s)? The E-Authentication Initiative expands e-Government by providing users access to online services that require authentication, using a solution that is secure as well as convenient and easy for their customers to use, resulting in an improvement in the taxpayer experience. The above multiple choice click option does not work properly on the PDF but should include expanded eGovernment and possibly Eliminating Improper Payments.
  3. Does this investment support a program assessed using the Program Assessment Rating Tool (PART)? (For more information about the PART, visit www.whitehouse.gov/omb/part.) no
    1. If "yes," does this investment address a weakness found during a PART review? [Not answered]
    2. If "yes," what is the name of the PARTed program? [Not answered]
    3. If "yes," what rating did the PART receive? [Not answered]
  4. Is this investment for information technology? yes

For information technology investments only:

  1. What is the level of the IT Project? (per CIO Council PM Guidance) Level 2
  2. In addition to the answer in 11(a), what project management qualifications does the Project Manager have? (per CIO Council PM Guidance) (1) Project manager has been validated as qualified for this investment
  3. Is this investment or any project(s) within this investment identified as "high risk" on the Q4-FY 2008 agency high risk report (per OMB Memorandum M-05-23)? yes
  4. Is this a financial management system? no
    1. If "yes," does this investment address a FFMIA compliance area? [Not answered]
      1. If "yes," which compliance area: [Not answered]
      2. If "no," what does it address? [Not answered]
    2. If "yes," please identify the system name(s) and system acronym(s) as reported in the most recent financial systems inventory update required by Circular A-11 section 52 [Not answered]
  5. What is the percentage breakout for the total FY2010 funding request for the following?
Hardware 5
Software 0
Services 95
Other 0
  1. If this project produces information dissemination products for the public, are these products published to the Internet in conformance with OMB Memorandum 05-04 and included in your agency inventory, schedules and priorities? n/a
  2. Contact information of individual responsible for privacy related questions:
Name  
Phone Number  
Title  
E-mail  
  1. Are the records produced by this investment appropriately scheduled with the National Archives and Records Administration's approval? yes
  2. Does this investment directly support one of the GAO High Risk Areas? no

Section B: Summary of Spending

  1.  

Table 1: SUMMARY OF SPENDING FOR PROJECT PHASES
(REPORTED IN MILLIONS)
(Estimates for BY+1 and beyond are for planning purposes only and do not represent budget decisions)

  PY-1 and earlier PY 2008 CY 2009 BY 2010 BY+1 2011 BY+2 2012 BY+3 2013 BY+4 and beyond Total
Planning: 0.11 0.1 0 0          
Acquisition: 2.49 0.03 1 1          
Subtotal Planning & Acquisition: 2.6 0.13 1 1          
Operations & Maintenance: 0 1.11 1.622 1.622          
TOTAL: 2.6 1.24 2.622 2.622          
Government FTE Costs 0.17 0.28 0.25 0.25          
Number of FTE represented by Costs: 1 2 3 4          
  1. Will this project require the agency to hire additional FTE's? yes
    1. If "yes", How many and in what year? 1 FTE in FY2007. 1 FTE in FY2008. 1 FTE in FY2009.
  2. If the summary of spending has changed from the FY2009 President's budget request, briefly explain those changes: [Not answered]

