This section consists of language from OMB guidance that further demarcates, expands upon, or clarifies IT authorities assigned to agencies. This language directly or indirectly tasks the CIO with duties or responsibilities pertaining to IT leadership and accountability. See sections on OMB Memoranda and OMB Circulars for more information about these forms of OMB guidance. See sections on Office of Inspector General (OIG) and Government Accountability Office (GAO) to review how compliance with policies is measured.
Governance
In support of agency missions and business needs, and in coordination with program managers, agencies shall:
Risk Management
Risk Identification
OMB Circular No. A-123 requires agencies to identify and assess risk as part of the agency’s risk profile. A critical component of developing the risk profile is the determination by management of those risks in which the application of formal internal control activities is the appropriate risk response. (OMB M-18-16. Appendix A to OMB Circular No. A-123, Management of Reporting and Data Integrity Risk M-18-16.June 2018.)
Materiality
Management has responsibility in determining risk to achieving reporting objectives and aligning the level of control activities to provide reasonable assurances over reporting. (Ibid.)
Governance
The responsibilities of managing risks are shared throughout the Agency from the highest levels of executive leadership to the service delivery staff executing Federal programs. (OMB M-16-17. Circular A-123. Management’s Responsibility for Enterprise Risk Management and Internal Control. July 2016.)
Risk Management Council
To provide governance for the risk management function, agencies may use a Risk Management Council (RMC) to oversee the establishment of the Agency’s risk profile, regular assessment of risk, and development of appropriate risk response. RMC structures will vary by Agency, and in some cases may be integrated with existing management structures. An effective RMC will include senior officials for program operations and mission-support functions to help ensure those risks are identified which have the most significant impact on the mission outcomes of the Agency. Should agencies choose to use an RMC, the RMC should be chaired by the Agency [COO] or a senior official with responsibility for the enterprise. In cabinet-level Agencies this is the Deputy Secretary. (Ibid.)
Risk Profile
Agencies must maintain a risk profile. The primary purpose of a risk profile is to provide a thoughtful analysis of the risks an Agency faces toward achieving its strategic objectives arising from its activities and operations, and to identify appropriate options for addressing significant risks. The risk profile must consider risks from a portfolio perspective and be approved by an Agency’s RMC or equivalent. (Ibid.)
Appropriate Content and Format
Agencies have discretion in terms of the appropriate content and format for their risk profiles; however, in general risk profiles should include the following seven components: (Ibid.)
Risk Identification
The identification of risk is a continuous and ongoing process. Once initial risks are identified, it is important to re-examine risks on a regular basis to identify new risks or changes to existing risks. (Ibid.)
Risk Response
As part of developing the risk profile, management must determine those risks for which the appropriate response includes implementation of formal internal control activities as described in Section III of this guidance and which conform to the standards published by GAO in the Green Book. Identification of the existing management process that will be used to implement and monitor proposed actions. Those proposed actions that will be discussed with OMB as part of the annual Strategic Review must be identified, (OMB Circular A-11. Section 270, Performance and Strategic Reviews) as well as proposed actions to be considered during formulation of the President’s Budget. (OMB M-16-17. Circular A-123. Management’s Responsibility for Enterprise Risk Management and Internal Control. July 2016.)
Annual Reviews
After initial implementation, the agency’s risk profile must be discussed each year with OMB as a component of the summary of findings from the Agency strategic review and FedSTAT. (OMB Circular A-11. Section 270, Performance and Strategic Reviews.)
Risk Governance and Internal Control
Agencies must have a Senior Management Council (SMC) to assess and monitor deficiencies in internal control. This SMC may be a subset of the Risk Management Council; however, agencies have discretion in determining the appropriate structure. A Senior Management Council may include the [CFO], [Chief Human Capital Officer (CHCO)], [CIO], [CISO], [CAO], Senior Agency Official for Privacy, Designated Agency Ethics Official, and Performance Improvement Officer and the managers of other program offices, must be involved in identifying and ensuring correction of systemic material weaknesses relating to their respective programs. (OMB M-16-17. Circular A-123. Management’s Responsibility for Enterprise Risk Management and Internal Control. July 2016.)
