You are on page 1of 48

Guide to Products

and Services
Guide to Products and Services

The Software Engineering Institute 1


Strategy 2
Areas of Work 3
Put The SEI to Work For You 4
How to Use This Guide 5

Acquisition 6
Architecture, Product Lines, and Predictable Assembly 10
Process Improvement and Performance Measurement 18
Security 25
Interoperability, Dependability, and Misson Success 31

Special Programs
Affiliate Program 37
SEI Credentials Program 37
SEI Membership Program 37
SEI Office in Europe 38
SEI Partner Network 38
Software and Systems Process
Improvement Network (SPIN) 38

Index 39
Abbreviations, Acronyms, and Initialisms and Index 44

 www.sei.cmu.edu 1-888-201-4479
The Software Engineering Institute

The SEI’s core purpose is to help organizations such as yours improve their
software engineering capabilities and develop or acquire the right software,
defect free, within budget and on time, every time.

Since 1984, the Carnegie Mellon® Software The SEI works with defense
Engineering Institute (SEI) has served the and government organizations, industry,
nation as a federally funded research and and academia to continually improve our
development center. The SEI staff has software-intensive systems.
advanced software engineering principles To accomplish this, the SEI
and practices and has served as a national • performsresearch to explore
resource in software engineering, computer promising solutions to software
security, and process improvement. As part engineering problems
of Carnegie Mellon University, which is
• identifies
and codifies technological and
well known for its highly rated programs in
methodological solutions
computer science and engineering, the SEI
operates at the leading edge of technical • testsand refines the solutions through
innovation. pilot programs that help industry and
government solve their problems
Today, software continues to grow in impor- • widelydisseminates proven solutions
tance and significance in nearly all aspects through training, licensing, and
of our society, including defense systems, publication of best practices
transportation, finance, medicine, manufac-
turing, and entertainment. The SEI’s core purpose is to help
organizations such as yours to improve their
Software affects us all. More than ever, we software engineering capabilities and to
need software that is built with quality, is develop or acquire the right software, defect
developed on time and within budget, and is free, within budget and on time, every time.
usable, maintainable, and capable of evolv-
ing to meet evolving needs.

1-888-201-4479 www.sei.cmu.edu 
Strategy

The SEI achieves its goals through technology innovation and transition.
The SEI creates usable technologies, applies them to real problems, and
amplifies their impact by accelerating broad adoption.

Create Apply Amplify


The SEI addresses significant and Because application and validation are The SEI works through the software
pervasive problems in software engineering required to prove effectiveness, applicabil- engineering community and organizations
and related disciplines by ity, and transition potential, the SEI applies, that depend on software to encourage and
• motivating and performing research validates, refines, and extends new and support the widespread adoption of new and
improved technologies and solutions in real- improved technologies and solutions through
• developing innovative new technologies world government and commercial contexts. • courses
• identifying and fostering the Refining and extending technologies and
development and improvement of emerg- solutions is an intrinsic part of application. • licenses for use and delivery
ing or underused technologies • authorizations and certifications
• improving
Government and commercial organizations
and adapting existing solutions • workshops and conferences
directly benefit from these engagements.
In addition, the experience that SEI staff • leadership in professional organizations
SEI tools and methods are suitable for all members gain through these engagements • Web-based communication
organizations that commission, build, or use helps to identify
systems that depend on software. • books and publications
• real-worldproblems that warrant further
• advocacy
The SEI collaborates with innovators and investigation in the Create phase
researchers to implement these activities. • needed transition artifacts and Professionals throughout the world acceler-
strategies for encouraging and supporting ate the adoption and impact of software
adoption in the Amplify phase engineering improvements through direct
interaction with the SEI and with SEI
The SEI works with early adopters to apply Partners—organizations and individuals
promising tools and methods. licensed by the SEI to deliver SEI services.

Create Apply Amplify

 www.sei.cmu.edu 1-888-201-4479
Areas of Work

The SEI technical program—created and carried out by world-recognized


leaders in software engineering, security, and process improvement—consists
of five technical focus areas. The SEI also conducts new research into emerging
topics in software and systems engineering.

For nearly 25 years, the SEI has served


the nation as a federally funded research Acquisition Security
and development center. The SEI staff has Support for the DoD, federal Technologies, system-development
advanced software engineering principles agencies, and others in practices, and system-management
and practices and has served as a national institutionalizing and continuously practices that can significantly
and international resource in software improving their ability to acquire, improve networked systems
engineering, computer security, and process deploy, and sustain systems security and survivability; includes
improvement. As part of the world-renowned that meet cost, schedule, and CERT, a center of Internet security
Carnegie Mellon University—a global technical objectives expertise
research university of more than 10,000
students and more than 4,000 faculty and
staff—the SEI and its staff operate at the
leading edge of technical innovation.

The SEI’s technical focus areas together with Architecture, Product Lines, Interoperability, Dependability,
its outreach activities are aimed at meeting and Predictable Assembly and Mission Success
the defined software engineering needs of Practices and techniques for Technology and practices to
the U.S. Department of Defense. Within predictably and efficiently achieve system-of-systems
designing, constructing, interoperability and to predict and
these areas of work, the SEI collaborates
and guiding the evolution of improve the performance and
with defense, government, industry, and aca-
software-intensive systems with dependability characteristics of
demic institutions to continuously improve
the qualities needed to meet embedded and large systems
software-intensive systems.
business and mission goals

Process Improvement and


Performance Measurement
Process-management practices
and performance-improvement
and measurement techniques for
software and related disciplines
in support of the management,
development, and acquisition of
software and systems

1-888-201-4479 www.sei.cmu.edu 
Put the SEI to Work for You

By working with the SEI, you benefit from more than two decades of government
investment and participation from your peers in advancing the practice of software
engineering.

Congress established the SEI because How the SEI Works with Government How the SEI Works with Industry
software is vital to the national interest. SEI staff members help the U.S. Department The SEI works with commercial organiza-
By working with the SEI, you benefit from of Defense (DoD) and other government tions that want to develop a strategic advan-
a government investment of more than agencies solve software engineering and tage by rapidly applying improved software
$800 million and more than two decades of acquisition problems. SEI direct support is engineering technology. The SEI also works
participation from your peers and competi- funded through task orders for government with organizations that want to combine
tors in advancing the practice of software work. Engagements with the SEI are of their expertise with the SEI’s expertise to
engineering. particular benefit to government program mature new technology for the benefit of the
managers, program executive officers, and entire software industry. The SEI also sup-
The SEI creates, tests, refines, and dissemi- senior acquisition executives, particularly ports a select group of SEI Partners—orga-
nates a broad range of technologies and those with long-range programs that will nizations and individuals that are trained and
management techniques. These techniques benefit from strategic improvements that the licensed by the SEI to deliver SEI products
enable organizations to improve the results SEI fosters. and services.
of software projects, the quality and behav-
ior of software systems, and the security and The SEI has a well-established process for For more information, write to the SEI at
survivability of networked systems. contracting with government agencies and industry-customers@sei.cmu.
will work with you to meet your needs. This
As an applied research and development process is described in more detail at
center, the SEI brings immediate benefits to www.sei.cmu.edu/collaborating
its research partners and long-term benefits /contracting.html.
to organizations that depend on software.
The tools and methods developed by the SEI For more information, write to the SEI at
and its research partners are applied daily in government-customers@sei.cmu.
organizations throughout the world.

 www.sei.cmu.edu 1-888-201-4479
How to Use This Guide

This Guide to Products and Services is organized by the SEI areas of work. It is intended to help
you and your organization determine how to put the SEI’s resources to work for you.

TOOLS & METHODS CONFERENCES CREDENTIALS


www.sei.cmu.edu/tools-methods www.sei.cmu.edu/events www.sei.cmu.edu/credentials

Many SEI solutions to the problems The SEI sponsors or cosponsors many Participants are guided through a series of
associated with software-intensive systems technical conferences, workshops, and SEI courses that help them to develop exper-
are available as tools and methods to help user-group meetings throughout the year. tise in specific technical areas. Participants
developers and acquirers improve their receive SEI certifications or certificates after
practices. completing the courses.
PUBLICATIONS
www.sei.cmu.edu/publications
CUSTOMER ENGAGEMENTS RESEARCH
www.sei.cmu.edu/collaborating
www.sei.cmu.edu/services Addison-Wesley has published more than 30
books by SEI staff members and others in the
The SEI accepts a limited number of funded SEI Series in Software Engineering. SEI staff By investing in technology development
engagements to help organizations apply members have also written books published with the SEI, organizations contribute to and
best practices. by other publishing companies. In addition, rapidly adopt the results of research before
the SEI Web site provides free downloads of those results are widely available.
almost 1,000 SEI research reports.
EDUCATION & TRAINING
www.sei.cmu.edu/products/courses

SEI courses, available from the SEI and from


licensed SEI Partners, are based on matured,
validated, and documented solutions to
pervasive problems.

1-888-201-4479 www.sei.cmu.edu 
Acquisition

Acquiring systems that meet cost, schedule, and technical objectives


www.sei.cmu.edu/acquisition

Acquiring systems that deliver mission capa- The SEI works directly with acquisition pro-
bilities on their promised date is a national grams to help them achieve their objectives.
imperative. However, acquisition programs Teams of SEI experts work in acquisition
frequently have difficulty meeting aggressive contexts in the Army, Navy, Air Force, and
cost, schedule, and technical objectives. intelligence agencies, as well as other DoD
and civil agencies, applying SEI products and
Acquisition program managers are chal- services.
lenged to grasp practical business concerns
and to understand topics as diverse as risk The SEI vision is to facilitate the rapid forma-
management, use of commercial off-the- tion of agile teams composed of acquirers,
shelf (COTS) components, use of processes developers, and operators using SEI tech-
and their application, program management, nologies to provide high-quality, cutting-edge
architecture, survivability, interoperability, capabilities.
source selection, and contract monitoring.
The SEI has spent more than two decades
developing solutions in these areas.
Unfortunately, mastery of this information
and know-how can be daunting for an acqui-
sition program manager.

 www.sei.cmu.edu 1-888-201-4479
TOOLS & METHODS The initial framework grew out of a col-
laboration between General Motors and the
IT Strategic Planning
A well-founded information technology (IT)
Solutions to the problems associated with Software Engineering Institute. The CMMI- strategic plan communicates the mission,
software-intensive systems that help develop- ACQ constellation now reflects the results of vision, objectives, values, and critical success
ers and acquirers improve their practices extensive piloting with other government and factors for the organization’s enterprise archi-
commercial acquirers. tecture and future products and services.
Acquisition Strategy Development Tool The SEI helps organizations define and articu-
The SEI Acquisition Strategy Development CMMI for Acquisition and related materials are late an effective IT strategy from a systems
Tool (ASDT) can be used to profile a pro- available on the SEI Acquisition Web page at perspective. SEI experts also consider the
gram’s software-acquisition characteristics, www.sei.cmu.edu/acquisition. mechanisms for governance and focus on
identify key strategy drivers, identify specific aligning the IT strategy with organizational
strategic choices, and evaluate how those business objectives.
choices mitigate the program’s software CUSTOMER ENGAGEMENTS
risks. Program management offices can Funded engagements to help organizations Pre- and Post-Contract Award
use this Excel-based workbook to formulate meet their business and mission objectives Workshops
acquisition strategies for a new program or SEI staff members help a program’s person-
to evaluate the appropriateness of strategies
being executed. In addition, an accompanying Direct Support nel prepare for the request-for-proposal (RFP)
process, reviewing and discussing potential
technical report, Techniques for Developing pitfalls and problems. After contract award,
an Acquisition Strategy by Profiling Software
Acquisition Process Improvement
Whether you’re using Lean, Six Sigma, Theory the SEI can facilitate workshops between
Risks, provides ASDT users in-depth back- the government and the selected contractor
of Constraints, AFSO 21, CMMI, or other
ground information and instructions on how to team as they define program-specific pro-
process improvement methods, the SEI can
use the tool to achieve optimal results. cesses in areas that are key to the success of
help. The SEI works directly with acquisition
programs and organizations to help define a the program, such as engineering practices,
Capability Maturity Model Integration set of measurable improvement objectives, program management, communications, and
(CMMI) Acquisition Module analyze for improvement, and implement risk and issue management.
One way to improve acquisition practices is to changes and control mechanisms for long-
ensure that the acquisition processes needed term improvement. Assessments, Reviews, and
for a technically sound project are defined,
implemented, measured, and maintained.
Evaluations
Support for Software Acquisition and
The Capability Maturity Model Integration
® Systems Engineering Activities Independent Technical Assessments
The SEI works directly with program managers Independent technical assessments (ITAs)
(CMMI®) Acquisition Module is a condensed
and their staffs to help them achieve their uncover the root causes of problems affect-
form of the CMMI framework that defines
objectives. Teams of SEI technical experts ing software-intensive programs, and provide
effective and efficient acquisition practices,
work in acquisition environments in the Army, recommendations that maximize a program’s
directed both internally toward the acquisition
Navy, and Air Force, as well as with other DoD strengths and minimize and mitigate its
project and externally toward project monitor-
and civil agencies, applying SEI products and risks. ITAs are typically initiated by a system
ing and control of the selected contractors and
services as well as other industry best prac- program director, program executive officer,
suppliers. These practices provide a basis for
tices. The SEI supports a wide range of activi- or other acquisition official. ITA teams
acquisition process discipline while balancing
ties that include identifying and mitigating risk, comprise SEI staff members and visiting
the need for agility.
benchmarking and improving acquisition pro- scientists with a mix of expertise who
The CMMI Acquisition Module (CMMI-AM), cesses, implementing software and systems conduct a series of interviews with program
Version 1.1 and related materials are available engineering best practices, and more. stakeholders and deliver a briefing and
on the CMMI-AM Web page at recommendations.
www.sei.cmu.edu/programs Strategic Planning
/acquisition-support/cmmi-am.html. Software Risk Evaluations
Acquisition Strategy Planning A software risk evaluation provides program
CMMI for Acquisition (CMMI-ACQ) Workshop managers with a mechanism to anticipate and
For organizations that want to apply a com- Developing an acquisition strategy is a address program risks. This evaluation is used
prehensive suite of CMMI principles to their crucial component of acquisition planning. to identify and categorize specific program
acquisition activities, CMMI for Acquisition Acquisition-improvement experts from the risks emanating from products, processes,
(CMMI-ACQ) provides a set of widely SEI help workshop attendees gain a deeper management, resources, and constraints.
accepted acquisition practices within a proven understanding of a program’s software-acqui- The program’s staff members participate in
improvement structure. sition characteristics and the drivers that affect the identification, analysis, and mitigation of
that program’s strategic choices. In addition, risks that could affect their development effort.
participants learn how to use the Acquisition
Strategy Development Tool to either formulate
acquisition strategies for a new program or
evaluate the appropriateness of strategies that
a program is already executing.

1-888-201-4479 www.sei.cmu.edu 
Acquisition, continued

Process Appraisals Measurement-Plan Evaluations Sustainment-Readiness Review


A process appraisal is an objective review Effectively monitoring a contract requires that A sustainment-readiness review can help an
of the processes used by a program team a program have in place an effective, custom- organization determine its overall software
(acquirers, contractors and subcontractors) ized measurement system. When a program’s maintenance plan, whether its software is
to execute a project. Reviews examine engi- measurement system includes consistent ready for sustainment, and whether sufficient
neering, acquisition, integrated product and collection of metrics and analysis for decision artifacts exist. Technical experts from the SEI
process development, project management, making and fact-based planning, it can operate conduct sustainment-readiness reviews to
and support processes. The SEI provides the as an effective early-warning system for identify potential issues with a project entering
Standard CMMI Appraisal Method for Process program problems. The SEI helps programs into sustainment and to recommend actions
Improvement (SCAMPISM) family of appraisal create a system for recording metrics data so for preparing a project for sustainment.
methods to identify strengths, weaknesses, that they can use reliable historical data as a
and risks to assist government programs in basis for more accurate program estimates. Document Reviews
process improvement activities. The quality, completeness, and level of detail
System and Software Requirements of milestone document deliverables have a
Additionally, the SEI offers the SEI Process in Architecture Reviews substantial impact on a program’s ability to
Execution Review (PIER), a SCAMPI appraisal The SEI works with project stakeholders to execute software development. Experts in
that helps acquirers evaluate the process ensure that customer requirements, product many different areas of systems and software
capability of their contractor or contractor and architecture requirements, and analysis expertise can provide or augment the techni-
team, and identify risks and ways to mitigate and validation processes reflect the fun- cal review of documents produced by both
them. A PIER can also look at the processes damental needs that drive programs, from the program office and the contractor. Types
employed by the acquirer, and at the intersec- both mission and business perspectives. In of documents that can be reviewed include
tion of processes between the contractor and addition, the SEI advises programs on how those emanating from the acquisition strategy
the acquirer. to manage requirements and architecture as well as the transition and operations plans.
changes, maintain traceability and change
Request for Proposal (RFP) Preparation history, and evaluate the impact of changes
and Reviews from the viewpoint of the stakeholders. EDUCATION & TRAINING
The language used in a formal request for Available from the SEI and licensed SEI
proposal (RFP) makes a critical difference in Quality Assessments of System Partners, based on matured, validated, and
the quality of the proposals received and ulti- Architectures and their Requirements documented solutions to pervasive problems
mately the success of an acquisition program.
(QUASAR)
The SEI is adept at developing RFP language,
The SEI Quality Assessment of System Continuous Risk Management
including sample language for a variety of
Architectures and their Requirements This two-day course introduces project
specific clauses relevant to software-inten-
(QUASAR) assessment method provides managers, lead engineers, software engi-
sive acquisition. For example, some proposals
a practical way to determine if a system’s neers, quality-assurance staff, hardware
should specifically address the importance
architecture, including its subsystems, meets engineers, and software engineering process
of software architecture, process improve-
quality requirements. SEI technical staff group members to the concepts and appli-
ment, the software test and evaluation
members help architects formulate claims, cation of continuous risk management. The
approach, software measurement needs, and
build arguments, and gather evidence to course provides participants with practical
requirements.
demonstrate to the program office and other experience, methods, and tools that help them
stakeholders that their architectures possess implement risk-management practices in their
Additionally, the SEI works directly with acquir-
sufficient quality. organizations.
ers to improve RFP processes and capabili-
ties, conducting pre-award workshops to help
identify and mitigate risks by evolving the RFP Testing-Approach Evaluation COTS-Based Systems for Program
package. After the award, the SEI helps estab- The testing approach for a software-inten- Managers
lish expectations and process interactions sive system has a significant impact on the This one-day course covers the major chal-
between the acquirer and developers. ultimate quality of the delivered system. lenges and opportunities associated with the
SEI experts help to ensure an appropriate use of COTS products in software-intensive
approach to software testing by reviewing systems from the perspective of the program
Source-Selection Reviews
the system-test approach. Conducting an manager. It covers practices based on real-
The SEI supports the proposal-evaluation
evaluation ensures appropriate test coverage, world case studies for establishing a COTS
phase of the source-selection process by pro-
traceability to requirements, testing for COTS business case, vendor and supplier rela-
viding technical reviews of the submissions,
products, visibility into contractor testing, tionships, architecture, license negotiation,
with an emphasis on software-related issues.
testing of both quality and functional require- requirements, evaluation, risk management,
Experienced SEI staff members help programs
ments, and integration of software testing into and more.
prepare to evaluate proposals, judge them
the overall test strategy.
against the criteria set forth in the solicitation,
assist with past performance and cost evalua-
tions, and more.

 www.sei.cmu.edu 1-888-201-4479
COTS Software Product Evaluation for
Practitioners
PUBLICATIONS
SEI reports are available for free download at
This two-day course covers fundamental defi-
www.sei.cmu.edu/publications.
nitions, an overview of some of the basic prin-
ciples of COTS product evaluation, a process
CMMI Acquisition Module (CMMI-AM),
framework for COTS software product evalua-
Version 1.1. 2005
tion, and some useful techniques. Instructors
describe experiences and practices based
Techniques for Developing an Acquisition
on real-world case studies for COTS product
Strategy by Profiling Software Risks. Mary
evaluation.
Catherine Ward, Joseph P. Elm, Susan
Kushner, 2006
Introduction to the CMMI Acquisition
Module Sustaining Software-Intensive Systems. Mary
This one-day course is designed for program Ann Lapham, Carol Woody (contributor), 2006
managers and their staff members. It
presents the important role that process QUASAR: A Method for the QUality
and process improvement play in the acqui- Assessment of Software-Intensive System
sition of software-intensive systems. This ARchitectures handbook. Donald Firesmith,
course features comprehensive discussion 2006
of the CMMI Acquisition Module, actionable
methods and tips for attendees, and ample
opportunity for questions.

Software Acquisition Survival Skills


This three-day course is designed for program
managers and their staff members and
provides a broad overview of the skills needed
in a program office to manage software
acquisition. It presents a unique acquisition
perspective on key topics in software system
acquisition, including risk management,
requirements management, pre-award activi-
ties, systems engineering, software architec-
ture, technical evaluation, project metrics, and
process management.

Patterns of Failure in Software


Acquisition
This workshop, designed for acquisition prac-
titioners, is a facilitated exploration of recur-
ring patterns of counter-productive behavior in
software acquisition. Led by SEI experts with
experience observing common types of failure
in actual programs, the workshop employs key
concepts from systems thinking. Participants
will learn the warning signs and techniques to
recognize and prevent these failure modes.