Section D: Performance Information

Performance Information Table

Fiscal Year Strategic Goal(s) Supported Measurement Area Measurement Grouping Measurement Indicator Baseline Target Actual Results
2006 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology IT Contribution to Process, Customer, or Mission Integrate Systems with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 0 1 1
2006 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability Percentage time that the E-Authentication Infrastructure is available excluding scheduled maintenance. 0% 98% 98%
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology IT Contribution to Process, Customer, or Mission Integrate Systems with the E-Authentication technical approaches. Number of System integrated to the E-Authentication Infrastructure. 1 2 Actual results will be available as of 9/2007
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Customer Results Accuracy of Service or Product Delivered The existence of an infrastructure and application integration protocols that are highly available for applications to consistently authenticate, authorize and audit. 0% 100% Actual results will be available as of 9/2007
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability Percentage time that the E-Authentication Infrastructure is available excluding scheduled maintenance. 0% 98% Actual results will be available as of 9/2007
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Mission and Business Results Information Security Percentage of problems related to the E-Authentication infrastructure. Percentage of problem resolution 0% 80% Actual results will be available as of 9/2007
2006 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Processes and Activities Knowledge Management Response time to initiate knowledge transfer of E-Authentication knowledge upon request (in business days). 0 5 Actual results will be available as of 9/2007
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Functionality (FSA) The percentage of eCampus Based functionality that is available to an end-user using a federated identify in comparison to an end-user using an FSA provided identity. 0% 100% TBD
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Customer Results Access Number of days from request to Account creation and Password Resets. 7 0 Actual results will be available as of 9/2007
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability The percentage time that the E-Authentication Infrastructure that is available excluding scheduled maintenance. 0% 98% Actual results will be available as of 9/2008
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Accessibility The percentage completed of the E-Authentication Infrastructure service to the Department's systems. 0% 95% Actual results will be available as of 9/2008
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Mission and Business Results Information Security Percentage of problems resolved that related to the E-Authentication infrastructure. Percentage of problem resolution 80% 95% Actual results will be available as of 9/2008
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology IT Contribution to Process, Customer, or Mission Number of systems integrated with the final E-Authentication technical solution and Infrastructure. 1 2 Actual results will be available as of 9/2008
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Customer Results System Response Time Resolution time for issues between E-Auth infrastructure and E-Auth enabled applications. 2 days 2 days Actual results will be available as of 09/2008
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Customer Results System Response Time Resolution time for issues between E-Auth infrastructure and E-Auth enabled applications. 2 days 2 days Actual results will be available as of 09/2007
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology IT Contribution to Process, Customer, or Mission Integrate Systems with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 1 1 Actual results will be available as of 09/2007
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology IT Contribution to Process, Customer, or Mission Integrate Systems with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 5 1 Actual results will be available as of 09/2008
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Processes and Activities Security Number of verified, major system vulnerabilities found during audits and system scans. 0 0 Actual results will be available as of 09/2007
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Processes and Activities Security Number of verified, major system vulnerabilities found during audits and system scans. 0 0 Actual results will be available as of 09/2008
2006 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability Service availability. 99% 99% 99%
2007 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability Service availability. 99% 99% Actual results will be available as of 9/2007
2008 Cross-goal Strategy on Managment: Obejctive 1: Maintain and strengthen financial integrity and management and internal controls. Technology Availability Service availability. 99% 99% Actual results will be available as of 9/2008
2008 3 Customer Results Customer Satisfaction (FSA) Customer Satisfaction: Ease of access to FSA Business Systems. Reduction in the number of passwords to be memorized by the users. Self-service abilities such as password resets. 22 5 TBD
2008 3 Customer Results Accuracy of Service or Product Delivered (FSA) Accuracy of Service or Product Delivered: The existence of an infrastructure and application integration protocols that are highly available for applications to consistently authenticate, authorize and audit. 0 100% TBD
2008 3 Mission and Business Results Information Security (FSA) IT Security: Percentage of problems related to the E-Authentication infrastructure. Percentage of problem resolution 0 80% TBD
2008 3 Technology IT Contribution to Process, Customer, or Mission (FSA) IT Contribution to Process, Customer, or Mission: Integrate Multiple FSA Systems such as ADvance, CSB, IPM and others with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 0 3 TBD
2008 3 Technology Availability (FSA) Availability: Percentage time that the E-Authentication Infrastructure is available excluding scheduled maintenance. 0 98% TBD
2009 3 Customer Results Customer Satisfaction (FSA) Customer Satisfaction: Ease of access to FSA Business Systems. Reduction in the number of passwords to be memorized by the users. Self-service abilities such as password resets. 22 5 TBD
2009 3 Customer Results Accuracy of Service or Product Delivered (FSA) Accuracy of Service or Product Delivered: The existence of an infrastructure and application integration protocols that are highly available for applications to consistently authenticate, authorize and audit. 0 100% TBD
2009 3 Mission and Business Results Information Security (FSA) IT Security: Percentage of problems related to the E-Authentication infrastructure. Percentage of problem resolution 0 100% TBD
2009 3 Technology IT Contribution to Process, Customer, or Mission (FSA) IT Contribution to Process, Customer, or Mission: Integrate Multiple FSA Systems such as ADvance, CSB, IPM and others with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 0 3 TBD
2009 3 Technology Availability (FSA) Availability: Percentage time that the E-Authentication Infrastructure is available excluding scheduled maintenance. 0 98% TBD
2010 3 Customer Results Customer Satisfaction (FSA) Customer Satisfaction: Ease of access to FSA Business Systems. Reduction in the number of passwords to be memorized by the users. Self-service abilities such as password resets. 22 5 [Not answered]
2010 3 Customer Results Accuracy of Service or Product Delivered (FSA) Accuracy of Service or Product Delivered: The existence of an infrastructure and application integration protocols that are highly available for applications to consistently authenticate, authorize and audit. 0 100% [Not answered]
2010 3 Mission and Business Results Information Security (FSA) IT Security: Percentage of problems related to the E-Authentication infrastructure. Percentage of problem resolution 0 100% [Not answered]
2010 3 Processes and Activities IT Contribution to Process, Customer, or Mission (FSA) IT Contribution to Process, Customer, or Mission: Integrate Multiple FSA Systems such as ADvance, CSB, IPM and others with the E-Authentication Infrastructure. Number of System integrated to the E-Authentication Infrastructure. 0 3 [Not answered]
2010 3 Technology Accessibility (FSA) Availability: Percentage time that the E-Authentication Infrastructure is available excluding scheduled maintenance. 0 98% [Not answered]