Internal Control Sources of Information
The Agency’s assessment of internal control may be documented using a variety of information sources to include: (Ibid.)
Enterprise Risk Management (ERM) Requirements
All executive agencies are required by OMB Circular No. A-123 to integrate ERM processes and internal controls and are required to include consideration of internal controls over reporting [ICOR] in their annual assurance statement. This update aligns ICOR with existing OMB Circular No. A123 ERM efforts. This framework for internal controls over reporting may be phased in over several years as the agency’s ERM process matures. As an agency’s ERM process matures, the agency risk profile may begin to identify and link some enterprise risks with formal internal controls. As this integration occurs, management must include consideration of these controls in the OMB Circular No. A-123 assurance process. (OMB M-18-16. Appendix A to OMB Circular No. A-123, Management of Reporting and Data Integrity Risk M-18-16.June 2018.)
COVID-19 and Mission Delivery
In response to the national emergency for COVID-19, agencies are directed to use the breadth of available technology capabilities to fulfill service gaps and deliver mission outcomes. The [Harnessing Technology to Support Mission Continuity] “frequently asked questions” are intended to provide additional guidance and further assist the IT workforce as it addresses impacts due to COVID-19. Additional technology related questions should be directed to the Office of the Federal CIO at OFCIO@omb.eop.gov. OMB will continue to provide updates and additional information as needed to support the resiliency of agency missions. (OMB M-20-19. Harnessing Technology to Support Mission Continuity. March 2020.)
Program Management
Program Management Improvement Accountability Act (PMIAA) Implementing Strategy 1 - Coordinated Governance: Overview of Organizational Changes
The PMIAA [established] a new governance structure and function at agencies for advancing the practice of [program/project management (P/PM)] across the Federal Government. This section provides guidance to agencies by describing how agency COOs should integrate P/PM as a component of the agencies’ broader management capabilities, providing the role and responsibilities of the PMIO, and defining the functions and composition of the PMPC.
Roles and Functions of the Program Management Improvement Officer (PMIO)
Improvements in program management should lead to improved program performance and effectiveness that advance progress towards the achievement of agency strategic goals and objectives. In order to enhance and coordinate the practice and application of program management at agencies, PMIOs will: (OMB M-18-19. Improving the Management of Federal Programs and Projects through Implementing the Program Management Improvement Accountability Act (PMIAA). Appendix 2. June 2018.)
Implementing Acquisition Portfolio Reviews: Acquisition Program Management
Several laws, regulations, and policies have provided direction for acquisition program management, including provisions in the Federal Acquisition Streamlining Act (FASA), the Clinger-Cohen Act, OMB’s Capital Programming Guide, and Part 34 of the Federal Acquisition Regulation (FAR). Agencies have developed detailed policies and procedures to implement these requirements, but too often, this guidance has not been reflected adequately in agency governance structures and protocols.
Identifying IT Programs vs. Non-IT Programs
Reviews of major acquisitions supporting IT programs shall build on portfolio reviews conducted pursuant to FITARA, 44 U.S.C. § 11319. Programs shall be considered IT programs if the investment scope is primarily information technology as defined in FAR Subpart 2.1. Programs with embedded systems or small IT components shall be considered non-IT, but collaboration with CIOs is expected for any significant components of the investment that involve IT. (Ibid, Appendix 5.)
Portfolio Management
Integrated Data Collection (IDC)
[OMB established] an Integrated Data Collection channel for agencies to report structured information. Agencies will use this channel to report agency progress in meeting IT strategic goals, objectives and metrics as well as cost savings and avoidances resulting from IT management actions. This data includes information previously reported by agencies as well as data which agencies [should have reported] by May 15, 2013 and then update every three months thereafter. Subsequent updates will be on the last day of August, November, and February of subsequent fiscal years. Appendix B provides more detail on this Integrated Data Collection and a link to reporting instructions and guidance for the May 15, 2013 deadline. This Integrated Data Collection will draw on information previously reported under PortfolioStat, the FDCCI, the Federal Digital Government Strategy, quarterly Federal Information Security Management Act metrics, the Federal IT Dashboard, and selected human resource, financial management, and procurement information requested by OMB. ( OMB M-13-09. Fiscal Year 2013 PortfolioStat Guidance: Strengthening Federal IT Portfolio Management. March 2013.)