1-888-201-4479 www.sei.cmu.edu 
Architecture, Product Lines, and Predictable Assembly

Using proven practices for predictably and efficiently designing, constructing,


and guiding the evolution of software-intensive systems with the qualities
needed to meet business and mission goals
www.sei.cmu.edu/programs/pls

The SEI works in the areas of software Product Lines Predictable Assembly
architecture, software product lines, and Software-intensive systems are often Our confidence in software architectural
predictable assembly to effect widespread acquired, developed, tested, and maintained analysis can be only as high as our confidence
product line practice, architecture-centric as separate products, even if they have a that the developed software implements the
development and evolution, and predictable significant amount of common functionality architecture.
construction throughout the global software and code. Such an approach wastes technical
community. The SEI is also studying how resources, takes too long, and costs The SEI’s groundbreaking work in predictable
to build and maintain the ultra-large-scale more than necessary. A product line approach assembly combines the strengths of soft-
systems of the future. to software can dramatically reduce devel- ware architecture and product lines so that
opment cycles, improve return on software software implementations exhibit predictable
Architecture investments, improve software system quality, by construction, for whole classes of
Software architecture is the key for ensuring integration, and give an organization more op- systems. This work enables organizations to
that a system serves an organization’s busi- tions in the future. • definedesign and implementation
ness and mission goals. The SEI can help you standards that, when followed, result in
• solve specific architecture problems Making the move to product lines, however, predictable runtime quality
is a business and technical decision and • use
• createleading-edge architecture tech- automation to enforce these standards
requires considerable changes in the way
niques and methods organizations practice software engineering, • defineobjective and predictive quality
• improve your organization’s architecture technical management, and organizational standards and measures for software com-
capabilities management. ponents developed internally or provided by
third-party suppliers
The SEI’s architecture products and services The SEI’s software product line products and
serve as a starting point for establishing a services serve as a starting point for estab- Ultra-Large-Scale (ULS) Systems
working relationship to help you answer the lishing a working relationship to help you Many systems of the future will be ultra-
following questions: answer the following questions: large on one or many dimensions—number
• Doesyour architecture meet your long-term of lines of code; number of people employing
• What is a systematic way to transition to
system-evolution needs? the system; amount of data stored, accessed,
the use of software product lines?
manipulated, and refined; number of connec-
• Do you have architecture development and • Whatare your organization’s strengths tions and interdependencies among software
evolution strategies that will address long- and weaknesses with respect to software components; number of hardware elements
term uncertainty in your business climate, product line development? to which they interface. They will be ultra-
mission goals, and technology? • Which large-scale (ULS) systems.
products in your product line will
• Is
your system/software architecture tacti- achieve the highest production savings?
cally well positioned for the coming years?  • What The characteristics of ULS systems, already
is your business case for product line
• Do you have an approach for improving development? evident in some of today’s largest systems,
architectural deficiencies? imply changes in the fundamental assump-
• How do you transition from a family of ex-
• Isthere a seamless connection between tions that underlie today’s software engineer-
isting systems to a software product line?
your system and software architecture ing approaches. The SEI led a team of experts
• Howcan you improve your ongoing soft-
approaches? in a study of ULS systems and continues to
ware product line effort? nurture a community interested in exploring
• Do you know how to measure and improve the associated challenges and promising
the architecture competence of your orga- research to address those challenges.
nization and its key individuals?

10 www.sei.cmu.edu 1-888-201-4479
TOOLS & METHODS Architecture Tradeoff Analysis Method
(ATAM) and the System ATAM
Views and Beyond Approach to
Architecture Documentation
Solutions to the problems associated with
The SEI Architecture Tradeoff Analysis Method® The SEI Views and Beyond approach to archi-
software-intensive systems that help develop-
(ATAM®) evaluation process is used for evalu- tecture documentation is based on the concept
ers and acquirers improve their practices
ating software architectures relative to quality of architectural views. This approach involves
attribute goals. The ATAM exposes architectural selecting a set of relevant views based on the
Architecture risks that potentially inhibit the achievement of architecture and its stakeholders, documenting
an organization’s business goals. The ATAM is those views, and then documenting information
Active Reviews for Intermediate so named because it not only reveals quality- that applies across views. The approach covers
Designs (ARID) attribute-specific risks but also provides insight practical information such as how to choose the
The SEI Active Reviews for Intermediate into how those quality goals interact with, or set of views to document, how to document a
Designs (ARID) method is a low-cost, high- tradeoff against, each other. A variant of the view, how to document the information beyond
benefit method for reviewing a preliminary ATAM, known as the System ATAM, is used to views, how to judiciously combine views in the
software design (such as for a component or evaluate system architectures. documentation to increase understanding and
subsystem) for suitability in its intended usage decrease the workload, and how to document
context and environment. The ARID method Attribute-Driven Design (ADD) Method architectural constructs using popular notations
relies on assembling the design’s stakehold- The SEI Attribute-Driven Design (ADD) method and languages, including the Unified Modeling
ers to articulate what the important usage is a systematic approach to designing a Language (UML).
scenarios are and then exercising the design software architecture. It is based on knowing
to make sure those scenarios are satisfied by both the functional and quality requirements Product Lines
the design. of systems and knowing the architectural
approaches that have proven to be successful in Framework for Software Product Line
Architecture-Based System Evolution other systems. Practice
SEI Architecture-Based System Evolution The SEI Framework for Software Product Line
methods are used to ensure that a system Cost Benefit Analysis Method (CBAM) PracticeSM Web-based reference model aids
continues to serve its business and mission The SEI Cost Benefit Analysis Method (CBAM) organizations in software product line endeav-
goals throughout its lifetime. These methods is an architecture-centric method for analyzing ors. It provides comprehensive information
are used for redesigning architectures to the cost benefit implications of architectural about essential activities and practices as
improve deficiencies relative to quality attri- decisions while managing uncertainty in future gleaned from studies of organizations that have
bute and business and mission goals and to business and mission goals. It provides a basis built product lines; from direct collaborations on
evaluate and design architecture evolution for informed decision making about architectural software product lines with customer organiza-
strategies. design and evolution. The CBAM builds on the tions; and from leading practitioners in software
ATAM, though an ATAM evaluation is not an product lines. There is also an Acquisition
Architecture Competence Assessment absolute prerequisite. Companion to this framework that was devel-
The SEI Architecture Competence oped to aid acquirers in the Department of
Assessment instrument is used to determine Mission Thread Workshop Defense. The framework is available at
an organization’s competence to perform The SEI Mission Thread Workshop is used to www.sei.cmu.edu/productlines
architecture-centric development and evolu- elicit quality attribute considerations associated /framework.html. The acquisition companion
tion. It determines whether an organization with the existing mission threads of a system is available at www.sei.cmu.edu
possesses the ability to grow, use, and sustain or system of systems (SoS). The resulting “aug- /productlines/companion.html.
the necessary skills and knowledge to effec- mented” mission threads can then be used by
tively use architecture-based development SoS and system architects during the develop- Software Product Line Acquisition:
practices. ment and evaluation of the SoS, system, and A Companion to a Framework for
software architectures. This workshop is based Software Product Line Practice
Architecture Expert (ArchE) on the SEI Quality Attribute Workshop (QAW). This Web-based reference model complements
The SEI Architecture Expert (ArchE) is a rule- the SEI Framework for Software Product Line
based architecture design assistant that has Quality Attribute Workshop (QAW) Practice by adding acquisition-specific informa-
knowledge of quality attribute models, how The SEI Quality Attribute Workshop (QAW) is tion. It is a description of the technical and man-
to analyze an architecture for its quality attri- used to elicit key quality attribute goals and agement areas in which an organization must
bute properties, and how to manage tradeoffs architecture-development plans. It can be con- be competent to successfully acquire and field
among the quality attributes. ArchE makes this ducted prior to the development of a software a product line of software or software-intensive
knowledge accessible to every software archi- architecture. systems. The acquisition companion is available at
tect to generate software architectures with www.sei.cmu.edu/productlines
predictable quality attribute properties. /companion.html. The framework is available
at www.sei.cmu.edu/productlines
/framework.html.

Adoption Factory Pattern


As one of the SEI’s product line practice
patterns, the Adoption Factory pattern provides
a generic product line adoption roadmap to
guide an organization’s transition to a product
line approach. This roadmap is defined in
terms of phases, focus areas, and product line
practice areas.

1-888-201-4479 www.sei.cmu.edu 11
Architecture, Product Lines, and Predictable Assembly, continued

Product Line Analysis Options Analysis for Reengineering Predictable Assembly Starter Kit
The SEI Product Line Analysis method is (OAR) The SEI Predictable Assembly Starter Kit is an
requirements engineering for a product line; The SEI Options Analysis for ReengineeringSM Eclipse-based interactive development environ-
it is the link between the recognition of a (OARSM) method is a systematic, architecture- ment that provides a user-friendly integration
business opportunity and the design of a centric approach for identifying and mining of CCL, Pin, and reasoning frameworks. In
product line architecture. It incorporates the reusable software components within large, addition, the starter kit defines plug-in interfaces
views of multiple product line stakeholders in complex software systems. OAR enables and conventions for the development and intro-
a requirements model that includes the func- users to screen candidate software compo- duction of new reasoning frameworks, code
tional features of products and the software nents; identify the best candidates for reuse; generators, simulators, documentation genera-
quality attributes (e.g., performance, modifiabil- analyze, isolate, and aggregate candidate com- tors, and other such tools. It provides users
ity) of both the product line and its products. ponents; and estimate the level of difficulty, with a functional prediction-enabled component
The requirements model created by Product cost, and effort required to mine and rehabili- technology (PECT). The starter kit can be used
Line Analysis identifies common requirements tate the software components selected. to learn about or teach predictable assembly, to
across the product line and their allowed explore the feasibility of predictable assembly
variants. It also serves as a fundamental com- Predictable Assembly in nontrivial application settings, or to serve as a
munications mechanism between developers model for building a custom PECT.
and other stakeholders of a product line. ComFoRT Model-Checking Reasoning
Framework
Product Line Technical Probe (PLTP) The SEI ComFoRT model-checking reasoning CUSTOMER ENGAGEMENTS
The SEI Product Line Technical ProbeSM framework can verify whether a system will Funded engagements to help
(PLTPSM) method is a comprehensive diag- satisfy key behavioral invariants expressed as organizations apply best practices
nostic method for examining an organization’s claims. If a claim is not preserved, ComFoRT
readiness to adopt or ability to succeed with displays the execution trace that violates the
a software product line approach. The PLTP claim. ComFoRT is based on Copper, a state- Architecture
uses a series of structured interviews of small of-the-art software model checker, and can be
peer groups within the organization followed applied to SEI Construction and Composition
by data analysis and results reporting. The data
Architecture Reconstructions
Language (CCL) specifications or suitably
SEI architecture experts use the ARMIN recon-
collection, analysis, and reporting are based on restricted C-language code.
struction tool and a defined architecture-recon-
the SEI Framework for Software Product Line
struction process to develop graphical illustra-
Practice. Lambda-star Performance Reasoning tions of architectural views from input source
Framework code.
Product Line Quick Look (PLQL) The SEI Performance Reasoning Framework
The SEI Product Line Quick Look (PLQL) (Lambda-star) can be used to predict the
method is used to gather initial information
Architectural Assistance and Coaching
timing behavior of assemblies in hard, firm, SEI architecture experts use the tools and
about an organization’s readiness to adopt or and soft real-time settings. Performance methods itemized above to provide technical
ability to succeed with a software product models draw on generalized rate monotonic assistance and coaching in software architec-
line approach. The PLQL provides a high-level scheduling theory and queuing theory and are ture requirements, design, documentation, evo-
framing of the organization and its product line constructed automatically from CCL specifica- lution, and cost/benefit analysis.
effort. The information gathered can then be tions. Timing predictions have validated statis-
used to plan more specific assistance from the tical confidence intervals.
SEI or other activities needed to progress in Software and System Architecture
product line adoption. The PLQL can also serve Evaluations
Pin Container Technology SEI teams conduct software and system archi-
as the onsite portion of the preliminary phase Pin is a simple but robust container technol-
of the SEI Product Line Technical Probe. tecture evaluations using the ATAM. The SEI
ogy designed for embedded and hard real-
team documents the results in a report provided
time applications. It supports a strict form of
Structured Intuitive Model for Product to the customer organization.
container-based component encapsulation,
Line Economics (SIMPLE) deployment, and composition. Pin supports
The SEI Structured Intuitive Model for Product a zero-coding, assembly-through-connection Product Lines
Line Economics (SIMPLE) method is an style of development and is implemented
easy-to-use aid for calculating the costs and Product Line Executive Session
using nonproprietary real-time operating-
benefits of various software product line alter- During the half-day Product Line Executive
system services specifically adapted to
natives. Different strategies and approaches Session, a product line expert from the SEI
support UML statechart semantics.
can be compared and the most advantageous provides an overview of software product lines
one chosen. to a designated group of managers from the
Construction and Composition organization. The SEI expert facilitates a dis-
Language (CCL) cussion about software product lines and the
The SEI Construction and Composition potential for the organization’s adoption of the
Language (CCL) is used to specify Pin compo- approach.
nents and assemblies. It supports the syntac-
tic and behavioral specification of components
in an executable subset of UML statecharts,
generates complete component and assembly
implementations, and provides tool developers
with C, Java, and XML access to annotated
abstract syntax trees.

12 www.sei.cmu.edu 1-888-201-4479
Customized Product Line Solution • Product Line Measurement Workshop: Predictable Assembly
The SEI collaborates with organizations to This three-day working session guides par-
develop a customized product line solution, ticipants in defining meaningful measures Quality by Construction Clinic
tailoring existing methods and approaches as aligned with their software product line goals This clinic is a focused, two-day interac-
necessary to fit specific product or organiza- and developing an action plan for obtaining tive workshop for gathering initial informa-
tional needs. these goals within the context of the pro- tion about an organization’s readiness to
cesses in their product line efforts. adopt methods and technology for predict-
Product Line Diagnosis Using the able assembly. The goal of the clinic is to
PLQL or the PLTP Tailored Technical Support on Product help organizations identify the strengths and
The SEI performs product line diagnostics Line Efforts weaknesses of their current methods and
using either the Product Line Quick Look The SEI provides tailored technical assistance technologies vis-à-vis predictable assembly
(PLQL), which is a one-day high-level exami- to support scoping and product line analysis, and to identify specific opportunities to pilot
nation, or the more extensive Product Line architecture definition, architecture evaluation, predictable assembly technology in a practical
Technical Probe (PLTP), which takes a week. mining assets, migration planning, component setting.
The SEI team documents the results of development, and testing.
the diagnostics in a report provided to the • Product Line Analysis and Scoping Predictable Assembly Starter
customer organization. Workshop: During this one-week working Engagements
session, SEI experts guide an organization The SEI provides tailored technical assis-
Product Line Adoption/Action through a product line analysis that results in tance to organizations interested in adopting
Planning Workshop a preliminary set of product line artifacts that the methods and technology for predictable
The Product Line Adoption/Action Planning include a use case model, a feature model, assembly. Examples of the kinds of assistance
Workshop is a natural follow-up to the an object model, a domain- and organization- offered include
Product Line Technical Probe (PLTP). The PLTP specific dictionary, and a preliminary scoping • upgrading legacy systems to enable predict-
produces a portrayal of the state of an orga- document. able assembly: The SEI can help organiza-
nization’s product line practices. The planning tions evolve existing software systems and
• Product Line Architecture Support: SEI
workshop helps translate that portrayal into product lines to support the predictable
product line experts help an organization to
a plan of action. The workshop is a tailored, runtime behavior of new (and possibly third-
define a product line architecture with appro-
facilitated work session in which an SEI team party) system configurations.
priate variation mechanisms as well as to
works with a customer team, typically over
document and evaluate the architecture. • defining standards for trust and certifica-
two days, to produce a product line adoption
plan or an action plan. • Product Line Variability Management tion of third-party software: The SEI can
Workshop: During this two- to three-day help organizations understand the value of
session, SEI product line experts guide an achieving a specified level of confidence in
Tailored Management Assistance on
organization in understanding the goal of third-party software behavior and introduce
Product Line Efforts standards and technologies to achieve that
variability in a product line approach and
The SEI provides tailored management level of confidence.
help the organization determine appropriate
assistance to support developing a product
variation points, variation mechanisms, and • introducing software model checking to
line adoption plan, business case, operating
variability-management strategies and tool obtain up-to-provable trust in software: The
concept, acquisition strategy, training plans,
support. SEI can help organizations introduce model
and appropriate data collection, metrics, and
tracking mechanisms. The following services • Product Line Production Planning Workshop: checking technology to analyze, validate, and
are among those offered: During this two-day session, SEI product line potentially certify the correctness of execut-
experts guide an organization through the able design specifications and source code.
• Product Line Concept of Operations
initial development of a product-production • introducing state-of-the-art performance
Workshop: During this two-day working
strategy and provide tools and directions for analysis for a spectrum of real-time per-
session, SEI product line experts work with
applying that strategy to the creation of a formance requirements: The SEI can help
product line managers to develop a product
production method and a production plan. organizations introduce performance analysis
line concept of operations (CONOPS).
• Configuration Management Practice techniques to make systems predictable for
• Product Line Business Case Workshop:
Workshop: During this two-day session, SEI a range of soft to hard real-time performance
During this two-day working session, SEI requirements.
product line experts lead a product line orga-
product line experts use the Structured
nization through the initial steps in develop- • developing analysis models and construc-
Intuitive Model for Product Line Economics
ing or refining its configuration management tion rules to guarantee predictable runtime
(SIMPLE) to help product line managers
practices for its software product line effort. quality: The SEI can help organizations intro-
develop a product line business case.
duce comprehensive solutions for specific
• Product Line Acquisition Support: SEI
runtime quality attributes for high-criticality
experts work with an acquisition organization systems. These solutions range from predic-
to develop requests for proposals; an acqui- tive models to coding rules and their enforce-
sition strategy; statements of work; and ment mechanisms.
contractor planning, tracking, and monitoring
that are specific to a product line effort.

1-888-201-4479 www.sei.cmu.edu 13
Architecture, Product Lines, and Predictable Assembly, continued

EDUCATION & TRAINING Adopting Software Product Lines


This two-day course describes a practical,
CONFERENCES
Available from the SEI and licensed SEI Events sponsored or cosponsored by the SEI
phased, pattern-based approach to planning
Partners, based on matured, validated, and
and orchestrating software product line
documented solutions to pervasive problems Software Architecture Technology
adoption. The goal of the course is for partici-
pants to know what is involved in product line User Network (SATURN) Workshop
Architecture adoption and how to plan for it. The SEI Software Architecture Technology
User Network (SATURN) Workshop is an
ATAM Evaluator Training Developing Software Product Lines annual two-day conference that brings
This two-day course prepares software archi- This two-day course provides participants together engineers, architects, technical
tects to conduct a software architecture evalu- hands-on experience in understanding and managers, and product managers who are
ation using the Architecture Tradeoff Analysis applying the practice areas needed for using the architecture-centric methods and
Method (ATAM), a proven, highly effective software product line mastery. It provides approaches developed and promulgated by
method for systematically evaluating software an in-depth treatment of the concepts and the SEI. Attendees exchange their experiences
architectures for fitness of purpose. essential ideas covered in the Software and best practices and discuss ideas, issues,
Product Lines course, through the use of a and needs with regard to software architec-
ATAM Leader Training comprehensive software product line example ture practices.
This two-day course focuses on the social and that includes a complete set of assets and
leadership skills needed to successfully lead artifacts. Software Architecture Workshop
an architecture evaluation using the ATAM. for Educators
The course presents ATAM facilitation require- PLTP Team Training The SEI Software Architecture Workshop
ments and challenges and, to meet those This two-day course prepares participants to for Educators is a three-day gathering for
challenges, general facilitation and consulting be team members on a Product Line Technical educators who teach college and university
principles. Probe (PLTP). The course involves hands-on computer science and software engineering
exercises so that participants learn the PLTP courses and who would like to teach and use
Documenting Software Architectures process and practice the skills necessary to be software architecture principles and prac-
This two-day course provides in-depth a contributing PLTP team member. tices. SEI instructors present the Software
coverage of effective practices for document- Architecture: Principles and Practices course.
ing software architecture that meet the needs PLTP Leader Training Attendees then jointly determine ways to
of the entire architecture stakeholder commu- Leading a PLTP requires an in-depth under- incorporate these concepts and methods into
nity. It presents the information in the context standing of product line technical and man- academic courses.
of prevailing prescriptive documentation agement practices, a thorough understanding
models. of the PLTP process, excellent organizational Architecture Tradeoff Analysis Method
skills, and superior facilitation skills. This two- (ATAM) Lead Evaluator Workshop
Software Architecture Design and day course uses several hands-on exercises to The annual SEI ATAM Lead Evaluator
Analysis prepare participants to lead a PLTP. Workshop provides an update on the ATAM
This two-day course provides in-depth and its application. The workshop is mandatory
coverage of the concepts needed to design Predictable Assembly for all certified SEI ATAM Lead Evaluators.
and analyze a software architecture effectively.
The essential considerations for defining Principles of Predictable Assembly DoD Product Line Practice Workshop
any architecture are carefully examined and This two-day course introduces participants This workshop is a forum for sharing
then illustrated through application of the to the fundamental concepts of predictable Department of Defense (DoD) product line
Attribute-Driven Design method for software assembly. The course covers the relationships practices and experiences and for discussing
architecture. between software architecture and software ways in which specific product line practices
component technology and between “predict- are accomplished within the DoD.
Software Architecture: Principles and ability by construction” and software product
Practices lines. Course participants explore a practice Software Product Line Conference
This two-day course emphasizes the impor- model for predictable assembly that spans (SPLC)
tance of the business or mission context in design, implementation, analysis, prediction, The annual SEI Software Product Line
which systems are designed and introduces and validation activities. Participants learn how Conference (SPLC) features a rich and
participants to software architectures in a real- to impose “smart constraints” on developers varied program, with ample opportunities for
world setting. that guarantee that system runtime behavior everyone from software product line novices
will be analyzable—and predictable—by to experts. Recent conferences focused on
Product Lines construction. critical issues in product line engineering
such as architecture, quality assurance, and
Software Product Lines business and economics. Tracks include dedi-
This two-day course introduces software cated tutorials, workshops, panels, and paper
product lines and the basic concepts behind sessions. The conference also includes the
them. It covers the essential technical and induction of organizations into the Software
management practices needed to succeed Product Line Hall of Fame, as well as birds-of-
with software product lines and provides a-feather sessions.
guidelines and patterns for applying product
line techniques. Case studies illustrate the
concepts.