Section F: Enterprise Architecture (EA)

  1. Is this investment included in your agency's target enterprise architecture? yes
    1. If "no," please explain why? [Not answered]
  2. Is this investment included in the agency's EA Transition Strategy? yes
    1. If "yes," provide the investment name as identified in the Transition Strategy provided in the agency's most recent annual EA Assessment. E-Authentication
    2. If "no," please explain why? [Not answered]
  3. Is this investment identified in a completed and approved segment architecture? yes
    1. If "yes," provide the six digit code corresponding to the agency segment architecture. The segment architecture codes are maintained by the agency Chief Architect. For detailed guidance regarding segment architecture codes, please refer to http://www.egov.gov/. 761-000

4. Service Component Reference Model (SRM) Table :

Agency Component Name Agency Component Description FEA SRM Service Type FEA SRM Component Service Component Reused Internal or External Reuse? BY Funding Percentage
Component Name UPI
Security Architecture Security Architecture is comprised of tools and technologies that ensure secure operation of the systems across the enterprise. In particular, Security Architecture provides tools, technologies, and protocols for identity and access management across the enterprise. Security Management Access Control Access Control 018-45-03-00-02-2050-00 Internal 0
E-Authentication E-Authentication will provide a trusted and secure standards-based authentication architecture to support Federal applications. Security Management Identification and Authentication Identification and Authentication 018-45-01-06-01-1000-00 Internal 100
E-Authentication E-Authentication will provide a trusted and secure standards-based authentication architecture to support Federal applications. Security Management Access Control Identification and Authentication 018-45-01-06-01-1000-00 Internal 0
Security Architecture Security Architecture is comprised of tools and technologies that ensure secure operation of the systems across the enterprise. In particular, Security Architecture provides tools, technologies, and protocols for identity and access management across the enterprise. Customer Relationship Management Contact and Profile Management Contact and Profile Management 018-45-03-00-02-2050-00 Internal 0
FSA - Security Architecture Security Architecture is comprised of tools and technologies that ensure secure operation of the systems across the enterprise. In particular, Security Architecture provides tools, technologies, and protocols for identity and access management across the enterprise. Customer Relationship Management Contact and Profile Management Contact and Profile Management 018-45-03-00-02-2050-00 Internal 0
FSA - Security Architecture Security Architecture is comprised of tools and technologies that ensure secure operation of the systems across the enterprise. In particular, Security Architecture provides tools, technologies, and protocols for identity and access management across the enterprise. Security Management Access Control Access Control 018-45-03-00-02-2050-00 Internal 0
FSA - E-Authentication E-Authentication will provide a trusted and secure standards-based authentication architecture to support Federal applications. Security Management Identification and Authentication Identification and Authentication 018-45-01-06-01-1000-00 Internal 100