PortfolioStat Sessions
In support of this review process, Agency [COO], on an annual basis, shall be required to lead an agency-wide IT portfolio review within their respective organization (PortfolioStat). A PortfolioStat session is a face-to-face, evidence-based review (e.g., including data on commodity IT investments, potential duplications, investments that do not appear to be well aligned to agency missions or business functions, etc.) of an agency’s IT portfolio.
CIOs, CFOs, and CAOs must support the PortfolioStat process by providing the necessary data and analysis, attending the PortfolioStat meeting, and support all decisions made through the process. This is necessary so that the portfolio-wide review results in concrete actions to maximize the investment in mission and support IT, consolidate the acquisition and management of commodity IT, reduce duplication, and eliminate waste.
To support this process, OMB is requiring that each agency take the following actions: (OMB M-12-10. Implementing PortfolioStat. March 2012.)
Agency PortfolioStat Conduct
PortfolioStat is a data-driven tool that agencies use to assess the current maturity of their IT portfolio management processes and select PortfolioStat action items to strengthen their IT portfolio. Covered agencies shall hold PortfolioStat sessions on a quarterly basis with OMB, the agency CIO, and other attendees. (These sessions were previously annual and required the attendance of the agency deputy secretary, see OMB M-12-10. March 2012, OMB M-13-09. March 2013, OMB M-14-08. June 2015.)
Data Management
Code Inventories and Discovery Inventories
Code Inventories and Discovery Inventories are a means of discovering information such as the functionality and location of potentially reusable or releasable custom-developed code. Within 120 days of the publication date of [the Federal Source Code Policy], each agency [should have updated]—and thereafter keep up to date—its inventory of agency information resources to include an enterprise code inventory that lists custom-developed code for or by the agency after the publication of this policy. Each agency’s inventory will be reflected on Code.gov. The inventory will indicate whether the code is available for Federal reuse, is available publicly as OSS, or cannot be made available due to a specific exception listed in this policy. Agencies shall fill out this information based on a metadata schema that OMB will provide on Code.gov. (OMB M-16-21. Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software. August 2016.)
Open Source Software Policy
As appropriate, Senior Agency Officials should also work with the agency’s public affairs staff, open government staff, web manager or digital strategist, program owners, and other leadership to properly identify, publish, and collaborate with communities on their Open Source Software (OSS) projects. (Ibid.) Each agency’s CIO—in consultation with the agency’s CAO—shall develop an agency-wide policy that addresses the requirements of this document. For example, the policy should address how the agency will ensure that an appropriate alternatives analysis has been conducted before considering the acquisition of an existing commercial solution or a custom-developed solution. In accordance with OMB guidance, these policies will be posted publicly. Moreover, within 90 days of the publication date of this policy, each agency’s CIO office [should have corrected or amended] any policies that are inconsistent with the requirements of this document, including the correction of policies that automatically treat OSS as noncommercial software. (Ibid.)
Open Data Policy
The Clinger-Cohen Act of 1996 assigns agency CIOs statutory responsibility for promoting the effective and efficient design and operation of all major Information Resources Management (IRM) processes within their agency. Accordingly, agency heads must ensure that CIOs are positioned with the responsibility and authority to implement the requirements of the Open Data Policy Memorandum in coordination with the agency’s [CAO], [CFO], Chief Technology Officer, Senior Agency Official for Geospatial Information, Senior Agency Official for Privacy (SAOP), [CISO], [Senior Agency Official for Records Management (SAORM)], and Chief Freedom of Information Act (FOIA) Officer. The CIO should also work with the agency’s public affairs staff, open government staff, web manager or digital strategist, program owners and other leadership, as applicable. (OMB M-13-13. Open Data Policy-Managing Information as an Asset. May 2013.)