14 www.sei.cmu.edu 1-888-201-4479
PUBLICATIONS Product Lines Performance Property Theories for Predictable
Assembly from Certifiable Components. Scott
Books are available from Addison-Wesley Hissam, Mark Klein, John Lehoczky, Paulo
(www.awprofessional.com/seiseries) and Books
Merson, Gabriel Moreno, and Kurt Wallnau,
book retailers. SEI reports are available for free Software Product Lines: Practices and
2004
download at www.sei.cmu.edu/publications. Patterns. Paul Clements and Linda Northrop,
Addison-Wesley, 2001
Overview of ComFoRT: A Model Checking
Architecture Reports
Reasoning Framework. James Ivers and Nata-
sha Sharygina, 2004
Books Product Line Acquisition in a DoD
Software Architecture in Practice, Second Organization: Guidance for Decision Makers. Certified Binaries for Software Components.
Edition. Len Bass, Paul Clements, and Rick John Bergey and Sholom Cohen, 2006 Sagar Chaki, James Ivers, Peter Lee, Kurt
Kazman, Addison-Wesley, 2003 Wallnau, and Noam Zeilberger, 2007
The Structured Intuitive Model for Product
Documenting Software Architectures: Views Line Economics (SIMPLE). Paul C. Clements,
and Beyond. Paul Clements, Felix Bachmann, John D. McGregor, and Sholom G. Cohen, Ultra-Large-Scale Systems
Len Bass, David Garlan, James Ivers, Reed 2004
Little, Robert Nord, and Judith Stafford, Books
Addison-Wesley, 2002 Software Product Line Adoption Roadmap.
Ultra-Large-Scale Systems: The Software
Linda M. Northrop, 2004
Challenge of the Future. Linda Northrop, Peter
Evaluating Software Architectures: Methods Feiler, Richard P. Gabriel, John Goodenough,
and Case Studies. Paul Clements, Rick Product Line Analysis for Practitioners. Gary
Chastek and Patrick Donohoe, 2003 Rick Linger, Tom Longstaff, Rick Kazman, Mark
Kazman, and Mark Klein, Addison-Wesley, Klein, Douglas Schmidt, Kevin Sullivan, and
2001 Kurt Wallnau, Software Engineering Institute,
Software Process Improvement and Product
Line Practice: CMMI and the Framework for 2006
Reports Software Product Line Practice. Lawrence G.
Using the SEI Architecture Tradeoff Analysis Jones and Albert L. Soule, 2001
Method to Evaluate WIN-T: A Case Study. Paul
Clements, John Bergey, and Dave Mason,
CREDENTIALS
Testing a Software Product Line. John D. SEI certificates and certifications awarded
2005 McGregor, 2001 on the completion of qualification criteria
established by the SEI
Attribute-Driven Design (ADD), Version 2.0. A Case Study in Successful Product Line
Rob Wojcik, Felix Bachmann, Len Bass, Paul Development. Lisa Brownsword and Paul
Clements, Paulo Merson, Robert Nord, and Bill Clements, 1996 Software Architecture Certificates
Wood, 2006
Preparing for Automated Derivation of Software Architecture Professional
System Architecture Evaluation Using the Products in a Software Product Line. John D. A software professional earns the SEI
ATAM. Mike Gagliardi and Bill Wood, 2007 McGregor, 2005 Software Architecture Professional Certificate
by completing the courses Software
Quality-Attribute-Based Economic Valuation Guidelines for Developing a Product Line Architecture: Principles and Practices,
of Architectural Patterns. Ipek Ozkaya, Rick Production Plan. Gary Chastek and John D. Documenting Software Architectures,
Kazman, and Mark Klein, 2007 McGregor, 2002 Software Architecture Design and Analysis,
and Software Product Lines. This four-course
Evaluating and Improving Architecture sequence provides both the needed breadth
Competence. Len Bass, Paul Clements, Rick Predictable Assembly and depth in software architecture concepts
Kazman, and Mark Klein, 2007 and practices. Beginning with an introduction
Books to software architecture fundamentals, partici-
Progress Toward an Organic Software Building Systems from Commercial pants gain experience in effective architecture
Architecture Capability in the U.S. Army. Components. Kurt Wallnau, Scott Hissam, and documentation, design, and analysis tech-
Stephen Blanchette Jr. and John Bergey, 2007 Robert Seacord, Addison-Wesley, 2001 niques and then learn how these techniques
can be used when adopting a product line
Making Architecture Design Decisions: An Reports approach to software.
Economic Approach. Rick Kazman, Jai Asundi, Packaging Predictable Assembly with
and Mark Klein, 2002 Prediction-Enabled Component Technology. Architecture Tradeoff Analysis Method
Scott Hissam, Gabriel Moreno, Judith Stafford,
ATAM: Method for Architecture Evaluation. (ATAM) Evaluator
and Kurt Wallnau, 2001
Rick Kazman, Mark Klein, and Paul Clements, A software professional earns the SEI ATAM
2000 Evaluator Certificate by completing the
Predictable Assembly of Substation Automa-
courses Software Architecture: Principles and
tion Systems: An Experiment Report. Scott
Practices and ATAM Evaluator Training. This
Hissam, John Hudak, James Ivers, Mark
two-course sequence prepares a qualified
Klein, Magnus Larsson, Gabriel Moreno, Linda
software professional to perform SEI-autho-
Northrop, Daniel Plakosh, Judith Stafford, Kurt
rized ATAM architecture evaluations.
Wallnau, and William Wood, 2002

Software Component Certification: 10 Useful


Distinctions. Kurt Wallnau, 2004

1-888-201-4479 www.sei.cmu.edu 15
Architecture, Product Lines, and Predictable Assembly, continued

ATAM Lead Evaluator


A software professional becomes a certified
RESEARCH Product Lines
Engagements in technology
SEI ATAM Lead Evaluator by completing the Product Line Adoption Strategies
development with the SEI
courses Software Architecture: Principles The SEI seeks partners to explore effective
and Practices, Documenting Software product line adoption strategies and to apply
Architectures, Software Architecture Design Architecture SEI pattern-based adoption approaches. Also
and Analysis, ATAM Evaluator Training, and of interest are adoption strategies that exploit
ATAM Leader Training and by successfully Architecture-Based System Evolution Capability Maturity Model Integration (CMMI),
leading an ATAM architecture evaluation SEI architecture-based system evolution architecture-centric, and Six Sigma initiatives.
observed by an SEI ATAM expert. This five- methods are based on understanding the
course sequence and field exercise provide forces that drive system evolution, evaluat-
Product Line Economic Models
qualified software professionals with the tech- ing the “evolvability” of an architecture, and
The SEI is developing product line economic
nical depth and social techniques needed to managing the uncertainty associated with an
models and looking for organizations that
lead an SEI-authorized ATAM evaluation of a organization’s future business and mission
would like to pilot or contribute to their
software architecture. SEI-authorized ATAM needs and technology capabilities. The SEI
development.
Lead Evaluators must attend yearly ATAM architecture team is looking for industrial
Update Workshops to maintain their skills and collaborators to explore these areas, includ-
ing applying economic theories (such as the
Production Planning and Product
status.
theory of real options) and multi-attribute Derivation
Developing core assets is only part of the
Software Product Line Certificates analysis methods (such as conjoint analysis) to
product line equation. Products in a software
understand architecture evolution from a cost/
benefit perspective. product line are developed from the core
Software Product Line Professional
assets according to the dictates of a produc-
A software professional earns this certificate
tion plan. Product planning and product deri-
by completing the courses Software Product Connection of Architecture-Centric
vation practices are often immature, even for
Lines, Adopting Software Product Lines, and Methods with Other Software
experienced product line organizations. The
Developing Software Product Lines. This three- Technologies and Paradigms SEI is seeking industrial partners engaged
course sequence provides the needed breadth The SEI is now integrating its software archi- in product line efforts to perfect production
and depth in software product line concepts tecture methods and connecting them with
planning and product derivation approaches.
and practices to apply software product line other software development paradigms and
practices professionally. emerging technologies. The SEI architecture
team is looking for industrial collaborators to
Product Line Variability Mechanisms
Product Line Technical Probe (PLTP) pilot the integrated methods and to explore and Automated Support for Variability
the connections with existing software and To accommodate the varying features and
Team Member
system development paradigms. The SEI is quality attributes of the products in a software
A software professional earns this certificate
also looking for collaborations exploring con- product line, the core assets must have vari-
by completing the courses Software Product
nections with aspects, service-oriented archi- ability mechanisms. Choosing appropriate
Lines, Adopting Software Product Lines,
tecture, open source, model-driven architec- variability mechanisms and tracing, and auto-
Developing Software Product Lines, and
tures, J2EE, or .net. mating their use are among the most difficult
Product Line Technical Probe Team Training.
technical challenges in a product line approach.
This four-course sequence prepares a qualified
The SEI is seeking collaborators to conduct
software professional to perform SEI-autho- Experiments with ArchE
applied research on real systems in the area of
rized Product Line Technical Probes. The SEI is looking for collaborators interested
variability mechanisms.
in using ArchE to architect small- to medium-
PLTP Leader sized software systems. ArchE currently has
A software professional becomes a certified demonstrated its utility for small architectures. Connection of Software Product Lines
SEI PLTP Leader by completing all five courses The SEI team is eager to apply ArchE to larger with Other Software Technologies and
in the SEI Product Line curriculum and by scale problems. The SEI is also looking for Paradigms
successfully leading a PLTP observed by an collaborators who are interested in extending Software product lines happen in the context
experienced PLTP Leader. This five-course ArchE with new reasoning frameworks. of other software development and business
sequence and field exercise provide quali- paradigms. The SEI product line team is
fied software professionals with the technical Architecture Competence looking for industrial collaborators to explore
depth and social techniques needed to effec- The SEI is looking for collaborating organiza- and pilot software product lines in the context
tively lead SEI-authorized PLTPs. tions to investigate what it means for an orga- of any of the following: open source, aspect-
nization to have architecture competence and oriented programming, model-driven develop-
how this competence can be evaluated. ment, service-oriented architectures, global-
ization strategies, systems of systems, agile
Quality Attribute Models development, and ultra-large-scale systems.
The SEI is looking for partners to develop
and use quality attribute models in reliability,
security, scalability, usability, and testability.
Also of interest is the exploration of the rela-
tionship between quality attribute models,
business goals, and architecture and design
patterns.

16 www.sei.cmu.edu 1-888-201-4479
Predictable Assembly Ultra-Large-Scale Systems
Developing or Validating Automated ULS System Research Areas
Methods for Predicting Software The SEI seeks partners to explore some of
Quality the promising research areas and topics
Although the SEI develops novel theories for related to ULS systems. The SEI is especially
software quality, its preferred approach is interested in continuing its work in computa-
to adapt (that is, restrict) existing theories to tional mechanism design, which uses game
new settings and, in this way, leverage domain theory and economic models; in understand-
knowledge to achieve greater automation. ing the role of architecture in ULS systems;
The SEI is interested in collaboration on com- and in exploring effective human involvement
bining runtime verification (including binary in ULS systems.
sandboxing) with static program analysis
and verification (including certifying model ULS Systems Research Roadmap
checking) to obtain certifiable trust that The SEI seeks partners in completing a
software components satisfy safety, security, roadmap that details the published ULS
and resource-consumption policies. system research agenda.

Developing PECTs
A prediction-enabled component technology
(PECT) is a software manufacturing infrastruc-
ture for enforcing quality standards that lead to
predictable software systems. The SEI is inter-
ested in developing and documenting practi-
cal techniques for incrementally building and
deploying PECTs.

Developing High-Integrity
Trust Mechanisms for Software
Components
How can software components be specified,
packaged, and distributed in a way that yields
an objective basis for trust? The SEI is investi-
gating technologies such as certifying model
checking and practical variations of proof-
carrying code and seeks research collabora-
tions to develop and demonstrate these and
related technologies.

Developing Proofs of Feasibility of


Predictable Assembly
Predictable assembly seeks to achieve
predictable software quality by construction.
Achieving this goal will require significant
investment in tool infrastructure. The SEI is
interested in working with collaborators to
develop and demonstrate a staged rollout
of PECT.

1-888-201-4479 www.sei.cmu.edu 17
Process Improvement and Performance Measurement

Enabling organizations to guide the development and acquisition of products and services through
quantitatively managed processes that are repeatable, predictable, and continuously improving in
terms of cost, schedule, process performance, and product and service quality
www.sei.cmu.edu/programs/sepm

Capability Maturity Model Integration effective framework to support work groups or measurement enables organizations to char-
(CMMI) teams, motivating improved performance, and acterize their current state, how well projects
When organizations want to improve the determining critical emerging competencies are performing, and the impact their improve-
way they do business, they often focus on needed to accomplish future business plans. ment efforts produce. Most software mea-
securing the best people, methods, and surement programs fail within the first two
tools. Processes are the means for coor- Team Software Process (TSP) and years of operation, usually from organizational
dinating those resources. Improving an Personal Software Process (PSP) shortcomings: poor planning, lack of manage-
organization’s processes provides an effec- Improving organizational performance ment buy-in, and excessive data collection.
tive way to lower costs, improve quality, and requires a bottom-up as well as a top-down Measurement and analysis techniques help
deliver products and services predictably on focus. The SEI Team Software ProcessSM organizations identify problems, track their
budget and on time. Developed by a team (TSPSM) methodology is transforming cost, efforts to improve software processes, lower
with members from industry, government, schedule, and performance quality for builders costs, reduce defects, maintain schedule, and
and the SEI, the Capability Maturity Model® of software and systems. Organizations meet gather return-on-investment information.
Integration (CMMI®) approach comprises their critical business needs by delivering
best practices that organizations can use essentially defect-free software on time and International Process Research
to improve their processes. CMMI for with substantial increases in productivity. The Consortium (IPRC)
Development (CMMI-DEV) is for organiza- TSP also serves as a powerful accelerator for The International Process Research
tions that develop products or services. the CMMI approach. Through the application Consortium (IPRC) is a forum for members of
CMMI for Acquisition (CMMI-ACQ) is for of TSP, organizations have advanced their the software and systems process community
organizations that acquire products and ser- maturity in much less time than reported aver- to jointly explore tomorrow’s challenges and
vices. CMMI-DEV integrates disciplines such ages. The TSP couples with the SEI Personal leverage their knowledge and resources to
as software and systems engineering and Software ProcessSM (PSPSM) methodology to develop solutions more quickly and effec-
can dovetail with the use of other process provide a strategy and operational proce- tively. IPRC members come from around the
improvement methods, such as the SEI Team dures for using disciplined software process world to meet with experts from a variety
Software Process (TSP) methodology, the methods at team and individual levels. The of influencing disciplines. They explore the
People CMM, ISO 9000, agile methods, and PSP brings substantive changes to the perfor- process implications of emerging technologi-
Six Sigma. CMMI-ACQ integrates acquisition mance of individual engineers. Their defect- cal, societal, environmental, political, eco-
best practices from industry and government injection rates, for example, decline signifi- nomic, and business trends. The IPRC’s three
acquisition standards and experience. cantly as they progress through the process strategic goals provide long-term guidance
levels. PSP-trained engineers plan their work for the consortium’s activities: (1) to provide
People CMM based on personal data, measure their work, research leadership in response to emerging
Today’s organizations must develop and man- and use their results to continually improve. trends, (2) to generate real-world impact, and
age their human capital in an environment of (3) to have international relevance. Currently,
rapid change and increased competition. The Software Engineering Measurement IPRC members are developing cost-effective
People Capability Maturity Model (People and Analysis methods for achieving process improvement
CMM) enables organizations to develop and The SEI’s work in measurement and analysis in small settings, where organizations often
manage their workforces in a structured way provides organizations with qualitative and lack resources and expertise. On the horizon
with clearly defined work commitments and quantitative tools and techniques to measure is the development of guidance for navigating
performance objectives. Organizations expe- and analyze the results they are achieving at the multiple-standards environment, where
rience a smoother transition to CMMI when the project, process, program, and enterprise organizations must simultaneously conform to
they also use the People CMM because they levels. Used in conjunction with other SEI multiple improvement standards and regula-
focus on improving the capability and com- technologies, in particular CMMI and TSP, and tions, such as ISO, Six Sigma, CMMI, and
petencies of the organization, developing an measurement best practices, performance Sarbanes-Oxley.

18 www.sei.cmu.edu 1-888-201-4479
TOOLS & METHODS Standard CMMI Appraisal Method for Software Engineering Information
Repository (SEIR)
Solutions to the problems associated with Process Improvement (SCAMPI) The Software Engineering Information
software-intensive systems that help develop-
SCAMPI Class A Method Repository (SEIR), available at
ers and acquirers improve their practices
The Standard CMMI Appraisal Method for seir.sei.cmu.edu/seir, is a free, community-
Process Improvement (SCAMPISM) Class A based Web site that provides a forum
CMMI method is the CMMI appraisal method that for its 38,000 members to access materials
provides the most reliable and repeatable on product development and acquisition
rating results of the three SCAMPI methods. methods and technologies and to exchange
CMMI Models information concerning development and
CMMI models comprise best practices that SCAMPI Class A is the only class of SCAMPI
method that can produce ratings against the acquisition improvement activities. Registered
organizations can use to improve their pro- members exchange questions and tips and
cesses. CMMI for Development (CMMI-DEV) goals of a CMMI model.
contribute experiences and examples to help
integrates disciplines such as software and each other with their implementation efforts.
systems engineering and can dovetail with the SCAMPI Class B and C Methods
use of other improvement methods such as SCAMPI Class B and C appraisal methods are
CMMI appraisal methods that provide informa- Measurement and Analysis
the SEI’s Team Software Process (TSP) meth-
odology, the People CMM, ISO 9000, agile tion about the strengths and weaknesses of Infrastructure Diagnostic (MAID)
an organization. These methods require fewer The SEI Measurement and Analysis
practices, and Six Sigma techniques. CMMI
resources, smaller teams, and less evidence Infrastructure Diagnostic (MAID) tool can be
for Acquisition (CMMI-ACQ), which is sched-
than the SCAMPI Class A appraisal method. used by organizations to help improve the
uled to be published in November 2007, inte-
The Class B and C methods can help an organi- quality of the data generated by their measure-
grates acquisition best practices from industry
zation analyze its processes and plan a process ment and analysis activities and increase its
and government acquisition standards and
improvement approach. They do not produce a value to the organization. Based on the CMMI
experience. CMMI models can also enable
rating against the goals of a CMMI model. Measurement and Analysis process area, ISO
organizations to achieve benchmark ratings
15939, and Six Sigma methodologies, MAID
that can be used to compare one organiza-
characterizes the performance of a measure-
tion’s process capability with the capabilities People CMM ment system and identifies opportunities to
of its competitors.
People CMM improve measurement processes, data quality,
The People Capability Maturity Model (People and stakeholder satisfaction.
CMMI Modules
CMMI modules build on relevant best prac- CMM) is a collection of best practices that
tices extracted from CMMI and define effec- enables organizations to address success- CMMI Process Performance
tive and efficient practices for an area of fully their critical people issues. Based on the Improvement Using Six Sigma DMAIC
interest in a specific environment. The CMMI best current practices in fields such as human This method uses various statistical methods
Acquisition Module contains effective and resources, knowledge management, and and tools from the Six Sigma improvement
efficient acquisition practices specifically organizational development, the People CMM method called Define-Measure-Analyze-
designed for government acquisition projects. comprises the practices that organizations can Improve-Control (DMAIC) to enable dramatic
Unlike CMMI models, CMMI modules do not use to improve their processes for managing performance results. Basic DMAIC tools provide
contain information to help guide implementa- and developing their workforces. a proven, measurement-oriented approach that
tion of the best practices nor can they be used integrates well with other improvement para-
to achieve benchmark ratings. Software Engineering Measurement digms, including CMMI and TSP. This method
may be adopted during initial process improve-
and Analysis ment planning or dynamically during product
development when process issues arise.
Goal-Question-Indicator-Measure
(GQIM) Method
The SEI Goal-Question-Indicator-Measure
(GQIM) method helps organizations define
measures and indicators that are aligned with
the organization’s business processes and
support the measurement requirements of
the CMMI Measurement and Analysis process
area. GQIM also helps organizations produce
action plans for implementing the measure-
ment and analysis activities that will produce
the measures they need. The GQIM method
is used to determine success, progress, and
analysis indicators that show traceability from
an organization’s high-level business goals
down to the precise data collected, ensuring
relevance and traceability from goals to the
data collected.