 

5. Technical Reference Model (TRM) Table:

FEA SRM Component FEA TRM Service Area FEA TRM Service Category FEA TRM Service Standard Service Specification
Access Control Service Access and Delivery Access Channels Web Browser IBM Corporation, Tivoli Access Manager Version 6.0
Contact and Profile Management Service Access and Delivery Access Channels Web Browser IBM Corporation, Tivoli Identity Manager Version 4.6
Identification and Authentication Service Access and Delivery Service Requirements Authentication / Single Sign-on IBM Tivoli Federated Identity Manager Version 6.0
Enterprise Application Integration Service Access and Delivery Service Requirements Hosting Provided by GSS
Enterprise Application Integration Service Access and Delivery Service Transport Service Transport Provided by GSS
Network Management Service Access and Delivery Delivery Channels Internet Provided by GSS
Enterprise Application Integration Service Platform and Infrastructure Delivery Servers Application Servers AIX 5.3
Enterprise Application Integration Service Platform and Infrastructure Database / Storage Database AIX 5.3
Access Control Service Access and Delivery Access Channels Web Browser FSA - IBM Corporation, Tivoli Access Manager Version 6.0
Contact and Profile Management Service Access and Delivery Access Channels Web Browser FSA - IBM Corporation, Tivoli Identity Manager Version 4.5
Identification and Authentication Service Access and Delivery Service Requirements Authentication / Single Sign-on FSA - Shibboleth or IBM Tivoli Federated Identity Manager Version 6.0
  1. Will the application leverage existing components and/or applications across the Government (i.e., USA.Gov, Pay.Gov, etc)? yes
    1. If "yes," please describe. It will rely on the eGov E-Authentication portal which is accessed through this website: http://asc.gsa.gov/portal/template/welcome.vm

Part II: Planning, Acquisition And Performance Information

Section A: Alternatives Analysis

  1. Did you conduct an alternatives analysis for this investment? yes
    1. If "yes," provide the date the analysis was completed? Apr 3, 2006
    2. If "no," what is the anticipated date this analysis will be completed? [Not answered]
    3. If no analysis is planned, please briefly explain why: [Not answered]

