Beginning with the signing of the Clinger Cohen Act, and evidence by numerous blue ribbon panels (Defense Science Board, AF Science Advisory Board, IAC/ACT, Gansler Commission, and ECCWG), Streamlining the IT Acquisition Process is one of the most significant challenges facing government today. Current methods support requirements, architectures and acquisitions have changed little over the past 20 years, and today, fail to keep up with the market innovations and the faced paced IT market.
The Acquisition Assurance Method (AAM) begins to answer this challenge by bringing to market an IT lifecycle decision support methodology designed to better enable sound investment decisions. AAM provides the connective tissue that integrates existing “cylinders of excellence” in requirements, architectures and acquisitions processes. AAM enables alignment and better management oversight as IT programs move through each of the acquisition lifecycle “decision gates” through a series of evidenced based templates. AAM is an Interoperability Clearinghouse consensus standard derived from commercial best practices designed to fulfill key elements of the Clinger Cohen Act and mitigating root causes of failure found in numerous GAO, Defense Science Board and blue ribbon panel reports.
Contributors to this “standard of practice” represented forward thinking standards bodies, federal agencies, financial institutions, communities of practice, and leading IT solution providers. Evolving since 1998, AAM has proven again and again to drive sound investment decisions. AAM, supported by ICH’s Knowledge Network, mitigates common IT program failure patterns that afflict 34% of all major IT programs; inability to align prioritized business needs with interoperable commercial IT solution sets. AAM is a core component of the AF Solution Assessment Process (ASAP), and the BTA Capability Assessment Method (CAM), and formally recommended by the worlds largest IT institutes.
ICH’s Acquisition Assurance Method (AAM) enables transparency and accountability through out the IT Acquisition Lifecycle by:
Eliminating low value and high risk requirements through Value Chain Analysis techniques
Providing a “bottom up” view of the “realm of the possible” in an architecture context · Providing reusable solution architectures templates that reduce analysis/paralysis and duplication of efforts ·
Optimize contributions among IT Supply chain members; users, vendors, integrators, testers, overseers. ·
Standardizing Assessments of Vendor Capabilities, IT Technology Readiness Levels and Tech Maturity. ·
Providing a rigorous business case analysis tool that measures the business value of technology. ·
Increasing the accuracy/vitality of a capability assessment by vetting vendor capabilities assertions against real-life lessons learned through a capability risk assessment framework.
This standardized decision support framework is essential in solution-based assessments where requirements are often overstated with no mechanisms to discern if an 80% solution using an available technology is viable.