1-888-201-4479 www.sei.cmu.edu 19
Process Improvement and Performance Measurement, continued

CMMI Process and Product


Development Using Six Sigma DMADV
CUSTOMER ENGAGEMENTS Introducing PSP and TSP Into an
Organization
Funded engagements to help organizations
This method implements a widespread col- To ensure a successful transition to the
meet their business and mission objectives
lection of Six Sigma process improvement Personal Software Process and Team Software
and product development tools used within a Process, organizations can receive support
popular Design for Six Sigma method known Getting Started with CMMI-Based from the SEI or an SEI Partner. Partners are
as Define-Measure-Analyze-Design-Verify Improvement licensed and carefully monitored to deliver
(DMADV). DMADV is integrated into various The SEI offers assistance to organizations that specific SEI products and services. When
product development approaches, including wish to adopt CMMI but don’t know how to introducing PSP and TSP, the SEI expert trains
some that focus on CMMI product develop- get started. all involved executives, managers, engineers,
ment-oriented process areas. Examples of and instructors. During TSP transition, the
critical methods range from innovative voice- CMMI Appraisals expert also conducts a kickoff session and
of-the-customer techniques to optimal product The SEI offers SCAMPI Class A, B, and C assists in developing a schedule, conduct-
design solutions. appraisals using a CMMI model as the refer- ing two to four pilot projects, and planning
ence model. These appraisals enable organiza- and initiating rollout. These SEI services typi-
Team Software Process tions to understand how their product develop- cally bring improved planning, higher product
ment and acquisition/outsourcing processes quality, and reduced testing and overall cycle
Team Software Process (TSP) compare to the best practices in a CMMI time to organizations who engage them.
Measurable improvement based on quanti- model.
fied data emerges when software developers
follow the SEI Team Software Process (TSP) Getting Started with People CMM- EDUCATION & TRAINING
method. Organizations repeatedly see dramatic Based Improvement Based on matured, validated, and documented
decreases in schedule and effort deviation, The SEI offers assistance to organizations that solutions to pervasive problems
defects per line of code, and overall cost after wish to adopt the People CMM but don’t know
adopting TSP tools and practices. TSP is an agile how to get started.
approach to software development that can also CMMI
be used to expedite CMMI implementation. It People CMM Appraisals CMMI Process Improvement Overview
has proven to be a practical, effective method The SEI offers SCAMPI appraisals using the This one-day course introduces executives,
for achieving the benefits of high-maturity People CMM as the reference model. These managers, and process improvement practi-
process on a greatly accelerated schedule. The appraisals enable organizations to understand tioners to the fundamental concepts of using
process begins with a four-day launch, where how their workforce management processes CMMI as the basis for a process and perfor-
the team establishes goals, defines roles, compare to the best practices in the People mance improvement program. It identifies
assesses risks, and produces a comprehensive CMM. benefits realized by organizations implement-
project plan. The team then follows a precisely
ing CMMI-based process improvement and
defined framework for managing, measur-
Performance Benchmarking describes how CMMI is used to determine an
ing, tracking, and reporting on work. Previous
training in the Personal Software Process
Consortium (PBC) organization’s process capability.
The Performance Benchmarking Consortium
method is required for team members. The suc-
(PBC) is a newly formed group of organizations Introduction to CMMI, Version 1.2
cessful TSP application to software development
working together to improve how software This three-day course introduces managers
is now being extended to security and systems
project performance data are collected and practitioners, appraisal team members,
development.
and used to drive process improvement. and engineering process group members
Consortium members represent organizations to fundamental CMMI concepts. This
Personal Software Process (PSP)
from the consulting, industry, standards, and course is available from the CMMI Partners
The skills and work habits of engineers largely
academic sectors. The near-term goals of the (www.sei.cmu.edu/partners). One day of
determine the outcome of a software develop-
consortium are to develop a software project additional training is also available for those
ment project, as consistently demonstrated
performance measurement specification and a using the CMMI for Acquisition model. This
when the SEI Personal Software Process (PSP)
repository of measures that organizations can training covers the acquisition-specific prac-
method is applied. This series of defined prac-
use to set benchmarks for their projects. PBC tices in CMMI-ACQ.
tices enables software engineers to produce
products and services include an annual per-
high-quality products on time and within budget.
formance benchmark report, special reports, CMMI Version 1.2 Upgrade Training
PSP provides the individual with an objective
guidebooks, training, and consultation support This online training provides to students who
basis for measuring progress against goals.
provided by PBC service-provider members. have taken Introduction to CMMI Version 1.1
The foundation for PSP planning and tracking
methodologies is statistics; these provide an the opportunity to understand the changes
objective means of analyzing and improving pro-
Assistance Applying Goal-Driven and improvements made in CMMI Version 1.2,
cesses so that productivity rises, while defects, Measurement, Six Sigma, and Other thereby helping them to successfully make
schedule slips, and costs decline. Specialized Measurement and Analysis Techniques the transition to Version 1.2. This upgrade is
skills, knowledge, and discipline set PSP prac- The SEI provides assistance applying Goal- required for SCAMPI Version 1.2 appraisal
titioners apart from other practitioners as they Driven Measurement, Six Sigma, and other team members who previously attended the
engage in many aspects of creating software: measurement and analysis approaches as part Introduction to CMMI, Version 1.1 course.
program development, requirements definition, of improvement efforts for product develop-
document writing, systems test, or maintenance ment and acquisition management. Support is
and enhancement of large and small software available in the form of data analysis, mentor-
systems. ing, analytical methods development, model
development, and site-specific workshops.

20 www.sei.cmu.edu 1-888-201-4479
Intermediate Concepts of CMMI Intermediate Concepts of the People Introduction to Personal Process
This five-day course introduces candidate CMM This two-day course prepares students to
SCAMPI Lead Appraisers, B and C Team This five-day course introduces individuals participate on TSP teams. The course covers
Leaders, and CMMI instructors, software (such as candidate SCAMPI with People CMM the key concepts and principles of the PSP at
and systems engineers, engineering process Lead Appraisers, candidate People CMM a high level so that students understand the
group members, and others to advanced Instructors, managers, human capital/resource terminology and the philosophy behind the
CMMI concepts, including how CMMI model individuals, and engineering process group method. Students are guided through a series
components interrelate. members) to advanced People CMM concepts, of lectures and exercises that teach the PSP
including the relationships among People CMM and prepare them to plan and track their work
CMMI Instructor Training model components. This course is useful for as part of a TSP project team.
This three-day course introduces those inter- anyone who needs an in-depth understanding
ested in becoming authorized Introduction to of the People CMM. PSP for Engineers I: Planning and PSP
CMMI course instructors to the details of the for Engineers II: Quality
CMMI models and the teaching strategies People CMMI Instructor Training This two-week course, composed of the
used by CMMI instructors. This three-day course introduces those inter- courses PSP for Engineers I: Planning and PSP
ested in becoming authorized Introduction to for Engineers II: Quality, teaches software engi-
SCAMPI Lead Appraiser Training the People CMM course instructors to details neers the principles, concepts, and benefits of
This five-day course provides training in the of the People CMM model and the teaching the PSP, a process-based approach for devel-
SCAMPI methods to those interested in strategies used by People CMM instructors. oping software. Students who complete the
becoming an authorized and certified SCAMPI course will be able to apply the PSP methods
Lead AppraiserSM for CMMI. The SCAMPI SCAMPI with People CMM Lead to their own personal work processes and par-
methods are diagnostic tools that support, Appraiser Training ticipate on a TSP team. Students learn how to
enable, and encourage an organization’s This five-day course introduces SCAMPI, a measure and analyze their personal software
commitment to process and performance diagnostic tool that supports, enables, and processes, use process data to improve
improvement. encourages an organization’s commitment to their personal performances, and apply PSP
process improvement, to those interested in methods to other structured tasks.
SCAMPI B and C Team Leader Training becoming authorized SCAMPI A with People
This four-day course provides training in the CMM Lead Appraisers. PSP Instructor Training
SCAMPI Class B and C methods to those Upon completing this five-day course, students
interested in becoming authorized SCAMPI B Team Software Process will be authorized to use the PSP course
and C Team Leaders. SCAMPI B and C are the suite to teach the courses PSP for Engineers,
CMMI appraisal methods that provide infor- Leading a Development Team Introduction to Personal Process, Managing
mation about an organization but use fewer This three-day course provides the knowledge TSP Teams, and TSP Executive Strategy
resources, smaller teams, and less evidence and skills required for successful leadership Seminar to others in their organizations. The
than the SCAMPI Class A method. in the Team Software Process: forming and PSP Instructor Training course focuses on how
maintaining a TSP team; establishing and main- to teach the PSP and put it into practice and
Understanding CMMI High Maturity taining process discipline and high standards; introduces the concepts of the Team Software
Practices managing schedule and quality; and engaging Process. Specific course objectives include
This three-and-a-half-day course provides management. When leaders apply what they understanding how to teach the PSP effectively
specific information about CMMI levels 4 and learn, their project teams see significant, mea- to others, how to grade student assignments
5—the highest levels of maturity and capability surable improvements in productivity and in and analyze resulting data, and the role of a
in CMMI. The course covers the characteristics cost and schedule predictability. Basic manage- change agent in introducing the PSP into an
of high maturity and capability and provides ment training is a prerequisite. organization.
details of the concepts and practices at levels
4 and 5. Examples are provided of how sta- TSP Executive Strategy Seminar Software Engineering Measurement
tistical methods and tools can be applied to This two-day introductory course for software and Analysis
assist in the proper implementation of level 4 executives and middle managers covers the
and 5 practices. key concepts and principles of the TSP and PSP Analyzing Project Management
from a management perspective. The purpose Indicators
People CMM of the course is to provide the foundation that This three-day course teaches project
managers need to begin to introduce and apply managers how to use measures and derived
Introduction to the People CMM the TSP in their organizations. indicators as the foundation for making
This three-day course introduces participants informed decisions. Participants learn to
to the fundamental concepts of the People TSP Launch Coach Training use indicators to plan, manage, and control
CMM, Version 2.0, a collection of best prac- This five-day course prepares students to software projects. After completing this course,
tices for attracting, motivating, and retaining a launch and coach effective TSP teams. The participants will understand how the Project
talented technical staff. course covers the key concepts and principles Planning, Project Monitoring and Control, and
of the TSP from an operational and procedural Measurement and Analysis process areas of
perspective. Students are guided through a the CMMI models work together and how
series of lectures and exercises that prepare these techniques establish a foundation for
them to facilitate the use of the TSP on actual implementing related higher maturity process
software teams. areas.

1-888-201-4479 www.sei.cmu.edu 21
Process Improvement and Performance Measurement, continued

Implementing Goal-Driven Other Process Improvement TSP Symposium


Measurement The Team Software Process enables
This two-and-a-half-day course teaches Defining Software Processes organizations to establish mature, disciplined
managers and practitioners the 10-step Goal- This three-and-a-half-day course introduces engineering practices that produce secure,
Question-Indicator-Measure (GQIM) method those involved in defining processes in an orga- reliable software. To learn about the latest devel-
based on the specific practices of the CMMI nization to useful processes, methods, and opments, TSP practitioners gather annually for
Measurement and Analysis process area. The skills for understanding, modeling, and docu- presentations and interactive learning sessions.
method identifies and defines the measures menting current processes, analyzing process Trainers, developers and users of the TSP meth-
that directly support an organization’s deficiencies, and specifying needed process odology discuss new findings, tools, lessons
business, process improvement, and project improvements. learned, and strategies to optimize practice and
goals, ensuring relevance and traceability from outcomes. Personal Software Process practitio-
their goals to the data collected. With useful Mastering Process Improvement ners also benefit from this exchange, as do
examples, real-life experiences from the field, This five-day course introduces members of engineers and managers wanting to learn about
and a class notebook filled with helpful check- process groups, people leading and facilitat- TSP successes and challenges. See
lists, templates, and reference materials, par- ing process improvement activities, and those www.sei.cmu.edu/tsp/symposium.html.
ticipants walk away with the tools necessary preparing to adopt CMMI models to a series of
to lead goal-driven software measurement effective practices for process and performance SEPG Europe Conference
processes at their own organizations. improvement. The SEPG Europe Conference is an annual
conference that focuses on the European
Implementing Goal-Driven experience, but also draws attendees from
Measurement Instructor Training
CONFERENCES across the world. Keynotes, presenters,
Events sponsored or cosponsored by the SEI exhibitors, and attendees come together to
This three-day course is for those interested
in becoming SEI-Certified Instructors of the address issues, trends, and solutions of
Implementing Goal-Driven Measurement SEPG North America Conference particular interest to the European community.
course. It teaches instructors the skills and The SEPGSM North America Conference, the See www.sei.cmu.edu/sepg.
knowledge needed to deliver the course as a premiere annual conference for software and
public and tailored on-site offering. systems process and performance manage- SEPG Australia Conference
ment, is the world’s leading conference and The SEPG Australia Conference (SEPG-AU) is
exhibit showcase for process professionals. an annual conference that focuses on Australian
Improving Process Performance Using
The conference has an international atten- experience, but also draws attendees from
Six Sigma dance that includes professionals from govern-
This five-day course takes a hands-on, tactical across the world. Keynotes, presenters, exhibi-
ments, industries, and academic institutions. It tors, and attendees come together to address
problem-solving approach to data analysis for provides a truly global perspective on process
process improvement. It provides participants issues, trends, and solutions of particular
improvement activities and performance results interest to the Australian community. The con-
with experience using a toolkit of analysis within and across projects, divisions, organi-
methods based on Six Sigma and Goal-Driven ference is sponsored by the SEI, the Software
zations, and enterprises. See www.sei.cmu. Quality Institute, and Griffith University. See
Measurement to investigate three case edu/sepg.
studies. Participants gain experience using a www.sepgaust.com.au.
statistics package to analyze data and draw
CMMI Technology Conference and User SEPG Latin America Conference
conclusions.
Group The SEPG Latin America Conference (SEPG-
This conference and user group provides an LA) is an annual conference that focuses on
Designing Products and Processes
opportunity for the users, adopters, and devel- the Latin American experience, but also draws
Using Six Sigma opers of capability maturity models and those attendees from across the world. Keynotes,
This five-day course takes a hands-on, mea- involved in internal process improvement to presenters, exhibitors, and attendees come
surement-oriented approach to product exchange ideas, concepts, and lessons learned together to address issues, trends, and solu-
development, in the context of a single case concerning models, appraisal methods, and the tions of particular interest to the Latin American
study. It provides participants with a toolkit benefits of process improvement. This event community. The conference is sponsored by the
of analysis methods including voice of the is presented under the auspices of the SEI and the European Software Institute. See
customer, simulation, reliability growth National Defense Industrial Association with www.esi.es/SEPGLA.
modeling, and logistic regression combined technical support provided by the SEI.
via best practices, such as the Design-for- See www.sei.cmu.edu/cmmi/events
Six-Sigma methodology of Define, Measure, /cmmi-techconf.
Analyze, Design, Verify (DMADV) and CMMI
High Maturity, which students apply during a
case study focusing on the development of a
new laptop computer.

22 www.sei.cmu.edu 1-888-201-4479
PUBLICATIONS Measuring the Software Process: Statistical
Process Control for Software Process
SEI-Certified Implementing Goal
Driven Measurement Instructor
Books are available from Addison-Wesley Improvement. William Florac and Anita An Instructor of the Implementing Goal-Driven
(www.awprofessional.com/seiseries) and Carleton, Addison-Wesley, 1999 Measurement (IGDM) course introduces
book retailers. SEI reports are available for free
standard practices and methods to increase
download at www.sei.cmu.edu/publications. CMMI and Six Sigma. Lynn Penn, Jeannine efficiency in ways that directly support an
Siviy, and Robert Stoddard, Addison-Wesley, organization’s business goals. Instructors lead
Books 2007 course participants in learning to identify and
Winning With Software: An Executive Strategy. define indicators and measures in the areas of
Watts Humphrey, Addison-Wesley, 2002 Reports product development, process improvement,
Performance Results of CMMI-Based Process and project management.
CMMI: Guidelines for Process Integration and Improvement. Diane L. Gibson, Dennis R.
Product Improvement, Second Edition. Goldenson, and Keith Kost, 2006 SEI-Certified TSP Coach
Mary Beth Chrissis, Mike Konrad, and Sandy
A TSP coach is an individual who possesses
Shrum, Addison-Wesley, 2006 Understanding and Leveraging a Supplier’s the knowledge, software skills, and team
CMMI Efforts: A Guidebook for Acquirers. facilitation abilities to lead software-based
CMMI Survival Guide: Just Enough Process CMMI Guidebook for Acquirers Team, 2007 product development teams. Leadership of
Improvement. Suzanne Garcia and Richard
a development team requires dedication,
Turner, Addison-Wesley, 2006 Adapting CMMI for Acquisition Organizations:
commitment, and energy to continually keep
A Preliminary Report. Kathryn M. Dodson,
CMMI SCAMPI Distilled: Appraisals for Process the team motivated, management informed,
Dr. Hubert F. Hofmann, Gowri S. Ramani, and
Improvement. Dennis Ahern, Jim Armstrong, and tasking on track. TSP coaches work with
Deborah K. Yedlin, 2006
Aaron Clouse, Jack Ferguson, Will Hayes, and team leaders to monitor a team’s progress
Kenneth Nidiffer, Addison-Wesley, 2005 using effective communication techniques.
A Process Research Framework. Eileen
The SEI-Certified TSP Coach designation
Forrester (editor), 2007
CMMI for Outsourcing. Hubert F. Hofmann, requires that candidates complete a series
Deborah K. Yedlin, John W. Mishler, and Susan of qualification steps and meet ongoing
professional development requirements to
Kushner, Addison-Wesley, 2007
CREDENTIALS maintain their certifications.
The People Capability Maturity Model: SEI certifications and certificates awarded
Guidelines for Improving the Workforce. Bill on the completion of qualification criteria
Curtis, William Hefley, and Sally Miller, Addison- established by the SEI Certificates
Wesley, 2002
SEI Certificate in CMMI
Certifications Using CMMI, organizations can improve
CMMI Assessments: Motivating Positive
their ability to develop, maintain, and acquire
Change. Marilyn Bush and Donna Dunaway, SEI-Certified SCAMPI High Maturity
quality products and services. The SEI
Addison-Wesley, 2005 Lead Appraiser Certificate in CMMI program guides change
This certification program enables SCAMPI
CMMI Distilled: A Practical Introduction to agents and managers through the funda-
Lead Appraisers to upgrade their authoriza-
Integrated Process Improvement, Second mental concepts of CMMI, the relationships
tions specifically for conducting appraisals for
Edition. Dennis Ahern, Aaron Clouse, and among CMMI model components, and the
organizations seeking to achieve CMMI levels
Richard Turner, Addison-Wesley, 2004 development of an effective process improve-
4 or 5. An SEI-Certified SCAMPI High Maturity
ment program that incorporates CMMI. Also
Lead Appraiser is responsible for applying
A Discipline for Software Engineering: covered are the IDEALSM model, a high-level
SCAMPI to determine if an organization has
The Complete PSP Book. Watts Humphrey, description of the phases of process improve-
demonstrated the capability to quantitatively
Addison-Wesley, 1995 ment. Those who complete this certificate
manage its projects to produce high-quality,
program will need only two additional courses
predictable results at CMMI levels 4 and 5.
TSP: Leading a Development Team. to earn an SEI Certificate in Personal Software
Watts Humphrey, Addison-Wesley, 2005 Process for CMMI.
SEI-Certified PSP Developer
PSP: A Self-Improvement Process for Software A PSP Developer is an individual who pos-
SEI Certificate in Personal Software
Engineers. Watts Humphrey, Addison-Wesley, sesses the knowledge and skills required
Process for CMMI
2005 to competently deliver quality software on
A high-performance software organization
predictable schedules. Candidates should
requires high-performance teams, staffed
Introduction to the Team Software Process. be able to measure and track size, time, and
with high-performance software engineers.
Watts Humphrey, Addison-Wesley, 2000 defect data; estimate and plan their work;
The PSP can enable engineers and their
and manage the quality of the products they
organizations to improve their performance.
Introduction to the Personal Software Process. produce using PSP methodologies. To earn
While CMMI provides a powerful improve-
Watts Humphrey, Addison-Wesley, 1997 this certificate, the SEI requires candidates to
ment framework that helps organizations
pass an examination based on the PSP Body
Coaching a Development Team. Watts of Knowledge. Candidates who pass the exam
Humphrey, Addison-Wesley, 2006 become SEI-Certified PSP Developers and
are required to meet ongoing professional-
development requirements to maintain their
certifications.