2. Alternatives Analysis Results:

Alternative Analyzed Description of Alternative Risk Adjusted Lifecycle Costs estimate Risk Adjusted Lifecycle Benefits estimate
Baseline Status Quo (Authentication is performed uniquely for each system/application) 0 0
Alternative 1 Implement a centralized infrastructure that supports enterprise authentication by leveraging various IBM Tivoli COTS components (100%) based on enterprise-class hardware. (ED Phase 1 technical approach.) Using the support/services from the e-Authentication Federation 9.312 1.7
Alternative 2 Implement a decentralized infrastructure (Separate infrastructure for FSA and non-FSA applications) Still using support and services from the e-Authentication Federation. 13.512 1.7
Alternative 3 Implement Department of Education independent e-Authentication system with a centralized infrastructure. 10.848 1.7
  1. Which alternative was selected by the Agency's Executive/Investment Committee and why was it chosen? Developing Federated Identity Management is mandated by the e-Gov initiatives and is part of the Presidents Management Agenda (PMA). The Baseline Alternative (Status Quo) was not selected because it would place the agency in non-compliance with the PMA. Alternative 1 was not chosen because of the technology differences between FSA applications and non-FSA applications. FSA uses Shibboleth and non-FSA uses Tivoli. Converting one technology to the other would have been cost and time prohibitive. Alternative 2 was chosen because it minimized the number of different infrastructures that needed to be created. Thus, minimizing time, cost, and personnel. Alternate 3 was not chosen because it was not feasible with the technology differences between FSA and non-FSA. In addition, it was more costly to directly contract credentialing services instead of sharing costs with the e-Authentication Federation. Alternative 4 was also considered (not listed above), it had a significantly higher risk adjusted cost and was not selected because it was the costliest, most time consuming, and most personnel intensive.
  2. What year will the investment breakeven? (Specifically, when the budgeted costs savings execced the cumulative costs.)
  3. What specific qualitative benefits will be realized? DoED OCIO, The burden of identity management (enrollment, issuance, maintenence, help desk support) can be reduced. Also, the user experience will be improved along with realizing other customer benefits. FSA, The specific qualitative benefits are: 1. The Single Contract alternative significantly reduces the number of people who must master and maintain highly specialized skills. The E-Authentication team provides subject matter experts in E-Authentication products and technologies. 2. A Single Contract model requires only 15 resources, compared to a maximum of 125 resources that would be required to support E-Authentication products using a decentralized approach. 3. Aligning services and support under a Single Contract alternative reduces the time and effort by at least 20% to coordinate different activities including, upgrading the different products, integrating new applications etc in a centralized support structure, compared to the time and effort required to coordinate upgrades in multiple E-Authentication environments, supported by multiple contractors. 4. In a Single Contract alternative, major responsibilities are assigned to a single support contractor and not to multiple teams or contractors, resulting in streamlined problem resolution processes, accounting for a 25% reduction in the time and effort to resolve problems. 5. This alternative requires only 1.50 FTEs compared to 11.50 for other alternatives. This alternative provides the government with the easiest contract structure to administer and manage. In addition, aligning services and support under one contract enables the government to document, monitor, and provide consistent performance measurements/metrics using a single data repository. 6. This approach is currently being used and continues to be successful with respect to providing services, lowering the overall project costs by at least 50% compared to other possible alternatives.

5. Federal Quantitative Benefits ($millions):

  Budgeted Cost Savings Cost Avoidance Justification for Budgeted Cost Savings Justification for Budgeted Cost Avoidance
PY-1 and Prior  
PY 0 1.7 This project is a mandated initiative from the PMA. Currently, this project covers existing applications. Therefore, this project only increases the ease of accessibility and quality of services to the general public. It does not cut costs, but does help avoid costs incurred if other implementation alternatives were to be used Savings will come from less staffing and equipment compared to other alternatives.
CY  
BY  
BY+1  
BY+2  
BY+3  
BY+4 and Beyond  
Total LCC Benefit 0 1.7 LCC = Life-cycle cost
  1. Will the selected alternative replace a legacy system in-part or in-whole? no
    1. If "yes," are the migration costs associated with the migration to the selected alternative included in this investment, the legacy investment, or in a separate migration investment? [Not answered]
    2. If "yes," please provide the following information:

List of Legacy Investment or Systems

Name of the Legacy Investment or Systems UPI if available Date of the System Retirement

There are no Legacy Investment or Systems.

Section B: Risk Management (All Capital Assets)

  1. Does the investment have a Risk Management Plan? yes
    1. If "yes," what is the date of the plan? Sep 30, 2006
    2. Has the Risk Management Plan been significantly changed since last year's submission to OMB? no
    3. If "yes," describe any significant changes: [Not answered]
  2. If there currently is no plan, will a plan be developed? [Not answered]
    1. If "yes," what is the planned completion date? [Not answered]
    2. If "no," what is the strategy for managing the risks? [Not answered]
  3. Briefly describe how investment risks are reflected in the life cycle cost estimate and investment schedule: Risks are analyzed and impact assessments are documented and are reflected in the cost estimate accordingly.

