51 IT Metrics That Any Business Can Evaluate Right Nowposted by Anna Mar, July 17, 2011
How do you covert the knowledge in an architect's head into valuable metrics?
Metrics do not need to be complex or expensive. The following 51 IT metrics can be calculated with a simple architectural questionnaire.
These metrics can be evaluated at the enterprise, business unit, platform, system or project level. They support decision making and IT transparency — converting architectural knowledge into executive knowledge.
1. Business strategy in place55% of business units have an up-to-date business strategy.
2. Technology strategy in place77% of systems have a up-to-date roadmap.
3. Technology strategy maps to business strategy42% of technology strategies are mapped to business strategy.
4. Full compliance with enterprise architecture principlesEnterprise Architecture Principles are enterprise level architectural goals and guidelines. Example: 12% of applications are in full compliance with EA principles.
5. Full compliance with enterprise standards57% of applications are in full compliance with enterprise standards.
6. Published SLA94% of applications have a published SLA.
7. Business Continuity Plan (BCP) in place100% of major applications have a BCP plan.
8. Strategic / tacticalDo projects solve short term problems or contribute to the long term strategy of business and IT? Example: 67% of IT projects are tactical.
9.Use of non-standard technology22% of new projects use non-standard or retired technologies.
10. High availability (HA)96% of applications are designed and deployed for high availability.
11. Application scalability83% of applications are scalable.
12. Extensible46% of applications are extensible.
13. Application health monitoring71% of applications are health-monitored.
14. Open source31% of applications use open source components or tools.
15. Runbook42% of applications have an approved runbook.
16. Lifespan60% of applications have a projected lifespan of more than 5 years.
17. Buy vs Build41% of projects this year implemented COTS technology.
77% of applications are bespoke.
94% of projects costing more than $10 million dollars were based on COTS technology.
18. Strategic common services75% of reports use the enterprise reporting platform
44% of business processes are managed by the enterprise bpm platform
19. SOA reference architecture91% of SOA implementations conform to the enterprise SOA reference model.
20. Maintenance cost trendMaintenance costs increased for 77% of applications this year by an average of 14%.
21. Transaction volume44% of applications can handle projected 5 year transaction volume.
22. Data volume80% of applications can handle projected 5 year data volume.
23. User load84% of applications can handle projected 5 year user load.
24. Use strategic data sources (golden source, golden copy)87% of applications use strategic data sources.
25. Use strategic ESB for real-time messaging34% of applications use the enterprise ESB for real-time messaging.
26. Use strategic ETL for batch data transfer44% of applications use the enterprise ETL for batch data transfer.
27. Data stewardship62% of enterprise databases are managed by a data steward.
28. Real-time data13% of data integrations are real-time.
29. Intraday data71% of data integrations are intraday.
30. Complies with enterprise master data management (MDM) standards87% of critical reference data complies with enterprise MDM standards.
31. Data backup84% of enterprise databases are regularly backed up (at least once a month).
32. Data validation at source87% of data is validated at source.
33. Data strategy27% of critical data has a published data strategy.
34. Published data retention policy13% of data has a published data retention policy.
35. Published data quality targets12% of data has published data quality targets.
36. Application and data are decoupled95% of applications have decoupled data layers.
37. Zero data rekeying9% of business processes involve rekeying data.
61% of data repositories contain rekeyed data
38. Spreadmarts67% of business processes involve spreadsheets (unmanaged data).
Enterprise-wide there are 986 unmanaged spreadsheets that have been identified.
39. Zero touch processes44% of business processes are zero touch.
40. Straight Through Processing (STP)37% of business processes are STP.
41. Measure business capabilities with metrics14% of business capabilities are regularly measured with metrics.
42. Threat identification19% of applications have undergone a security threat assessment.
43. Risk assessment69% of applications have undergone a security risk assessment.
44. Penetration Testing47% of applications have been penetration tested.
45. Separation of duties77% of applications have implemented separation of duty controls.
46. Role-based security80% of systems use role-based security.
47. Least privilege23% of systems implement the least privilege design pattern.
48. Centralized authorization and authentication87% of systems use the enterprise repository for authorization and authentication.
49. Compliance with enterprise user management standards44% of applications are in compliance with enterprise user management guidelines.
50. Compliance with enterprise information security standards23% of applications are in compliance with enterprise information security standards.
51. Audit trail98% of major applications have audit trail functionality.
Application Health DashboardAn example of a IT dashboard based on the metrics above.
Data Health Dashboard
Project Health Dashboard
Enterprise Architects must choose their words very carefully.|
Enterprise Architecture (EA) is supposed to help manage IT risks
— but is it possible that EA itself introduces new risks?|
Information technology governance|
Our collection of SOA architecture resources and tools.|