1-888-201-4479 www.sei.cmu.edu 23
Process Improvement and Performance Measurement, continued

understand what they need to do to improve Integrated Use of TSP and CMMI cessively builds upon early “wins.” To accel-
their processes, it does not specify how they The SEI has been working with organizations erate the introduction of best practices into
should do it. This certificate program helps that have adopted TSP and CMMI to gain their small settings, the SEI International Process
engineers learn how to implement CMMI input on mapping TSP and CMMI and identify- Research Consortium (IPRC) has launched the
using the PSP. ing how these two approaches complement Improving Processes in Small Settings (IPSS)
each other. The SEI is looking for organiza- project to develop guidance to help organiza-
SEI Certificate in Software Engineering tions interested in discovering the benefits of tions achieve the benefits of process improve-
Process Management using both TSP and CMMI and reporting their ment while working with tight resource and
This certificate program provides managers results. cost limitations.
with an overview of process improvement.
The courses in the program explore manage- TSP-Secure Process Improvement in Multi-Model
ment, metrics, and PSP and TSP approaches The SEI is interested in collaborating with Environments
to process improvement. Designed for partners on the development of TSP-Secure, Many organizations today use numerous
managers who need a variety of approaches the Team Software Process for Secure process standards and improvement method-
for managing and improving the software engi- Software Development, which augments the ologies, such as CMMI, ISO, Six Sigma, and
neering process, this certificate program helps TSP with security practices throughout the others. The SEI IPRC is seeking to initiate a
managers develop the knowledge and skills software development life cycle. The research collaborative research effort to identify new,
they need to establish a solid foundation in objectives of TSP-Secure are to reduce or elim- effective methods to balance and integrate
process and performance improvement. inate software vulnerabilities that result from multiple models and to help organizations
software design and implementation defects overcome challenges in multi-model environ-
SEI Certificate in Software Process and to provide the capability to predict the ments, such as resolving conflicts among
Improvement Implementation likelihood of latent vulnerabilities in delivered work groups dedicated to different improve-
This certificate program for those leading software. ment programs; ensuring sustainability and
change efforts within their organizations institutionalization of multiple improvement
covers several different methods for imple- Integrated Use of Six Sigma and efforts; and maintaining multiple systems of
menting change, including IDEAL, metrics, CMMI audits, assessments, and benchmarks.
TSP, and PSP. This program provides change The SEI works with organizations that have
agents, such as members and leaders of adopted CMMI and Six Sigma to identify effec- State-of-the-Practice Studies
software engineering process groups, with the tive ways to integrate these two approaches. State-of-the-practice studies are conducted to
information they need to implement quality ini- show how the community is performing its
tiatives such as CMMI in their organizations. Mapping Other Standards with CMMI work and to allow the SEI to identify changes
CMMI, IEEE, and ISO standards share a and trends that may arise in response to the
common purpose related to quality and introduction and adoption of SEI technolo-
RESEARCH process management. The SEI and IEEE are gies. The SEI publishes the results of these
Engagements in technology looking for partners to identify ways in which studies to allow organizations to compare their
development with the SEI CMMI, ISO, and other standards complement improvement efforts with those of others in
one another. the community.
Studies of CMMI’s Effect on
Performance Translating CMMI Into Other
The SEI works with CMMI user organizations Languages
to collect information about how using CMMI The SEI is working with organizations to trans-
has affected them. The SEI advises these late the CMMI Product Suite into Japanese,
organizations on how to best collect meaning- traditional Chinese, simplified Chinese, and
ful performance data, which is then analyzed German.
to determine how to best implement CMMI
best practices. Improving Processes in Small Settings
Small businesses, organizational units, and
CMMI Beyond Version 1.2 project teams pose unique challenges for
The National Defense Industrial Association process improvement. Such environments
(NDIA), the industry sponsor of CMMI with have their advantages, such as swift com-
technical support from the SEI, is soliciting munication through close social networks, a
and collecting input from experienced CMMI short chain of command, and staff flexibility.
users and practitioners around the world about But small settings have inherent problems of
the direction for CMMI future development. limited resources, prohibitive appraisal and
This effort is designed to gather input on ways vendor costs, and a lack of specialized exper-
to simplify CMMI models and on alternative, tise. Yet, early research shows that process
straightforward appraisal techniques, while improvement is not only possible in small
preserving the integrity of the CMMI Product settings but that simple process changes can
Suite. provide significant improvement if they are
started correctly and if the organization suc-

24 www.sei.cmu.edu 1-888-201-4479
Security

Helping organizations protect against, detect, and respond to


attacks on networked systems
www.cert.org

In a world in which the threat of cyber Survivable Systems Engineering Survivable Enterprise Management
attacks is contained but not eliminated and The SEI creates technologies for develop- Practices, Computer Security Incident
in which threats from unknown sources are ing and analyzing networked systems with Response Team (CSIRT) Development,
and Training
dynamic and constantly changing, the SEI respect to security and survivability. Because
defective software cannot be secure, the SEI The SEI works to enhance the transition
identifies, develops, matures, and broadly
also conducts research and development on of information-assurance knowledge to
transitions new technologies, system
computational approaches to next-generation the Internet community and to increase
development practices, and system manage-
software and security engineering, aimed at the number of qualified practitioners. In
ment practices that enhance computer and
reducing errors and vulnerabilities in systems. partnership with government and industry,
network security.
members of the staff build knowledge in
depth for defense in depth through a virtual
CERT Coordination Center (CERT/CC) Network Situational Awareness
lab training environment with certification
Founded in 1988, the CERT® Coordination The SEI supports computer security incident
for technical staff and teams. To increase
Center (CERT/CC) is the nation’s first and response teams (CSIRTs), watch-and-warning
the number of system and network adminis-
best-known computer security incident centers, and analysis groups in measuring
trators educated in the field of information
response team. Staff members provide normal and anomalous activity occurring on
assurance, staff members are developing an
technical advice and coordinate responses large networks. It also helps them assess
academic curriculum for community colleges
to major Internet security events, identify threats based on information shared by
and minority-serving institutions. Members
trends, work with others to identify security collaborators or gleaned from open or intel-
of the technical staff also work with global
solutions, advance the state of the art in ma- ligence sources. This support is achieved
enterprises, government agencies, nations,
licious code analysis, coordinate remediation through research, engineering, and relation-
and regions to create and sustain the capa-
of vulnerabilities in software products, and ship building efforts to improve the sensor
bility to manage computer security incidents
disseminate information to the Internet com- technology that provides necessary data; to
in order to improve international coordina-
munity. In 2003, the CERT/CC began a joint facilitate the sharing of data across relevant
tion and response to Internet attacks. The
effort with the U.S. Department of Homeland domains; and to derive novel approaches that
SEI is also codifying principles and practices
Security to create US-CERT, a coordination synthesize this data into actionable insight
for corporate security governance.
point in the United States for preventing, for network operators based on a rigorously
protecting against, and responding to cyber empirical foundation.
attacks across the Internet.

1-888-201-4479 www.sei.cmu.edu 25
Security, continued

TOOLS & METHODS Network Situational Awareness


(NetSA) Security Suite
CUSTOMER ENGAGEMENTS
Solutions to the problems associated with Funded engagements to help organizations
The NetSA Security Suite is a collection of
software-intensive systems that help develop- meet their business and mission objectives
open source tools that facilitate the security
ers and acquirers improve their practices
analysis of large-scale networks using flow
data. The suite of tools includes a probe Clustered-Computing Analysis
CERT Knowledgebase (Yet Another Flow Sensor [YAF]) to generate Platform (C-CAP)
The CERT Knowledgebase (www.cert.org/kb and aggregate the flows (NetSA Aggregated The CERT Clustered-Computing Analysis
/index.html/) contains structured information Flow [NAF]); a storage and retrieval infra- Platform (C-CAP) is a state-of-the-art foren-
on vulnerabilities and malicious code. Parts of structure to house and analyze the flows sics analysis environment that allows for a
the knowledgebase are publicly available to (System for Internet Level Knowledge [SiLK]); complete suite of tools for host-based and
help system and network administrators and and a number of additional analytical tools network investigations. The environment
other technology professionals protect and (Retrospective Analysis and Visualization maximizes the application of specialized com-
defend their systems from intruders. These Engine [RAVE]) to process the data and related puting resources to the forensic and incident
parts include the vulnerability catalog, which contextual data sources (IPA, IP Address response missions. Analysts and investiga-
includes descriptions of vulnerabilities, their Association library). This suite supports the tors enjoy flexible, secure access to high-per-
impacts, and remediation information. Users network security analyst with incident inves- formance systems, increasing productivity
can search or browse the database by vulner- tigation as well as trending. The approaches and enabling distributed collaboration. C-CAP
ability name or ID number, common vulner- are ideally suited for analyzing traffic on the combines scalable resources, a collaborative
abilities and exposures (CVE) number, date backbone or border of a large, distributed environment, centralized management, and
that the vulnerability became public, date that enterprise or mid-sized Internet service augmented capabilities to address a variety of
the database was updated, or severity. Other provider. needs.
parts of the knowledgebase are available on a
restricted access basis to critical-infrastructure Survivable Systems Analysis (SSA) Establishing an Incident Response
operators, CSIRTs with national responsibility, Survivable Systems Analysis (SSA) is a practi- Capability
malicious-code analysts, and others. cal engineering process that permits system- The SEI helps organizations establish CSIRTs
atic assessment of the survivability properties through a variety of training products, best
e-RA of proposed systems, existing systems, and practices, and tools that can be used to
e-RA is a technique developed for the General modifications to existing systems. The analysis evaluate the effectiveness of the CSIRT.
Services Administration’s Office of Electronic is carried out at the architecture level as a
Government by an SEI team. It enables orga- cooperative project by an SEI team working Evaluating or Benchmarking Incident
nizations to analyze their own authentication with a team of system architects, develop- Management Capabilities
risks and requirements for their Internet sites ers, and stakeholders. The method proceeds The SEI uses the SEI Incident Management
without having to call in authentication experts. through a series of joint working sessions, Capability Evaluation (IMCE) to assist organiza-
It is used to elicit requirements for authentica- culminating in a briefing on findings and tions in benchmarking their incident manage-
tion of transaction-based systems based on recommendations. ment practices for protecting, detecting, and
the risks to those systems and to users. The
responding to computer security incidents
purpose of e-RA is to guide the selection of Vendor Risk Assessment and Threat and events. The SEI defines incident manage-
an appropriate level of authentication that will
Evaluation (V-RATE) ment as the end-to-end processes involved in
enable the system to resist threats to data,
Commercial off-the-shelf (COTS) components providing a set of services considered essen-
users, and organizations that could result from
are being integrated into critical systems tial to protecting, defending, and sustaining
unauthorized system transactions. The tech-
where failures can lead to severe conse- an organization’s computing environment,
nique can be performed using a Microsoft
quences. Yet with little access to the code or as well as conducting appropriate response
Access-based tool that is available online at
its development process, the security and actions. These incident management practices
www.cio.gov/eauthentication/era.htm.
survivability of these components is difficult or functions may be performed by a CSIRT, a
to analyze. The CERT Vendor Risk Assessment managed security service provider, or other
Security Quality Requirements and Threat Evaluation (V-RATE) assesses designated security groups or individuals
Engineering (SQUARE) vendor capabilities as a strong indicator of within the organization.
Security Quality Requirements Engineering product quality. The process is based on tax-
(SQUARE) is a nine-step method for eliciting, onomies of vendor risks and the acquiring Implementing Tools and Methods for
categorizing, and prioritizing security require- organization’s risk-management skills. Survivable Systems
ments for information technology systems and
The SEI helps organizations implement tools
applications. It is performed by requirements Operationally Critical Threat, Asset, and methods for improving the survivability
engineers with security expertise and project
and Vulnerability Evaluation (OCTAVE) of networked systems, including OCTAVE,
stakeholders. SQUARE guides the use of
The SEI Operationally Critical Threat, Asset, V-RATE, Security Quality Requirements
software requirements engineering practices
and Vulnerability EvaluationSM (OCTAVE®) and Engineering (SQUARE), and flow-service
to specify security requirements and helps
OCTAVE Allegro methods are self-directed, quality (FSQ).
ensure that security requirements are included
risk-based, strategic assessment and planning
in system design and that security goals
techniques for security. In using OCTAVE, a
support business goals.
small team of people from the operational (or
business) units and the information technol-
ogy department work together to address the
security needs of an organization.

26 www.sei.cmu.edu 1-888-201-4479
Virtual Network Audit CERT Resiliency Engineering Creating a Computer Security Incident
The CERT Virtual Network Audit (VNA) is a Framework (CERT REF) Assessment Response Team
scenario-based testbed for training person- The CERT Resiliency Engineering Framework This one-day course is designed for managers
nel to perform information-assurance audits. (CERT REF) Assessment evaluates an orga- and project leaders who have been tasked
VNA simulates a functioning network offering nization’s capability for managing operational with implementing a CSIRT. This course
internal services and an external Internet resiliency activities (security, business con- provides a high-level overview of the key
(Web, email) presence, and it includes a real- tinuity, and IT operations). The assessment issues and decisions that must be addressed
istic scenario describing the purpose, location, results are useful for planning and prioritizing in establishing a CSIRT. As part of the course,
and topology of the network and profiles of resiliency improvement activities, optimiz- attendees develop an action plan that can be
administrative personnel. The network and ing investments in resiliency activities, and used as a starting point in planning and imple-
scenario contain a number of vulnerabilities validating organizational competencies. The menting their CSIRTs.
or failures. Auditors must discover weak- assessment is conducted in three segments,
nesses and risks and develop a plan to bring during which a team of experts from CERT Fundamentals of Incident Handling
the network into compliance with commonly (a) help the organization set and prioritize its This five-day course is for CSIRT technical
accepted best practices. VNA can be custom- objectives for operational resiliency compe- personnel with little or no incident-handling
ized in a number of ways and can be tailored tencies, (b) evaluate the organization’s current experience. It provides a basic introduction to
to specific scenarios. resiliency processes against the objectives in the main incident-handling tasks and critical-
the context of the framework, and (c) help the thinking skills that will help incident handlers
Virtual Training Environment (VTE) organization develop and prioritize improve- perform their jobs. This course is recom-
The CERT Virtual Training Environment (VTE) ment strategies based on the results of the mended for those new to incident handling.
(www.vte.cert.org) is a Web-based knowl- evaluation.
edge library of best practices in information Information Security for Network
assurance and computer forensics. VTE uses Managers
a rich media interface that includes nearly EDUCATION & TRAINING This two-day course is designed to give infor-
500 hours of recorded video of instructor-led Available from the SEI and licensed SEI mation technology (IT) and network managers
training, captured demonstrations, and hands- Partners, based on matured, validated, and the practical knowledge required to ensure
on training labs on topics such as network- documented solutions to pervasive problems the security of their information assets. The
access controls, intrusion detection, building course begins by addressing the concepts
a forensic toolkit, and more. VTE is targeted of information security, survivability, and risk
at system administrators and first respond- Advanced Incident Handling for
management, including the layered approach
ers to computer security incidents. Basic VTE Technical Staff
to survivability and the elements of risk
content is available to the public. CERT also This five-day course, designed for CSIRT
analysis and assessment. The course also
offers distance learning courses through VTE. technical personnel with several months
focuses on the IT manager’s role in increas-
Organizations interested in these services can of incident-handling experience, addresses
ing an organization’s security, from policy
contact vte-support@cert.org to learn more. commonly used and emerging attacks that
definition to business continuity and disaster-
are targeted against a variety of operating
recovery planning.
systems and architectures.
Establishing and Improving
Information Security Management Information Security for Technical Staff
Advanced Information Security for
Programs and Practices This five-day course is designed to provide
CERT helps organizations improve their Technical Staff
participants with practical techniques for pro-
information security programs through the This five-day course is designed to increase
tecting the security of an organization’s infor-
development and assessment of strategic the depth of knowledge and skills of technical
mation assets and resources. Security issues,
plans, program structure, measurements and staff charged with administering and securing
technologies, and recommended practices are
metrics, risk and security management prac- information systems and networks. Developed
addressed at increasing layers of complexity,
tices, and standards adoption. around a scenario in which a production
beginning with concepts and proceeding to
network has failed an information-security
technical implementations.
audit, students implement numerous techni-
Evaluations, Assessments, and
cal security solutions to bring the network into
Reviews compliance. Managing Computer Security Incident
CERT develops, conducts, and transitions Response Teams
information security assessment and evalu- This three-day course provides current and
Computer Forensics for Technical Staff
ation methods and techniques that provide future managers of CSIRTs with a pragmatic
This three-day course comprises three com-
organizations with practical guidance for iden- view of the issues they will face in operating
ponents: lecture, student labs, and team sce-
tifying, mitigating, and managing risks to their an effective incident response team.
narios. It is designed for technical staff who
organizations and networked systems.
administer and secure information systems
and networks. This course provides partici- OCTAVE Training Workshop
Evaluating Environments for pants with a fundamental understanding of This three-day workshop is designed to
Infrastructure Protection Preparedness the computer forensics process and develops help individuals and analysis teams lead and
The SEI conducts reviews of developing and first responders’ basic forensic practices. perform information security risk evaluations
operational information infrastructures, includ- such as the OCTAVE and OCTAVE Allegro
ing critical information infrastructures, to methods.
identify significant threats and vulnerabilities
and ensure resiliency of operations under
stress, attack, and contingency scenarios.

1-888-201-4479 www.sei.cmu.edu 27
Security, continued

CERT Resiliency Engineering Executive problems of computer owners, service provid- Managing Information Security Risks: The
Workshop ers, networking communities, and companies, OCTAVE Approach. Christopher Alberts and
This half-day workshop introduces partici- the conference is held in different parts of the Audrey Dorofee, Addison-Wesley, 2002
pants to the CERT Resiliency Engineering world each year. Presentations include the
Framework (REF), including key underlying latest information about incident response and The CERT Guide to System and Network
concepts, and guides participants in develop- prevention, vulnerability analysis, and related Security Practices. Julia Allen, Addison-
ing a high-level strategy for using the frame- aspects of computer security. Wesley, 2001
work to improve their organizations. Through
lectures, class exercises, and discussions, the Collaboration Meeting for CSIRTs with Reports
workshop covers current trends in security National Responsibility Comparing Insider IT Sabotage and Espionage:
and business continuity, the concept of opera- The CERT Coordination Center hosts an A Model-Based Analysis. Stephen R. Band,
tional resilience, key process improvement annual meeting of CSIRTs with national Dawn M. Cappelli, Lynn F. Fischer, Andrew P.
principles, and the REF. responsibility. This meeting fosters collabora- Moore, Eric D. Shaw, Randall F. Trzeciak, 2006
tion on joint projects and examines the chal-
Foundation for Resiliency lenges and projects unique to national CSIRTs. Introducing OCTAVE Allegro: Improving
This two-day course provides current and the Information Security Risk Assessment
future operational risk managers with founda- Process. Richard A. Caralli, James. F. Stevens,
International Workshop on
tional skills and knowledge of how security, Lisa R. Young, William R. Wilson, 2007
Requirements for High-Assurance
business continuity, and IT operations con- Systems (RHAS) Introducing the CERT Resiliency Engineering
tribute to operational resiliency. It frames the Held in conjunction with the IEEE International Framework: Improving the Security and
management of security and business conti- Requirements Engineering Conference, this Sustainability Processes. Richard A. Caralli,
nuity in the context of the business objectives workshop brings together researchers and James. F. Stevens, Charles M. Wallen, David
and organizational mission. practitioners from the fields of secure comput- W. White, William R. Wilson, Lisa R. Young,
ing and software requirements to exchange 2007
Survivability and Information ideas and experiences.
Assurance (SIA) Curriculum Botnets as a Vehicle for Online Crime. Nicholas
Today’s organizations rely on networked Software Engineering for High- Ianelli, Ross Kinder, Christian Roylo, 2005
systems powered by fast-changing technology. Assurance Systems (SEHAS)
This reliance makes them more vulnerable The Impact of Function Extraction Technology
Workshop
to attacks and forces system administrators on Next-Generation Software Engineering.
Held in conjunction with the International
to seek new approaches to computer and Alan R. Hevner, Richard C. Linger, Rosann W.
Conference on Software Engineering (ICSE),
network security. To help them, CERT has Collins, Mark G. Pleszkoch, Stacy J. Prowell,
this workshop provides a forum for research-
developed a downloadable, three-part, 46- Gwendolyn H. Walton, July 2005
ers and practitioners to exchange ideas and
module curriculum with companion labs in
experiences relevant to the development of
survivability and information assurance (SIA). Security Quality Requirements Engineering
high-assurance software systems.
The curriculum offers a problem-solving meth- (SQUARE) Methodology. Nancy R. Mead, Eric
odology built on key SIA principles that are D. Hough, Theodore R. Stehney II, 2005
System-Dynamics Modeling for
independent of specific technologies. It is
available free of charge to the general public Information Security Workshop Trustworthy Refinement Through Intrusion-
and registered instructors. Qualifying regis- The objectives of this workshop are to develop Aware Design. Robert J. Ellison, Andrew P.
tered instructors have access to the curricu- a preliminary system-dynamics model of Moore, 2003
lum’s companion instructor materials as well important aspects of the information security
as the student materials. problem from both insider and outsider per- Tracking and Tracing Cyber-Attacks: Technical
spectives using a group modeling approach; Challenges and Global Policy Issues. Howard F.
to identify additional data on these aspects Lipson, 2002
CONFERENCES that are unknown or unavailable, but are
needed for future progress on this problem; Handbook for Computer Security Incident
Events sponsored or cosponsored by the SEI and to investigate possible collaborations for Response Teams (CSIRTs). Moira J.
longer term work to propose to prospective West-Brown, Don Stikvoort, Klaus-Peter
FloCon Analysis Workshop sponsors. Kossakowski, Georgia Killcrece, Robin Ruefle,
The Flocon® Analysis Workshop is an open Mark Zajicek, 2003
conference that provides a forum for research-
ers, operational analysts, network operators, PUBLICATIONS Incident Management Capability Metrics.
and vendors interested in security-relevant Books are available from Addison-Wesley
Audrey Dorofee, Georgia Killcrece, Robin
traffic analysis of flow data. Attendees submit (www.awprofessional.com/seiseries) and
Ruefle, Mark Zajicek, 2007
papers on topics related to the development book retailers. SEI reports are available for free
or provisioning of such infrastructures or the State of the Practice of Computer Security
download at www.sei.cmu.edu/publications.
analysis of their corresponding data sets. Incident Response Teams (CSIRTs). Georgia
Killcrece, Klaus-Peter Kossakowski, Robin
Books Ruefle, Mark Zajicek, 2003
Forum of Incident Response and Secure Coding in C and C++. Robert Seacord,
Security Teams (FIRST) Conference Addison-Wesley, 2005 Detecting Scans at the ISP Level.
This conference focuses on the field of Carrie Gates, Josh McNutt, Joseph B. Kadane,
computer security incident handling and Internet Denial of Service: Attack and Defense Marc Kellner, 2006
response. In recognition of the global spread Mechanisms. Sven Dietrich with J. Mirkovic,
of computer networks and the common D. Dittrich, and P. Reiher, Prentice Hall, 2004