Section C: Cost and Schedule Performance (All Capital Assets)

  1. Does the earned value management system meet the criteria in ANSI/EIA Standard - 748? yes
  2. Is the CV% or SV% greater than ± 10%? (CV%= CV/EV x 100; SV%= SV/PV x 100) no
    1. If "yes," was it the? [Not answered]
    2. If "yes," explain the causes of the variance: [Not answered]
    3. If "yes," describe the corrective actions [Not answered]
  3. Has the investment re-baselined during the past fiscal year? no
    1. If "yes," when was it approved by the agency head? [Not answered]

4. Comparison of Initial Baseline and Current Approved Baseline:

Description of Milestone Initial Baseline Current Baseline Current Baseline Variance  
Planned Completion Date Total Cost ($M) Estimated Completion Date
Planned:Actual
Total Cost ($M)
Planned:Actual
Schedule:Cost
(# days:$M)
Percent Complete
OCIO/OCFO Requirements Analysis Sep 30, 2005 0.109 Sep 30, 2005 Sep 30, 2005 0.109 0.107 0 -0.002 100
OCIO/OCFO Architecture Buildout Dec 31, 2005 0.548 Dec 31, 2005 Dec 31, 2005 0.548 0.485 0 -0.063 100
OCIO/OFCO App Interface & Unit Testing Mar 31, 2006 0.267 Mar 31, 2006 Apr 7, 2006 0.267 0.255 -7 -0.012 100
FY06 and FY07 E-Authentication Implementation Mar 30, 2007 1.5 Mar 30, 2007 May 30, 2007 1.5 [Not answered] [Not answered] [Not answered] 100
OCIO/OCFO A&I Testing May 31, 2006 0.178 May 31, 2006 May 31, 2006 0.178 0.153 0 -0.026 100
FY07 Program Maintenance Sep 30, 2007 0.33 Sep 30, 2007 Sep 30, 2007 0.33 [Not answered] [Not answered] [Not answered] 100
Tivoli Licenses Sep 30, 2007 0.03 Sep 30, 2007 Sep 30, 2007 0.03 [Not answered] [Not answered] [Not answered] 100
FIM Expertise Sep 30, 2007 0.2 Sep 30, 2007 Sep 30, 2007 0.2 [Not answered] [Not answered] [Not answered] 100
Administrative Oversight Sep 30, 2007 0.1 Sep 30, 2007 Sep 30, 2007 0.1 [Not answered] [Not answered] [Not answered] 100
FY08 E-Authentication Operations and Maintenance Sep 30, 2008 3 Sep 30, 2008 [Not answered] 3 [Not answered] [Not answered] [Not answered] 95
FY09 E-Authentication Operations and Maintenance Sep 30, 2009 2 Sep 30, 2009 [Not answered] 2 [Not answered] [Not answered] [Not answered] 0
Integrate e-Campus Based Application into FSA Security Architecture Dec 18, 2006 0 Dec 18, 2006 Dec 18, 2006 0 0 0 0 100
FY06 E-Authentication Implementation May 1, 2006 1.5 May 1, 2006 Jan 11, 2006 1.5 0.318 5 0 100
FY07 E-Authentication Implementation Dec 31, 2007 0.907 Dec 31, 2007 Dec 31, 2007 0.907 [Not answered] [Not answered] [Not answered] 100
FY08 E-Authentication Implementation Jan 12, 2009 2.3 Jan 12, 2009 [Not answered] 2.3 [Not answered] [Not answered] [Not answered] 0
FY09 E-Authentication Implementation Jan 12, 2010 1.85 Jan 12, 2010 [Not answered] 1.85 [Not answered] [Not answered] [Not answered] 0
                   

Return to OMB Exhibit 300 page