28 www.sei.cmu.edu 1-888-201-4479
CREDENTIALS RESEARCH Flow-Service-Quality (FSQ)
Engineering
SEI certificates and certifications awarded Engagements in technology development
Flow-service-quality (FSQ) engineering
on the completion of qualification criteria with the SEI
provides foundations for mastering complex-
established by the SEI
ity and addressing survivability in analysis and
Computational Security Attributes development of large-scale, network-centric
Certifications (CSA) systems. The FSQ project is defining rigorous
Security analysis of software today is a engineering methods for complex network
CERT-Certified Computer Security labor-intensive process requiring substantial systems characterized by shifting boundaries
Incident Handler Certification expertise that often results in subjective, one- and users, uncertain COTS software function
Organizations need individuals who can time evaluations of limited use in ongoing and quality, extensive asynchronous opera-
lead computer security incident response system operation. The Computational Security tions, unpredictable failures and compromises,
teams (CSIRTs). In response to this demand, Attributes (CSA) project has developed theo- and lack of visibility and control.
CERT has introduced a program designed to retical foundations and automatable engineer-
train and certify computer security incident ing methods for fast and precise computation Function Extraction (FX)
handlers. This program is designed for working of security properties, such as authentication, In today’s state of practice, programmers
incident handlers, CSIRT managers, system authorization, and non-repudiation, during lack practical means to determine the full
and network administrators with incident- system development and operation. The functional behavior of software in all circum-
handling experience, incident handling project defines security properties in terms stances of use. This longstanding gap in engi-
trainers, and those who have some techni- of required functional behavior that can be neering capabilities lies at the heart of many
cal training and intend to enter the incident- computed with function extraction technology. problems in software security and quality.
handling field. CERT STAR*Lab is developing function extrac-
Corporate Governance: Governing for tion (FX) theory and engineering automation to
Certificates Enterprise Security compute the behavior of software with math-
The SEI defines governing for enterprise ematical precision to the maximum extent
SEI Certificate in Information Security security as “directing and controlling an orga- possible. A first FX system is under devel-
This certificate program is designed to provide nization to establish and sustain a culture of opment to compute behavior for programs
participants with practical techniques for pro- security in the organization’s conduct (beliefs, written in or compiled into Intel assembly
tecting the security of an organization’s infor- behaviors, capabilities, and actions).” This work language. FX technology is a new approach to
mation assets and resources and increasing builds on and expands commonly described human understanding of software, as well as
the depth of knowledge and skills of technical forms of governance, including corporate gov- to malware detection and analysis, software
staff charged with administering and securing ernance, enterprise governance, and informa- development and testing, correctness veri-
information systems and networks. Security tion technology governance. The SEI helps fication, and component composition at the
issues, technologies, and recommended prac- senior executives and managers expand their system level.
tices are addressed at increasing layers of governance perspectives to include security,
complexity, beginning with concepts and pro- incorporating enterprisewide security thinking Insider Threat Studies
ceeding to technical implementations. into their and their organizations’ day-to-day The SEI has been conducting insider threat
governance actions. The SEI is building col- research for several years based on analysis
SEI Certificate in Incident Response laboration relationships with organizations of law-enforcement cases and supplemental
Process working in the governance domain (such as interviews for each case with the investiga-
This certificate program is for CSIRT techni- the Institute of Internal Auditors) and seeks tor, prosecutor, victim organization, and/or the
cal personnel. The first course in the certifi- partners who are addressing enterprise insider. Future analysis will focus on malicious
cate provides a basic introduction to the main security as part of their corporate governance insider activity that was addressed internally
incident-handling tasks and critical-thinking strategy. by the victim organization without the involve-
skills that will help incident handlers perform ment of law enforcement. The SEI is inter-
their jobs. The second course addresses Malicious Code Analysis Tools and ested in working with organizations willing to
commonly used and emerging attacks that Techniques share data and experiences on insider threat
are targeted against a variety of operating As a thought leader in the field of Internet activity and to collaborate in the collection and
systems and architectures. Ultimately, this security, the CERT/CC not only provides dissemination of guidance.
certificate is designed to provide insight into technical information to system and network
the type and nature of work incident handlers administrators and technology professionals to International Watch and Warning
may perform. It will provide an overview of help them better defend their networks, it also Network
the incident-handling arena, including CSIRT develops tools and methods to better identify, The CERT Coordination Center is collaborat-
services, intruder threats, the nature of analyze, catalog, and manage vulnerability ing with Asia-Pacific Economic Cooperation
incident-response activities, and the steps information and malicious code. It transitions (APEC), the Organization of American States
incident handlers can take in response to these tools and methods to the DoD, intel- (OAS), and many individual countries to build
system compromises at the privileged level. ligence community, law enforcement, reverse a worldwide network of CSIRTs with national
engineers, CSIRTs with national responsibil- responsibility to share information about inci-
ity, and software vendors to help improve the dents, vulnerabilities, malicious code, and
effectiveness of response teams and to help threats.
vendors mitigate vulnerabilities in the software
they produce.

1-888-201-4479 www.sei.cmu.edu 29
Security, continued

Levels of Anonymity and Traceability Resiliency Engineering Framework Future activity will include the development
(LEVANT) Resiliency engineering is an emerging area of of models, reports, training, and tools to raise
The CERT research team is conducting applied research focused on helping organi- awareness of the risk to an organization’s
research to improve the current technical capa- zations integrate, improve, and mature their critical assets and to assist the community
bility to track and trace sophisticated Internet- security, business continuity, and IT operations in understanding the factors influencing an
based attacks through the CERT Levels of activities. The CERT Resiliency Engineering insider’s decision to act, indicators and pre-
Anonymity and Traceability (LEVANT) project. Framework (REF) is the cornerstone artifact cursors of impending malicious actions, and
of this research. REF codifies an integrated countermeasures for mitigation, with the goal
Network Situational Awareness approach to protecting and sustaining critical of improving the survivability and resiliency of
CERT is looking for partners to pilot tools and business operations combined with a process the enterprise. The SEI is interested in working
techniques to understand large-scale network improvement approach to maturing enterprise with organizations in the following areas:
activity. The goal is to identify malicious competency in resiliency engineering. developing and applying insider threat risk
activity that is too subtle to detect with tradi- diagnostics, piloting innovative threat preven-
tional intrusion-detection methods. The framework provides guidelines for tion and mitigation training materials, sharing
managing security and business continuity data and experiences on threat activities, and
across the enterprise, in concert with and collaborating in the collection and dissemina-
Security Quality Requirements
in support of an organization’s mission and tion of guidance.
Engineering (SQUARE) strategy. Elevating these activities to an enter-
The SQUARE project team is installing
prise level and focusing on process enables
SQUARE at an industry location and is working
organizations to integrate, manage, bench-
on further development of the SQUARE proto-
mark, measure, and improve them over time.
type tool. In addition, the team has developed
SQUARE educational and training materials The first complete outline of the framework
and is conducting a more detailed study of was published in 2007 at www.cert.org
the technical aspects of SQUARE. The team /archive/pdf/07tr009.pdf, and REF-based
is also performing industry case studies to assessments and training are now available.
determine whether SQUARE-Lite, a stream- Research continues to expand the framework
lined version of SQUARE that can be used and to develop a suite of tools, techniques,
to supplement an existing requirements training, and methods to support organizations
engineering process, is feasible. in using the framework. Collaborating
organizations are sought to participate
The SEI is seeking organizations in govern-
in the research and assist in developing
ment, academia, and industry to participate in
the REF product suite. Please see
pilots and reviews of SQUARE practices and
www.cert.org/resiliency_engineering
processes.
for more information about CERT REF.

Threat Analysis and Modeling


STAR*Lab: Security Technology CERT has been conducting insider threat
Automation and Research research since 2001 based on analysis of law-
CERT has established the STAR*Lab software enforcement cases and supplemental inter-
development laboratory, whose mission is to views of each case with the investigator, pros-
develop theory-based automated solutions to ecutor, victim organization, and/or the insider.
challenge problems in security engineering. Building on the insider threat studies, the SEI
Challenge problems are intractable barriers is researching technical threat areas, including
to progress whose solutions can have major insider IT sabotage, fraud, and theft of sensi-
impact on engineering capabilities. STAR*Lab tive or confidential information; espionage;
applies three principles—theory first, proof- potential threats to our nation’s critical infra-
by-automation, and scale-up for practical appli- structure; and other electronic crimes.
cation—in developing engineering tools to
address security problems.

30 www.sei.cmu.edu 1-888-201-4479
Interoperability, Dependability, and Mission Success

Enabling organizations to achieve system-of-systems interoperability, to


predict embedded system performance, and to make large, networked
systems more dependable and successful
www.sei.cmu.edu/programs/ds

Today’s complex, geographically distributed Performance and Dependability Mission Success


systems require the interoperation of multi- The development of large, networked soft- In today’s business environment, multiple
ple systems. Such a system of systems must ware systems is complicated by inadequate organizations routinely combine resources
evolve while it continues to deliver optimal notations and tools for specifying, modeling, in pursuit of a single objective, resulting in
performance and dependability. This includes and predicting system performance and programmatic, process, and technological
systems in which timing is critical and heavy dependability. The SEI is creating, evaluat- complexity that can be difficult to manage
load is the norm. At the same time, we can- ing, and maturing technology to address effectively. Achieving mission success in
not lose sight of the engineering challenges these engineering problems by helping to these complex settings poses a challenge for
in developing embedded systems. ensure that software and systems engineers most organizations. The SEI is developing a
routinely develop embedded and real-time suite of risk-based assessment and manage-
Interoperability systems that predictably meet or exceed ment methods that help managers establish
The SEI identifies, matures, and transitions their performance and dependability require- and maintain confidence in mission success
software engineering methods and tech- ments. The SEI goal is to enable the use of throughout the life cycle and across the
niques that enable organizations to integrate tool-supported analyses that detect common supply chain. These methods are designed to
components, systems, and systems of but subtle performance and dependability help managers evaluate success in relation
systems. The SEI investigates the software pitfalls, so that performance anomalies and to a mission’s objectives and chart a course
implications of the vision of network-centric undesired operational behaviors rarely occur for improvement.
operations, provides guidance on the selec- during system integration, deployment,
tion and use of technologies and methods to operational use, and evolution.
field and sustain interoperable systems, and
seeks solutions to organizational interoper-
ability problems.

1-888-201-4479 www.sei.cmu.edu 31
Interoperability, Dependability, and Mission Success, continued

TOOLS & METHODS Evolutionary Process for Integrating


COTS-Based Systems (EPIC)
Performance and Dependability
Solutions to the problems associated with
software-intensive systems that help develop-
The SEI Evolutionary Process for Integrating System Architecture Modeling and
COTS-Based SystemsSM (EPICSM) methodol- Analysis
ers and acquirers improve their practices
ogy enables an organization simultaneously Model-based engineering (MBE) reduces risk
to consider factors from the four spheres by predicting the runtime behaviors of the
Interoperability that must be orchestrated to achieve a COTS- customer’s system through early and repeated
based system solution: stakeholder needs and analysis of the architecture at different refine-
System-of-Systems Navigator business processes, the product marketplace, ment levels. As a result, MBE cuts costs by
Product Suite system architecture and design, and program- preventing many system integration problems
A system-of-systems (SoS) environment will matic (budget and schedule) and risk consider- and simplifying life-cycle support. The SEI uses
consist of many constituents and relation- ations. For more information, see MBE tools and methods to analyze a custom-
ships—some technical, some organizational. www.sei.cmu.edu/publications er’s system architecture for
The SEI SoS NavigatorSM helps customers /documents/02.reports/02tr005.html and
understand the interoperation and cooperation • security, including intrusion, integrity, and
www.sei.cmu.edu/publications
necessary in a system of systems and define confidentiality analysis
/documents/02.reports/02tr009.html.
the critical relationships between the constitu- • resource consumption, such as bandwidth,
ents and their environment. The SoS Navigator COTS Usage Risk Evaluation (CURE) CPU time, and power consumption
• analyzes the interoperability situation The SEI COTS Usage Risk Evaluation SM
• real-time performance, including execu-
(CURESM) method helps organizations avoid tion time/deadline, deadlock/starvation, and
• identifies the deficiencies and risks to achiev-
common mistakes when acquiring systems latency
ing the interoperability goals
that employ COTS components. CURE is
• identifies and prioritizes mitigations • availability and reliability, such as mean time
ideally conducted during the early stages of
between failures (MTBF), failure modes and
• plans the needed improvements based on a program, when the major decisions relating
effects analysis (FMEA), and hazard analysis
the mitigations to use of COTS products have not yet been
made. CURE involves site visits and structured
• guides the organizations involved in adopting
question-and-answer sessions with personnel The SEI leads the technical development of
the planned improvements the Architecture Analysis & Design Language
from the program office and the contractor
For more information, see for COTS-based acquisitions. CURE materials (AADL), a Society of Automotive Engineers
www.sei.cmu.edu/isis/navigator.html. are now freely available through the SEI Web (SAE) international industry standard. The
site at www.sei.cmu.edu/cbs/cure AADL is an architecture description language
/cureprod.html. that supports the model-based engineering of
Service Migration and Reuse
embedded and real-time systems. It has been
Technique (SMART) used in domains such as avionics, aerospace,
The SEI Service Migration and Reuse COTS Product Evaluation Method
System developers are often challenged when automotive, and autonomous systems.
Technique (SMART) methodology helps
organizations analyze a legacy system to faced with making decisions about the incor-
poration of COTS products in their systems. AADL models have a precise non-ambiguous
determine whether its functionality can be semantics, are machine processable, and facil-
exposed as services as part of a service- An important first step is to systematically
evaluate candidate COTS products. The SEI itate objective human interpretation.
oriented architecture (SOA). During the
process, the SMART team establishes has developed the PECA method, which
The SEI has developed an extensible tool
the needs of the legacy system’s stakehold- stands for the leading letters of the main
environment, OSATE (Open Source AADL Tool
ers; describes the existing capability of steps:
Environment), featuring methods and tech-
the system; describes the target SOA, • plan the evaluation niques that analyze AADL models. OSATE,
potential services, and how they will • establish the criteria made available under an open source, no-fee
interact; analyzes the gap between the license agreement, is based on the Eclipse
current and future states and the effort • collect the data
environment. More information about the SEI
and cost required to close the gap; and • analyze the data approach to MBE is available at
develops a migration strategy, detailed www.sei.cmu.edu/pcs/model.html and
in a final presentation. For more information, This method is tailorable to fit with an organi- www.sei.cmu.edu/pcs/aadl.html.
see www.sei.cmu.edu/publications zation's needs. More information is available
/documents/05.reports/05tn029.html. at www.sei.cmu.edu/publications
/documents/03.reports/03tr017.html.

32 www.sei.cmu.edu 1-888-201-4479
Mission Success SOA Governance For predicting and validating non-functional
SOA governance provides a set of policies, properties using MBE, the SEI supports
Mission Diagnostic rules, and enforcement mechanisms for • evaluating fault-tolerance of architectures
The SEI Mission Diagnostic provides a time- developing, using, and evolving SOA assets (e.g., determining reliability and availability,
efficient means of determining a mission’s and for analysis of their business value. In analyzing impact of fault propagation, and
potential for success based on an evaluation this workshop, the SEI team facilitates a identifying root causes of faults)
of current conditions. First, a set of key indi- session to help the customer organization
develop a set of appropriate SOA governance • adopting analytical resource models to
cators is evaluated to estimate a mission’s
policies, procedures, and practices. The SOA validate performance behavior (e.g., latency,
current potential for success relative to a
Governance workshop is a natural comple- schedulability, timeliness), power consump-
predefined benchmark of success. Decision-
ment to the session on SOA Strategy. tion, and network bandwidth usage
makers can then determine if the current
potential for success is acceptable or if actions • deploying security models (e.g., Bell-
are required to improve the situation. The T-Check Technology Investigations LaPadula, multi-level security [MLS]) and
Mission Diagnostic can be conducted at stra- An SEI T-CheckSM investigation provides a security architectures (e.g., multiple indepen-
tegic points throughout a mission’s life cycle sanity check on the claims made about a tech- dent levels of security [MILS]) to ensure that
and can be applied to programs, operational nology. A T-Check examination is ruthlessly access to resources is not compromised
processes, and technologies. More informa- efficient and provides insight into technolo- • conducting differential architecture analysis
tion on the Mission Diagnostic and mission gies without requiring a large investment. to discover defects and guide localized archi-
success is available from the SEI Web site at T-Check investigations are especially useful, tectural change
www.sei.cmu.edu/msce. for example, to check the claims made about
• validating data quality requirements such as
technologies for an SOA environment, where
many of the technologies and standards are temporal correctness, accuracy/precision,
Mission Assurance Analysis Protocol
still maturing. and confidence
(MAAP)
The SEI Mission Assurance Analysis Protocol
(MAAP) is a comprehensive analysis protocol Performance and Dependability EPIC Implementation
After delivering a two-day tutorial in the
that is used to examine in-depth the factors
EPIC methodology, the SEI helps organiza-
affecting a mission’s potential for success Analysis-Based Assurance tions incorporate EPIC principles into current
and create strategies to ensure that mission The application of assurance cases as a
COTS-based systems processes. The SEI also
priorities are successfully achieved. Upon means of demonstrating critical dependability
provides coaching in the successful execution
completion, an operational model, customized attributes is an emerging practice. Assurance
of the COTS-based systems process using
analysis artifacts, a measure of the mission’s cases are reviewable artifacts showing why
EPIC.
potential for success, and strategies for increased confidence in the safety, security,
improvement are produced. MAAP can be or reliability of a system is justified. They typi-
used to assess programs and operational pro- cally integrate test-based results with various
COTS Software Product Evaluation
cesses at strategic points in the mission life The SEI helps organizations apply its evalua-
analyses performed during the development
cycle. More information on MAAP and mission tion process to the selection of one or more
of a system.
success is available from the SEI Web site at COTS products for a specific system.
www.sei.cmu.edu/msce/index.html. The SEI helps organizations develop assur-
ance cases, assurance case management CURE Transition
plans, and relevant assurance case patterns. The SEI provides training and coaching to help
CUSTOMER ENGAGEMENTS The SEI institutes an assurance case approach organizations master the CURE method and
become self-sufficient in its delivery.
Funded engagements to help organizations that is integrated across the system develop-
meet their business and mission objectives ment and operation life cycle. The end result
is an efficient assurance approach leading to Mission Success
increased confidence in a system’s safety,
Interoperability security, and dependability properties. Mission-Success Assessments
The SEI helps organizations apply the SEI’s
Basics of SOA Model-Based Engineering and System mission-success assessment methods. This
In this half-day working session, SEI experts Architecture Analysis includes applying Mission Diagnostic and
walk participants through the elements of SOA The SEI uses model-based engineering to MAAP as well as developing and applying
and reveal some common misconceptions provide technical assistance and guidance to methods that are tailored for a customer.
about it. customers to support the analysis, evaluation,
and validation of architecture designs, including
SOA Strategy
• evaluating system architecture candidates,
Any successful SOA strategy has to be aligned
validating system quality attributes, and iden-
with business goals, such as reduced time-
tifying architectural inadequacies early in the
to-market for applications, integration with
design phase
business partners, or improved customer
service. Each goal drives a different set of SOA • facilitating system integration and validat-
strategies. This workshop explores the linking ing the composition and the assumptions of
of business goals with SOA strategies and underlying subsystems
identifies potential pilot projects. As a result of • conducting impact and tradeoff analysis
this workshop, an organization develops a plan using architecture models to determine per-
for identifying its SOA priorities and imple- formance and reliability effects given archi-
menting a set of concrete tasks. tectural changes

1-888-201-4479 www.sei.cmu.edu 33
Interoperability, Dependability, and Mission Success, continued

EDUCATION & TRAINING EPIC Tutorial


This two-day tutorial covers fundamental
Performance and Dependability
Available from the SEI and licensed SEI COTS definitions and provides an overview Model-Based Engineering with
Partners, based on matured, validated, and of some of the major engineering, business,
documented solutions to pervasive problems
SAE AADL
acquisition, and contractual activities affected This two-day course provides an introduction
by COTS-based systems. The presenter to MBE, AADL, and OSATE. MBE cuts costs
Interoperability describes practices, based on real-world case by preventing system integration problems
studies, for COTS business-case, vendor, and and simplifying life-cycle support. The AADL
Migrating Legacy Components to supplier relationships; architecture; license provides a framework for the analysis of
SOA Environments negotiation; requirements; evaluation; and system (and system-of-systems) designs prior
At a time when systems based on SOA are risk management. The tutorial also covers to development and supports an architecture-
becoming increasingly popular, this two-day the basic concepts and structure of the EPIC based, model-driven development approach
course introduces managers, software engi- process, the implications for management and throughout the system life cycle. OSATE is a
neers, and decision makers to the basics of the organization’s development processes, and tool environment for the AADL.
SOA, common misconceptions about SOA, the detailed activities, tasks, and artifacts that
and fundamentals for successfully implement- are used in the process.
ing SOA. It addresses SOA development
COTS-Based Systems for
CONFERENCES
and challenges from the perspectives of the Events sponsored or cosponsored by the SEI
service developer, the service consumer, and Program Managers
the infrastructure developer. The course also This five-hour presentation, currently offered
outlines the SMART methodology, which only at customer sites, addresses the major International Conference on
helps organizations develop a realistic strategy challenges and opportunities associated with Composition-Based Software
for the migration of legacy components to a the use of COTS products in software-inten- Systems (ICCBSS)
specific SOA target environment. sive systems from the perspective of the The International Conference on Composition-
program manager. Based Software Systems (ICCBSS) is the
Introduction to SOA first conference series to focus on exchang-
The Introduction to SOA course delves into COTS Software Product Evolution ing ideas about current best practices and
the basics of SOA, including its common mis- for Practitioners promising research directions in creating and
conceptions and the four pillars of SOA-based This two-day course covers the process and maintaining systems that require the composi-
systems development (strategic alignment, techniques that can be employed in the evalu- tion of components, including COTS software
SOA governance, technology evaluation, and a ation of COTS products for software-intensive products. Because of the explosion in growth
change in organizational mindset). This course systems. It covers fundamental definitions, of new technologies and domains, along with
provides participants with a firm grounding in an overview of some of the basic principles the complexity and number of systems and
the basics of this popular approach to achiev- of COTS product evaluation, a process frame- systems of systems, ICCBSS addresses a
ing system interoperability. work for COTS software product evaluation, wider scope of challenges and approaches—
and some useful techniques. technological and organizational—for con-
structing, acquiring, deploying, and sustaining
Introduction to SMART
software-intensive systems that require inter-
In this course, participants gain insight into Open Systems for Executives
operation among a wide variety of systems
the challenges of reusing legacy systems as This half-day course is designed to introduce
and components.
services within an SOA environment. They executives to the basic concepts, principles,
also learn about the SMART process that and challenges of creating and sustaining open
The ICCBSS provides a forum in which
helps organizations systems.
researchers and practitioners from industry,
• determine whether it makes sense to government, and universities can gather to
migrate legacy systems to services Open Systems: The Promises and exchange ideas and results. The ICCBSS is
the Pitfalls cosponsored by the Institute of Electrical and
• decide which services it makes sense to
This two-and-a-half-day course, currently Electronics Engineers (IEEE) and presented
develop
offered only at customer sites, provides par- in conjunction with the SEI, the National
• assess the changes needed in the legacy ticipants with basic knowledge about how Research Council Canada, and the European
system to accomplish the migration to successfully transition to using an open- Software Institute.
• evaluate migration strategies systems approach for systems acquisition.

34 www.sei.cmu.edu 1-888-201-4479
PUBLICATIONS The Architecture Analysis and Design
Language (AADL): An Introduction. Peter H.
System-of-Systems Practices from an
Acquisition Perspective
Books are available from Addison-Wesley Feiler, David P. Guch, and John J. Hudak, 2006 The SEI is looking for collaborating organiza-
(www.awprofessional.com/seiseries) and
tions to pilot new approaches for acquiring
book retailers. SEI reports are available for free Modeling and Validating Security and
Confidentiality in System Architectures. Jörgen highly complex systems of systems. The suc-
download at www.sei.cmu.edu/publications.
Hansson and Aaron Greenhouse, 2007 cessful acquisition of systems of systems that
will be interoperable requires (1) the appli-
Books Flow Latency Analysis with the Architecture cation of practices that proactively address
Managing Software Acquisition: Open
Analysis and Design Language (AADL). Peter legal issues, policies, procedures, and culture
Systems and COTS Products. B. Craig Meyers
Feiler and Jörgen Hansson, 2007 governing or influencing acquisition; (2) shared
and Patricia Oberndorf, Addison-Wesley, 2001
knowledge about schedule, cost, risk, and
Dependability Cases. Charles B. Weinstock, performance; and (3) use of effective tools
Modernizing Legacy Systems: Software
John B. Goodenough, and John J. Hudak,
Technologies, Engineering Processes, and and models for specification, reasoning, and
2004
Business Practices. Robert Seacord, Daniel execution of relevant acquisition practices. The
Plakosh, and Grace Lewis, Addison-Wesley, SEI is interested in partnering with organiza-
Arguing Security—Creating Security
2003 tions that are embarking on an interoperable
Assurance Cases. John Goodenough, Howard
Lipson, and Charles Weinstock, 2006 acquisition or that have successfully com-
CMMI Survival Guide: Just Enough Process
pleted one to help refine our ideas and test
Improvement. Suzanne Garcia and Richard
Mission Diagnostic Protocol, Version 1.0. concepts and potential products.
Turner, Addison-Wesley, 2007
Christopher Alberts, Audrey Dorofee, and Lisa
Marino, 2007
MBE Essentials: An Introduction to the SAE System-of-Systems Practices from an
Architecture Analysis and Design Language Mission Assurance Analysis Protocol (MAAP), Engineering Perspective
(AADL). David Gluch and Peter Feiler, Addison- Version 1.0. Christopher Alberts, Audrey The SEI is looking for collaborating organiza-
Wesley, 2008 Dorofee, and Lisa Marino, 2008 tions to explore practices that lead to suc-
cessful construction and execution of systems
Reports Lessons Learned in Applying the Mission of systems. The successful development of
SMART: The Service-Oriented Migration and Diagnostic. Christopher Alberts, Audrey complex systems of systems requires a new
Reuse Technique. Grace Lewis, Ed Morris, Dorofee, and Lisa Marino, 2008 set of concepts, a revised set of life-cycle
Liam O’Brien, Dennis Smith, and Lutz Wrage. activities, attention to the role of emergence,
2005 Common Elements of Risk. Christopher
Alberts, 2006 and the application of a different set of tech-
A Process for Context-Based Technology nologies and techniques. The SEI is seeking
Evaluation. Grace A. Lewis and Lutz Wrage. Executive Overview of SEI MOSAIC: partners who are developing or applying new
2005 Managing for Success Using a Risk-Based strategies embodied in practices for system-
Approach. Christopher Alberts, Audrey of-systems engineering.
Model Problems for Technologies in Dorofee, and Lisa Marino, 2007
Interoperability: Web Services. Grace A. Lewis Cost Drivers and Risks of
and Lutz Wrage, 2006
Interoperability
Workshop on Model-Driven Architecture and
RESEARCH The SEI seeks partners to develop and use
Program Generation. Grace A. Lewis, B. Craig Engagements in technology development methods for modeling, tracking, and measur-
Meyers, and Kurt Wallnau, 2006 with the SEI ing the costs and risks associated with the
acquisition and development of interoperable
System-of-Systems Governance: New Patterns
of Thought. Ed Morris, Pat Place, and Dennis
Interoperability systems of systems. The SEI is investigating
how interoperability risks vary in successful
Smith, 2006 and unsuccessful systems-of-systems efforts
System-of-Systems Practices from an
Organizational Perspective and correlating those patterns of risk to perfor-
Topics in Interoperability: Structural
Programmatics in Systems of Systems. James Organizational involvement in complex mance measures such as cost and schedule.
D. Smith II, 2006 systems of systems requires more emphasis
on effective collaboration across organizations SOA Research Agenda
System-of-Systems Navigator, Version 2. and response to dynamic customer demands. The SEI seeks collaborators to (1) evolve a
Suzanne Garcia, Ed Morris, Lisa Brownsword, The SEI is developing a set of principles, long-term research agenda for SOA that was
Phillip Boxer, Pat Kirwan, and Dennis Smith, initially developed in 2007; (2) participate with
practices, and tools that enable organizations
2007 an international community of interest that is
to adapt to this increasingly complex world.
Examples of tools we are exploring include carrying out parts of the research agenda; and
Interoperable Acquisition for Systems of
Systems: The Challenges. James D. Smith II (3) carry out parts of the research agenda and
• scenario-based interoperability analysis
and D. Mike Phillips, 2006 disseminate the results through the interna-
• alignment analyses tional community of interest.
Risk Management Considerations for • supply and demand context modeling
Interoperable Acquisition. B. Craig Meyers,
2006
We are looking for partners in the develop-
An Emergent Perspective on Interoperation in ment of those and other tools and practices.
Systems of Systems. David A. Fisher, 2006 The SEI is also interested in case studies and
lessons learned from organizations that have
Conditions for Achieving Network-Centric successfully implemented system-of-systems
Operations in Systems of Systems. David A.
practices.
Fisher, B. Craig Meyers, and Pat Place, 2007

1-888-201-4479 www.sei.cmu.edu 35
Interoperability, Dependability, and Mission Success, continued

Network-Centric Operations Advanced Processor Performance


The SEI is investigating ways to develop and The SEI is developing engineering-based
acquire systems of systems that operate in solutions to make efficient use of advanced
a network-centric way. The SEI is seeking processor hardware architectures without
defense organizations tasked to develop sacrificing predictable execution times. The
systems that feature a collaborative network- SEI model-based engineering team is seeking
ing infrastructure and that will be assembled organizations to pilot approaches to reducing
dynamically as dictated by evolving mission worst-case execution time and avoiding execu-
needs. The SEI is also looking for industrial tion time variation due to cache/pipeline.
collaborators desiring to be connected to all
entities that form its supply chain—from sup- Data Management for Distributed
pliers of raw materials to consumers. Systems
The SEI seeks collaborating organizations that
Performance and Dependability are dissatisfied with the task-centric method-
ologies for designing real-time systems to pilot
Predictive Modeling the use of a data-centric framework. The SEI
The SEI seeks collaborative research with model-based engineering team advocates that
organizations applying predictive modeling data needs must be explicitly modeled early in
techniques to operational quality attributes the development process.
such as performance, security, reliability, and
safety criticality in real-time and embedded Mission Success
systems. The techniques are part of a model-
based approach to software engineering Mission Success Management
and include the use of models for predicting Framework
system behavior and improving system perfor- The SEI is developing a framework for
mance before code is written. managing risk and opportunity within an enter-
prise and across multi-enterprise missions.
Assurance Cases for Systems This framework extends the traditional view
of Systems of risk management and will be the basis for
Assuring the safety, security, or reliability of mission success research and development
a system of systems is quite difficult. Test- activities. This includes addressing gaps in tra-
based assurance approaches are insufficient ditional risk management approaches; devel-
to demonstrate adequately that dependability oping a means of aligning risk management
requirements have been met. Systems of activities within an enterprise; and developing
systems present special assurance difficulties methods, tools, and techniques for managing
not only because of their size, complexity, and a mission’s potential for success across the
continuing evolution but also because they can life cycle and supply chain. The SEI seeks
exhibit undesired emergent behavior—that partners to assist in developing and testing the
is, unanticipated component interactions that framework.
impair safety, security, or reliable operation.
The SEI seeks system-of-systems collabora- Mission Success Management
tors to investigate new assurance approaches Methods, Tools, and Techniques
for reaching sound conclusions about system The SEI seeks collaborators to co-develop risk-
of systems safety, security, and reliability. based methods, tools, and techniques specific
to organizational missions and consistent with
Fault Containment the principles of SEI MOSAIC. Organizations
The SEI seeks partners to pilot approaches will be able to evaluate and manage the poten-
for discovering why system-level failures still tial for successful missions using innovative,
occur despite the use of fault tolerance tech- risk-based methods, tools, and techniques.
niques and fault containment strategies. The Such collaboration allows organizations to
SEI has identified system-wide design rules gain early access to SEI research, create orga-
that must be satisfied to limit propagation of nization-specific methods, and participate in
seemingly minor faults throughout a system. advancing the state of the practice for risk
The SEI has also developed a formalized management and mission success.
analysis framework for system fault contain-
ment and stability management. The SEI combines focused research in coop-
erating and consulting relationships with a
mandate to directly transition technology into
practice.

36 www.sei.cmu.edu 1-888-201-4479
Special Programs

Affiliate Program SEI Credentials Program SEI Membership Program


www.sei.cmu.edu/collaborating/affiliates www.sei.cmu.edu/credentials www.sei.cmu.edu/membership

Through the Affiliate Program, sponsoring The SEI Credentials Program helps organiza- SEI Membership is a business and knowledge
organizations contribute their best technical tions put in place the best practices for design- network that connects the SEI with members of
people to the SEI’s ongoing effort to define ing high-quality software and protecting net- government, industry, and academia throughout
superior software engineering practices. worked systems. SEI Credentials offers certifi- the globe who stand at the forefront of software
Affiliates lend their technical knowledge and cate and certification programs that guide par- and systems engineering. SEI Members include
experience to SEI teams investigating specific ticipants through a series of courses chosen to CEOs, directors, and managers from Fortune
technology domains. help them develop expertise in specific areas 500 companies and prominent government
of work, including computer security incident organizations, as well as front-line software
Affiliates’ sponsoring organizations represent handling, software engineering process man- engineers, programmers, testers and devel-
industry, government, and academia. As team agement, and software architecture design. opers from startup organizations. The SEI is
members on SEI projects, affiliates collaborate the only one of the 37 U.S. federally funded
with SEI staff to identify, develop, and demon- The SEI has an unsurpassed reputation as a research and development centers (FFRDCs)
strate improved practices. leader in advancing the practice of software that offers membership to the public.
engineering. By enrolling in one of our certifi-
Participation in the Affiliate Program is cation or certificate programs, participants SEI Membership is designed for software engi-
intended to immerse affiliates in the inquiry neering professionals who are interested in
• receive official recognition of their skills
and exploration of new tools and methods priority access to SEI technologies and events
and expertise
that promise increased productivity, predict- that support the transition of software engi-
able schedules, fewer defects, and decreased • learn how to lead and participate in efforts to neering standards and best practices. Benefits
costs. Affiliates can influence the SEI research improve processes at their organizations include an annual member assembly and
agenda by identifying real-world problems and • network with others facing similar challenges luncheon, as well as other networking opportu-
providing the SEI with opportunities to pilot nities year-round. Members receive discounts
• learn from experienced instructors with
new tools and methods that can benefit on the annual SEPG Conference, several other
years of experience
the affiliates’ organizations for many years SEI-sponsored conferences and events, SEI
to come. merchandise, and one SEI public course per
SEI Certificates year. Members also have their own personalized
See www.sei.cmu.edu/collaborating www.sei.cmu.edu/credentials
profile posted at the SEI Member Center Web
/affiliates or call 412-268-3980 for more infor- site, where they can find the latest SEI news
mation about the Affiliate Program, benefits to Certificates are awarded upon completion of
and network with other members through the
the sponsoring organization and the affiliate, a series of continuing education courses and
directory. Members also stay current with The
and current affiliate opportunities. serve to recognize successful completion of
Bulletin, a weekly e-mail newsletter, and The
an educational process.
Monitor, a monthly, members-only publication
for and about SEI members.
SEI Certifications
www.sei.cmu.edu/certification Varying levels of membership include:

Certification is earned upon completion of a • Individual: Our individual members repre-


series of courses and after the participant’s sent Fortune 500 companies and start-ups,
knowledge is assessed against a set of and include CEOs, programmers, project
industry-relevant standards. Certifications managers, front-line software engineers,
include ongoing requirements that must be testers and developers. All share a commit-
met to keep the certification valid. ment to professional development and improv-
ing their networking affiliations.
• Partner: As employees of SEI Partner organiza-
tions, Partner members already have an estab-
lished connection to the SEI, but are looking
to increase their affiliations with the software
community by taking part in SEI Membership.
• Honorary: These complimentary member-
ships are for active or retired employees of
the Department of Defense or the U.S. Armed
Forces, as well as SEI employees.
• Student: Student members are future leaders
in software engineering and represent univer-
sities and academic institutions worldwide.

To join or to receive more information


about SEI Membership, contact Customer
Relations at customer-relations@sei.cmu.edu
or visit the membership Web site at
www.sei.cmu.edu/membership.

1-888-201-4479 www.sei.cmu.edu 37
Special Programs, continued

SEI Office in Europe SEI Partner Network Software and Systems


www.sei.cmu.edu/about/europe www.sei.cmu.edu/partners
Process Improvement
Software development is a global activity The SEI Partner Network is a group of organi- Network (SPIN)
with organizations adopting SEI products and zations and individuals trained and authorized www.sei.cmu.edu/go/spins
services in Europe, Asia, Africa, Australia, and or certified by the SEI to deliver official SEI
the Americas. In response to this globalization, services worldwide. These services include A Software and Systems Process
the SEI opened its first international office in courses, consulting methods, and management Improvement Network (SPIN) is an organiza-
Europe in January 2003. processes that aid in the implementation of tion of professionals in a given geographi-
the SEI’s software engineering technologies. cal area who are dedicated to software and
The SEI office in Frankfurt, Germany, carries Individuals who deliver SEI services on behalf systems process improvement. SPIN chapters
out the SEI mission to help others improve of SEI Partners are trained and evaluated by offer a forum for the free and open exchange
their software engineering and management the SEI to ensure that they have the necessary of software and system process improvement
practices. The SEI European office is financially knowledge and skills to deliver SEI services experiences, ideas, information and mutual
supported by European industry organizations. successfully. support. SPINs worldwide continue to foster
innovation in software engineering practice.
The SEI brings expertise to Europe by Services Offered by SEI Partners
delivering training in Capability Maturity Currently, SEI Partners provide training and Joining a SPIN demonstrates a commit-
Model Integration (CMMI), the Standard services in ment to improving the state of software and
CMMI Assessment Method for Process systems engineering, and helps the member
Improvement (SCAMPI), and security incident • software process improvement, through
make contact with a network of experts.
response. The SEI offers courses in its German Capability Maturity Model Integration
Each regional SPIN is different, based on the
headquarters as well as in training centers (CMMI), People Capability Maturity Model
vision of the founders and the needs of the
in Paris and London, and it provides on-site (People CMM), Personal Software Process
community.
course delivery on request. (PSP), and Team Software Process (TSP)
courses and methods of practice
SPINs comprise professionals from all
The SEI has research partnerships with • software architecture, through courses and sectors —industry, government, and academia
leading European organizations such as methods of practice (including students)—and include defense
Bosch, Siemens, and ABB, to mature current contractors, professional organizations, and
• software measurement and analysis,
technologies and add new products to the independent consultants.
through courses and methods of practice
SEI portfolio.
• network security and survivability, through The SEI supports SPINs by facilitating com-
With employees and consultants from the CERT suite of courses munication among SPIN founders and SPIN
Germany, Switzerland, the Netherlands, groups maintaining a directory of SPINs and
the United Kingdom, and Ireland, the SEI If you are interested in becoming an SEI
the SPIN meeting calendar on the SEI Web
European office represents a cross section Partner, or if you are a current SEI Partner
site assisting SPIN start-up providing SEI
of the new Europe. The SEI plans to add interested in providing additional SEI services,
experts to speak at SPIN meetings working
employees and consultants in and from as please visit www.sei.cmu.edu/partners for
with SPIN members to peer review abstracts
many European countries as possible to descriptions of the available opportunities and
for SEPG conferences, and helping to shape
ensure that it represents the European to apply.
the technical program hosting SPIN birds-of-a-
industrial community. feather sessions at SEPG conferences
SEI Partner Network Ethics and
This strategy is furthered by actively seeking Compliance Program For more information visit
additional SEI Partners throughout Europe Organizations and individuals who obtain www.sei.cmu.edu/go/spins
as well as establishing research collabora- services from SEI Partners can have confidence
tions with leading researchers. For example, in the quality of the service and the integrity
the SEI recently added the leading European of the provider. The SEI Partner Network Ethics
researchers in process improvement to the and Compliance Program ensures that SEI
International Process Research Consortium Partners maintain a high standard of profes-
(IPRC). sional conduct—acting with honesty, integrity,
and fairness when they provide SEI services.
For more information about the SEI SEI Partner Network Ethics and Compliance
European office, please send email to also develops programs and initiatives to
customer-relations@sei.cmu.edu. equip SEI Partners to deal with the ethics
and compliance issues they face on a daily
basis. Learn more about the SEI Partner
Network Ethics and Compliance Program at
www.sei.cmu.edu/partners/ethicscompliance.

38 www.sei.cmu.edu 1-888-201-4479
Index

Conferences SEI Certificate in CMMI.................................23 Implementing Tools and Methods for


Survivable Systems.......................................26
SEI Certificate in Incident Response
Architecture Tradeoff Analysis Method Process..........................................................29 Independent Technical Assessments...............7
(ATAM) Lead Evaluator Workshop................. 14
SEI Certificate in Information Security...........29 Introducing PSP and TSP Into an
CMMI Technology Conference and Organization...................................................20
User Group....................................................22 SEI Certificate in Personal Software
Process for CMMI.........................................23 IT Strategic Planning........................................7
Collaboration Meeting for CSIRTs with
National Responsibility..................................28 SEI Certificate in Software Engineering Measurement-Plan Evaluations.......................8
Process Management...................................24
DoD Product Line Practice Workshop........... 14 Mission-Success Assessments.....................33
SEI Certificate in Software Process
FloCon Analysis Workshop............................28 Improvement Implementation.......................24 Model-Based Engineering and System
Architecture Analysis.....................................33
Forum of Incident Response and Security Software Architecture Professional............... 15
Teams (FIRST) Conference............................28 People CMM Appraisals................................20
Software Product Line Professional............... 16
International Conference on Composition- Performance Benchmarking Consortium
Based Software Systems (ICCBSS)...............34 (PBC)..............................................................20

International Workshop on Requirements Pre- and Post-Contract Award Workshops.......7


for High-Assurance Systems (RHAS).............28 Customer Engagements
Predictable Assembly Starter
SEPG Australia Conference...........................22 Acquisition Process Improvement...................7 Engagements................................................ 13

SEPG Europe Conference.............................22 Acquisition Strategy Planning Workshop.........7 Process Appraisals..........................................8

SEPG Latin America Conference...................22 Analysis-Based Assurance.............................33 Product Line Adoption/Action Planning
Workshop...................................................... 13
SEPG North America Conference..................22 Architectural Assistance and Coaching.......... 12
Product Line Diagnosis Using the PLQL
Software Architecture Technology User Architecture Reconstructions........................ 12 or the PLTP.................................................... 13
Network (SATURN) Workshop....................... 14
Assistance Applying Goal-Driven Product Line Executive Session.................... 12
Software Architecture Workshop for Measurement, Six Sigma, and Other
Educators....................................................... 14 Measurement and Analysis Techniques.........20 Quality Assessments of System Architectures
and their Requirements (QUASAR).................8
Software Engineering for High-Assurance Basics of SOA................................................33
Systems (SEHAS) Workshop.........................28 Quality by Construction Clinic........................ 13
CERT Resiliency Engineering Framework
Software Product Line Conference (SPLC).... 14 (CERT REF) Assessment...............................27 Request for Proposal (RFP) Preparation and
Reviews...........................................................8
System-Dynamics Modeling for Information Clustered-Computing Analysis Platform
Security Workshop........................................28 (C-CAP)..........................................................26 SOA Governance...........................................33

TSP Symposium............................................22 CMMI Appraisals...........................................20 SOA Strategy.................................................33

COTS Software Product Evaluation...............33 Software and System Architecture


Evaluations.................................................... 12
CURE Transition.............................................33
Credentials Software Risk Evaluations...............................7
Customized Product Line Solution................ 13
Architecture Tradeoff Analysis Method Source-Selection Reviews...............................8
(ATAM) Evaluator........................................... 15 Document Reviews.........................................8
Support for Software Acquisition and
ATAM Lead Evaluator.................................... 16 EPIC Implementation....................................33 Systems Engineering Activities.......................7

CERT-Certified Computer Security Incident Establishing and Improving Information Sustainment-Readiness Review......................8
Handler Certification......................................29 Security Management Programs
and Practices.................................................27 System and Software Requirements
PLTP Leader................................................... 16 Architecture Reviews.......................................8
Establishing an Incident Response
Product Line Technical Probe (PLTP) Team Capability.......................................................26 T-Check Technology Investigations.................33
Member......................................................... 16
Evaluating Environments for Infrastructure Tailored Management Assistance on
SEI-Certified Implementing Goal-Driven Protection Preparedness...............................27 Product Line Efforts....................................... 13
Measurement Instructor................................23
Evaluating or Benchmarking Incident Tailored Technical Support on Product Line
SEI-Certified PSP Developer..........................23 Management Capabilities..............................26 Efforts............................................................ 13

SEI-Certified SCAMPI High Maturity Lead Evaluations, Assessments, and Reviews......27 Testing-Approach Evaluation............................8
Appraiser.......................................................23
Getting Started with CMMI-Based Virtual Network Audit.....................................27
SEI-Certified ITSP Coach...............................23 Improvement.................................................20
Virtual Training Environment (VTE).................27
Getting Started with People CMM-Based
Improvement.................................................20

1-888-201-4479 www.sei.cmu.edu 39
Index, continued

Publications Evaluating and Improving Architecture


Competence.................................................. 15
Packaging Predictable Assembly with
Prediction-Enabled Component Technology... 15
A Case Study in Successful Product Line Evaluating Software Architectures: Methods Performance Property Theories for Predictable
Development................................................. 15 and Case Studies........................................... 15 Assembly from Certifiable Components....... 15
Adapting CMMI for Acquisition Executive Overview of SEI MOSAIC: Performance Results of CMMI-Based Process
Organizations: A Preliminary Report..............23 Managing for Success Using a Risk-Based Improvement.................................................23
Approach.......................................................35
A Discipline for Software Engineering: Predictable Assembly of Substation
The Complete PSP Book...............................23 Flow Latency Analysis with the Architecture Automation Systems: An Experiment
Analysis and Design Language (AADL).........35 Report............................................................ 15
An Emergent Perspective on Interoperation in
Systems of Systems......................................35 Guidelines for Developing a Product Line Preparing for Automated Derivation of
Production Plan.............................................. 15 Products in a Software Product Line............. 15
A Process for Context-Based Technology
Evaluation......................................................35 Handbook for Computer Security Incident Product Line Acquisition in a DoD
Response Teams (CSIRTs).............................28 Organization: Guidance for Decision
A Process Research Framework....................23 Makers........................................................... 15
Incident Management Capability Metrics......28
Arguing Security—Creating Security Product Line Analysis for Practitioners.......... 15
Assurance Cases...........................................35 Internet Denial of Service: Attack and
Defense Mechanisms....................................28 Progress Toward an Organic Software
ATAM: Method for Architecture Evaluation... 15 Architecture Capability in the U.S. Army........ 15
Interoperable Acquisition for Systems of
Attribute-Driven Design (ADD), Version 2.0... 15 Systems: The Challenges...............................35 PSP: A Self-Improvement Process for
Software Engineers.......................................23
Botnets as a Vehicle for Online Crime...........28 Introducing OCTAVE Allegro: Improving
the Information Security Risk Assessment Quality-Attribute-Based Economic Valuation
Building Systems from Commercial
Process..........................................................28 of Architectural Patterns................................ 15
Components.................................................. 15
Introducing the CERT Resiliency Engineering QUASAR: A Method for the QUality
Certified Binaries for Software
Framework: Improving the Security and Assessment of Software-Intensive System
Components.................................................. 15
Sustainability Processes................................28 ARchitectures handbook..................................9
CMMI: Guidelines for Process
Introduction to the Personal Software Risk Management Considerations for
Integration and Product Improvement,
Process..........................................................23 Interoperable Acquisition...............................35
Second Edition...............................................23
Introduction to the Team Software Process...23 Secure Coding in C and C++.........................28
CMMI Acquisition Module (CMMI-AM),
Version 1.1., 2005 . ...................................... 7, 9 Lessons Learned in Applying the Mission Security Quality Requirements Engineering
Diagnostic......................................................35 (SQUARE) Methodology................................28
CMMI and Six Sigma.....................................23
Making Architecture Design Decisions: SMART: The Service-Oriented Migration and
CMMI Assessments: Motivating Positive
An Economic Approach................................. 15 Reuse Technique............................................35
Change..........................................................23
Managing Information Security Risks: The Software Architecture in Practice, Second
CMMI Distilled: A Practical Introduction to
OCTAVE Approach.........................................28 Edition............................................................ 15
Integrated Process Improvement, Second
Edition............................................................23 Managing Software Acquisition: Open Software Component Certification:
Systems and COTS Products.........................35 10 Useful Distinctions.................................... 15
CMMI for Outsourcing..................................23
MBE Essentials: An Introduction to Software Process Improvement and Product
CMMI SCAMPI Distilled: Appraisals for
the SAE Architecture Analysis and Design Line Practice: CMMI and the Framework for
Process Improvement...................................23
Language (AADL)...........................................35 Software Product Line Practice..................... 15
CMMI Survival Guide: Just Enough
Measuring the Software Process: Statistical Software Product Line Adoption
Process Improvement.............................23, 35
Process Control for Software Process Roadmap....................................................... 15
Coaching a Development Team.....................23 Improvement.................................................23
Software Product Lines: Practices and
Common Elements of Risk............................35 Mission Assurance Analysis Protocol Patterns......................................................... 15
(MAAP), Version 1.0.......................................35
Comparing Insider IT Sabotage and State of the Practice of Computer Security
Espionage: A Model-Based Analysis.............28 Mission Diagnostic Protocol, Version 1.0.......35 Incident Response Teams (CSIRTs)...............28

Conditions for Achieving Network-Centric Modeling and Validating Security and Sustaining Software-Intensive Systems9
Operations in Systems of Systems...............35 Confidentiality in System Architectures.........35
System-of-Systems Governance:
Dependability Cases......................................35 Model Problems for Technologies in New Patterns of Thought...............................35
Interoperability: Web Services.......................35
Detecting Scans at the ISP Level..................28 System-of-Systems Navigator, Version 2.......35
Modernizing Legacy Systems: Software
Documenting Software Architectures: Technologies, Engineering Processes, and System Architecture Evaluation
Views and Beyond......................................... 15 Business Practices........................................35 Using the ATAM............................................. 15

Overview of ComFoRT: A Model Checking


Reasoning Framework................................... 15

40 www.sei.cmu.edu 1-888-201-4479
Techniques for Developing an Acquisition
Strategy by Profiling Software Risks...............9
Research Process Improvement in Multi-Model
Environments................................................24

Testing a Software Product Line.................... 15 Advanced Processor Performance.................36 Production Planning and Product
Derivation...................................................... 16
The Architecture Analysis and Design Architecture-Based System Evolution............ 16
Language (AADL): An Introduction................35 Product Line Adoption Strategies.................. 16
Architecture Competence.............................. 16
The CERT Guide to System and Network Product Line Economic Models..................... 16
Security Practices..........................................28 Assurance Cases for Systems of Systems....36
Product Line Variability Mechanisms and
The Impact of Function Extraction CMMI Beyond Version 1.2.............................24 Automated Support for Variability.................. 16
Technology on Next-Generation Software
Computational Security Attributes (CSA).......29 Quality Attribute Models................................ 16
Engineering....................................................28
Connection of Architecture-Centric Methods Resiliency Engineering Framework................30
The People Capability Maturity Model:
with Other Software Technologies and
Guidelines for Improving the Workforce........23
Paradigms...................................................... 16 Security Quality Requirements Engineering
The Structured Intuitive Model for Product (SQUARE)......................................................30
Connection of Software Product Lines
Line Economics (SIMPLE)............................. 15
with Other Software Technologies and SOA Research Agenda...................................35
Topics in Interoperability: Structural Paradigms...................................................... 16
Programmatics in Systems of Systems.........35 STAR*Lab: Security Technology Automation
Corporate Governance: Governing for and Research.................................................30
Tracking and Tracing Cyber-Attacks: Enterprise Security........................................29
Technical Challenges and Global Policy State-of-the-Practice Studies.........................24
Cost Drivers and Risks of Interoperability.....35
Issues............................................................28 Studies of CMMI’s Effect on Performance....24
Data Management for Distributed
Trustworthy Refinement Through System-of-Systems Practices from an
Systems.........................................................36
Intrusion-Aware Design.................................28 Acquisition Perspective.................................35
Developing High-Integrity Trust
TSP: Leading a Development Team...............23 System-of-Systems Practices from an
Mechanisms for Software Components........ 17
Ultra-Large-Scale Systems: The Software Engineering Perspective................................35
Developing or Validating Automated
Challenge of the Future................................. 15 System-of-Systems Practices from an
Methods for Predicting Software Quality...... 17
Understanding and Leveraging a Organizational Perspective............................35
Developing PECTs......................................... 17
Supplier’s CMMI Efforts: A Guidebook for Threat Analysis and Modeling........................30
Acquirers.......................................................23 Developing Proofs of Feasibility of
Predictable Assembly.................................... 17 Translating CMMI Into Other Languages.......24
Using the SEI Architecture Tradeoff
Analysis Method to Evaluate WIN-T: Experiments with ArchE................................ 16 TSP-Secure....................................................24
A Case Study................................................. 15
Fault Containment.........................................36 ULS System Research Areas......................... 17
Winning With Software: An Executive
Strategy.........................................................23 Flow-Service-Quality (FSQ) Engineering........29 ULS Systems Research Roadmap................. 17

Workshop on Model-Driven Architecture Function Extraction (FX).................................29


and Program Generation................................35
Improving Processes in Small Settings.........24

Insider Threat Studies....................................29

Integrated Use of Six Sigma and CMMI........24

Integrated Use of TSP and CMMI..................24

International Watch and Warning Network....29

Levels of Anonymity and Traceability


(LEVANT).......................................................30

Malicious Code Analysis Tools and


Techniques.....................................................29

Mapping Other Standards with CMMI..........24

Mission Success Management


Framework.....................................................36

Mission Success Management Methods,


Tools, and Techniques....................................36

Network-Centric Operations..........................36

Network Situational Awareness.....................30

Predictive Modeling.......................................36

1-888-201-4479 www.sei.cmu.edu 41
Index, continued

Tools & Methods Mission Diagnostic........................................33


Education & Training
Mission Thread Workshop............................. 11
Acquisition Strategy Development Tool...........7 Adopting Software Product Lines.................. 14
Network Situational Awareness (NetSA)
Active Reviews for Intermediate Designs Security Suite................................................26 Advanced Incident Handling for
(ARID)............................................................ 11 Technical Staff................................................27
Operationally Critical Threat, Asset, and
Adoption Factory Pattern............................... 11 Vulnerability Evaluation (OCTAVE).................26 Advanced Information Security for
Technical Staff................................................27
Architecture-Based System Evolution............ 11 Options Analysis for Reengineering (OAR).... 12
Analyzing Project Management Indicators....21
Architecture Competence Assessment......... 11 People CMM.................................................. 19
ATAM Evaluator Training................................ 14
Architecture Expert (ArchE)........................... 11 Personal Software Process (PSP)..................20
ATAM Leader Training.................................... 14
Architecture Tradeoff Analysis Method Pin Container Technology............................... 12
(ATAM) and the System ATAM...................... 11 CERT Resiliency Engineering Executive
Predictable Assembly Starter Kit................... 12 Workshop......................................................28
Attribute-Driven Design (ADD) Method......... 11
Product Line Analysis.................................... 12 CMMI Instructor Training...............................21
Capability Maturity Model Integration (CMMI)
Acquisition Module..........................................7 Product Line Quick Look (PLQL).................... 12 CMMI Process Improvement Overview........20

CERT Knowledgebase...................................26 Product Line Technical Probe CMMI Version 1.2 Upgrade Training...............20
(PLTP)............................................................ 12
CMMI for Acquisition (CMMI-ACQ).................7 Computer Forensics for Technical Staff.........27
Quality Attribute Workshop (QAW)................ 11
CMMI Models............................................... 19 Continuous Risk Management........................8
SCAMPI Class A Method.............................. 19
CMMI Modules............................................. 19 COTS-Based Systems for Program
SCAMPI Class B and C Methods.................. 19 Managers...................................................8, 34
CMMI Process and Product Development
Using Six Sigma DMADV..............................20 Security Quality Requirements Engineering COTS Software Product Evaluation for
(SQUARE)......................................................26 Practitioners.....................................................9
CMMI Process Performance Improvement
Using Six Sigma DMAIC................................ 19 Service Migration and Reuse Technique COTS Software Product Evolution for
(SMART)........................................................32 Practitioners...................................................34
ComFoRT Model Checking Reasoning
Framework..................................................... 12 Software Engineering Information Creating a Computer Security Incident
Repository (SEIR).......................................... 19 Response Team.............................................27
Construction and Composition Language
(CCL).............................................................. 12 Software Product Line Acquisition: A Defining Software Processes........................22
Companion to a Framework for Software
Cost Benefit Analysis Method (CBAM)......... 11 Product Line Practice..................................... 11 Designing Products and Processes
Using Six Sigma.............................................22
COTS Product Evaluation Method.................32 Structured Intuitive Model for Product Line
Economics (SIMPLE)..................................... 12 Developing Software Product Lines.............. 14
COTS Usage Risk Evaluation (CURE)............32
Survivable Systems Analysis (SSA)...............26 Documenting Software Architectures........... 14
e-RA...............................................................26
System-of-Systems (SoS) Navigator EPIC Tutorial...................................................34
Evolutionary Process for Integrating Product Suite.................................................32
COTS-Based Systems (EPIC).........................32 Foundation for Resiliency..............................28
System Architecture Modeling and
Framework for Software Product Line Analysis.........................................................32 Fundamentals of Incident Handling...............27
Practice.......................................................... 11
Team Software Process (TSP).......................20 Implementing Goal-Driven Measurement.....22
Goal-Question-Indicator-Measure (GQIM)
Method.......................................................... 19 Vendor Risk Assessment and Threat Implementing Goal-Driven Measurement
Evaluation (V-RATE).......................................26 Instructor Training..........................................22
Lambda-star Performance Reasoning
Framework..................................................... 12 Views and Beyond Approach to Architecture Improving Process Performance
Documentation.............................................. 11 Using Six Sigma.............................................22
Measurement and Analysis Infrastructure
Diagnostic (MAID)......................................... 19 Information Security for Network
Managers.......................................................27
Mission Assurance Analysis Protocol
(MAAP)..........................................................33 Information Security for Technical Staff.........27

42 www.sei.cmu.edu 1-888-201-4479
Intermediate Concepts of CMMI...................21

Intermediate Concepts of the People CMM.. 21

Introduction to CMMI, Version 1.2.................20

Introduction to Personal Process...................21

Introduction to SMART..................................34

Introduction to SOA.......................................34

Introduction to the CMMI Acquisition


Module............................................................9

Introduction to the People CMM...................21

Leading a Development Team........................21

Managing Computer Security Incident


Response Teams............................................27

Mastering Process Improvement..................22

Migrating Legacy Components to SOA


Environments................................................34

Model-Based Engineering with SAE


AADL.............................................................34

OCTAVE Training Workshop...........................27

Open Systems: The Promises and


the Pitfalls......................................................34

Open Systems for Executives.......................34

Patterns of Failure in Software Acquisition......9

People CMMI Instructor Training...................21

PLTP Leader Training...................................... 14

PLTP Team Training......................................... 14

Principles of Predictable Assembly................ 14

PSP for Engineers I: Planning and PSP for


Engineers II: Quality......................................21

PSP Instructor Training...................................21

SCAMPI B and C Team Leader Training.........21

SCAMPI Lead Appraiser Training...................21

SCAMPI with People CMM Lead Appraiser


Training..........................................................21

Software Acquisition Survival Skills.................9

Software Architecture: Principles and


Practices........................................................ 14

Software Architecture Design and Analysis... 14

Software Product Lines................................. 14

Survivability and Information Assurance


(SIA) Curriculum.............................................29

TSP Executive Strategy Seminar...................21

TSP Launch Coach Training............................21

Understanding CMMI High Maturity


Practices........................................................21

1-888-201-4479 www.sei.cmu.edu 43
Abbreviations, Acronyms, and Initialisms

AADL Architecture Analysis & Design IGDM Implementing Goal-Driven SEHAS Software Engineering for High-
Language Measurement Assurance Systems
ADD Attribute-Driven Design IMCE Incident Management Capability SEI Software Engineering Institute
Evaluation
APEC Asia-Pacific Economic Cooperation SEIR Software Engineering Information
IPRC International Process Research Repository
ArchE Architecture Expert
Consortium
SEPG-AU SEPG Australia
ARID Active Reviews for Intermediate
IPSS Improving Processes in Small
Designs SEPG-LA SEPG Latin America
Settings
ASDT Acquisition Strategy Development SIA Survivability and Information
IT information technology
Tool Assurance
ITA independent technical assessment
ATAM Architecture Tradeoff Analysis SiLK System for Internet-Level
Method LEVANT Levels of Anonymity and Knowledge
Traceability
C-CAP Clustered-Computing Analysis SIMPLE Structured Intuitive Model for
Platform MAAP Mission Assurance Analysis Product Line Economics
Protocol
CBAM Cost Benefit Analysis Method SMART Service-Oriented Migration and
MAID Measurement and Analysis Reuse Technique
CCL Construction and Composition
Infrastructure Diagnostic
Language SOA service-oriented architecture
MBE model-based engineering
CERT/CC CERT Coordination Center SoS system of systems
MOSAIC Mission-Oriented Success
CMM Capability Maturity Model SPIN Software Process Improvement
Analysis and Improvement Criteria
Network
CMMI Capability Maturity Model
NDIA National Defense Industrial
Integration SPLC Software Product Lines
Association
Conference
CMMI-ACQ CMMI for Acquisition
NetSA Network Situational Awareness
STAR*Lab Security Technology Automation
CMMI-AM CMMI Acquisition Module
OAR Options Analysis for and Research
CMMI-DEV CMMI for Development Reengineering
SQUARE Security Quality Requirements
CONOPS concept of operations OAS Organization of American States Engineering
COTS commercial off-the-shelf OCTAVE Operationally Critical Threat, Asset, SSA Survivable Systems Analysis
and Vulnerability Evaluation
CSA Computational Security Attributes TSP Team Software Process
OSATE Open Source AADL Tool
CSIRT Computer Security Incident UML unified modeling language
Environment
Response Team
ULS ultra-large scale
PBC Performance Benchmarking
CURE COTS Usage Risk Evaluation
Consortium VNA Virtual Network Audit
CVE common vulnerabilities and
PECT prediction-enabled component V-RATE Vendor Risk Assessment and
exposures
technology Threat Evaluation
DMADV define-measure-analyze-design-
PIER Process in Execution Review VTE Virtual Training Environment
verify
PLQL Product Line Quick Look
DMAIC define-measure-analyze-improve-
control PLTP Product Line Technical Probe
DoD Department of Defense PSP Personal Software Process
EPIC Evolutionary Process for QUASAR Quality Assessments of Systems
Integrating COTS-Based Systems Architecture Requirements
FIRST Forum of Incident Response and QAW Quality Attribute Workshop
Security Teams
REF Resiliency Engineering Framework
FSQ flow-service-quality
RFP request for proposal
FX function extraction
RHAS Requirements for High-Assurance
GQIM Goal-Question Indicator Metric Systems
ICCBSS International Conference on COTS- SAE Society for Automotive Engineers
Based Software Systems
SATURN Software Architecture Technology
IEEE Institute of Electrical and Users Network
Electronics Engineers
SCAMPI Standard CMMI Assessment
Method for Process Improvement

44 www.sei.cmu.edu 1-888-201-4479
The Software Engineering Institute (SEI) is a federally Copyrights
Carnegie Mellon University SEI-authored documents are

funded research and development center (FFRDC)


sponsored by the U.S. Department of Defense under Contract
FA8721-05-C-0003. Carnegie Mellon University retains
copyrights in all material produced under this contract. The
sponsored by the U.S. Department of Defense and U.S. Government retains a non-exclusive, royalty-free license to
publish or reproduce these documents, or allow others to do
operated by Carnegie Mellon University. so, for U.S. Government purposes only pursuant to the
copyright license under the contract clause at 252-227-7013.
For information and guidelines regarding permission to use
specific copyrighted materials owned by Carnegie Mellon
University (e.g., text and images) see Permissions at

The SEI advances software engineering and related


www.sei.cmu.edu/about/legal-permissions.html. If you
do not find the copyright information you need, please consult
your legal counsel for advice.
disciplines to ensure the development and operation of Trademarks and Service Marks
systems with predictable and improved cost, schedule, Carnegie Mellon Software Engineering Institute (stylized),
Carnegie Mellon Software Engineering Institute (and design),
and quality. and the stylized hexagon are trademarks of Carnegie Mellon
University.

® Architecture Tradeoff Analysis Method; ATAM, Capability


Maturity Model, Capability Maturity Modeling, Carnegie
Mellon, CERT, CERT Coordination Center, CMM, CMMI, and
OCTAVE are registered in the U.S. Patent and Trademark Office
by Carnegie Mellon University.

SM
 MM Integration; COTS Usage Risk Evaluation; CURE; EPIC;
C
Evolutionary Process for Integrating COTS-Based Systems;
FloCon; Framework for Software Product Line Practice; IDEAL;
Interim Profile; OAR; Operationally Critical Threat, Asset, and
Vulnerability Evaluation; Options Analysis for Reengineering;
Personal Software Process; PLTP; Product Line Technical Probe;
PSP; SCAMPI; SCAMPI Lead Appraiser; SEPG; Team Software
Process; and TSP are service marks of Carnegie Mellon
University.

For information and guidelines regarding the proper referential


use of Carnegie Mellon University service marks and
trademarks, see Trademarks, Registration, and Service Marks
at www.sei.cmu.edu/about/legal-trademarks.html.
Software Engineering Institute SEI Europe SEI Los Angeles
Carnegie Mellon University An der Welle 4 400 Continental Boulevard
4500 Fifth Avenue Reception Level 1 El Segundo, CA 90245
Pittsburgh, PA 15213-2612 60322 Frankfurt Phone: 412-268-5800
Phone: 412-268-5800 Germany
Toll-free: 888-201-4479 Phone: +49 69-7593-8163 SEI Colorado Springs
Fax: 412-268-5758 Suite 111
www.sei.cmu.edu SEI Washington, DC 1155 Kelly Johnson Boulevard
customer-relations@sei.cmu.edu NRECA Building Colorado Springs, CO 80920
Suite 200 Phone: 719-548-4744
4301 Wilson Boulevard
Arlington, VA 22203
Phone: 703-908-8200

3393 07 9 30

You might also like