Sample BRD
Sample BRD
Sample BRD
[Complete file/properties to populate fields on this page and in the document headers]
Project Name
Project #:
Prepared by: Prepared for: Date Submitted: Project Sponsor: lient !cceptor: Project "ana#er:
Document Number: 6450 !0/Project Num"er /#$D Security lassification: $o% &ersion: 0%& $ast 'pdated: reation Date: Apri' !6( !0&) *une 06( !006
Project Name
Table of ontents
TABLE OF CONTENTS...............................................................................................................................2 1.INTRODUCTION.......................................................................................................................................4 1.1.DOCUMENT PURPOSE.............................................................................................................................4 1.2.INTENDED AUDIENCE.............................................................................................................................4 1.3.PROJECT BACKGROUND.........................................................................................................................5 1.4.PURPOSE OF THE BUSINESS REQUIREMENTS..........................................................................................5 1.5.BUSINESS GOALS/OBJECTIVES TO BE ACHIEVED...................................................................................6 1.6.BENEFITS/RATIONALE............................................................................................................................6 1. .STAKEHOLDERS......................................................................................................................................6 1.!.DEPENDENCIES ON E"ISTING S#STEMS..................................................................................................6 1.$.REFERENCES...........................................................................................................................................6 1.1%.ASSUMPTIONS....................................................................................................................................... 2.REQUIREMENTS SCOPE........................................................................................................................7 2.1.IN SCOPE ...............................................................................................................................................! 2.2.OUT OF SCOPE........................................................................................................................................! 3.FUNCTIONAL REQUIREMENTS...........................................................................................................8 3.1.ACTOR PROFILES SPECIFICATION...........................................................................................................! 3.2.ESSENTIAL USE CASE DIAGRAM............................................................................................................$ 3.3.ESSENTIAL USE CASE SPECIFICATIONS..................................................................................................$ 3.4.FUNCTION HIERARCH# DIAGRAM........................................................................................................11 3.5.FUNCTION DEFINITION REPORT...........................................................................................................11 3.6.BUSINESS RULES..................................................................................................................................12 4.DATA REQUIREMENTS........................................................................................................................13 4.1.DATA ARCHITECTURE..........................................................................................................................13 4.1.1.Domain Class Diagram...............................................................................................................13 4.1.2.Entity Relationship Diagram.......................................................................................................14 4.2.DATA VOLUMES...................................................................................................................................14 4.3.DATA CONVERSION..............................................................................................................................14 4.4.DATA RETENTION AND ARCHIVING.....................................................................................................14 4.5.FOI/PRIVAC# IMPLICATIONS................................................................................................................14 4.6.DATA DEFINITION REPORTS.................................................................................................................15 4.6.1.Domain Class Definition Report.................................................................................................15 4.6.2.Entity Definition Report...............................................................................................................16 5.NON-FUNCTIONAL REQUIREMENTS..............................................................................................17 5.1.SECURIT# REQUIREMENTS...................................................................................................................1 5.1.1.Authentication..............................................................................................................................17 5.1.2.Authori ation an! Access Controls.............................................................................................1" 5.1.3.#nformation $ecurity Classification an! la%elling.......................................................................1& 5.2.AVAILABILIT# REQUIREMENTS............................................................................................................2% 5.3.USABILIT# REQUIREMENTS..................................................................................................................21 5.4.S#STEM HELP REQUIREMENTS.............................................................................................................21 5.5.PERFORMANCE REQUIREMENTS ..........................................................................................................22 5.6.SCALABILIT# REQUIREMENTS..............................................................................................................22 5.6.1.'ser $cala%ility...........................................................................................................................22 5.6.2.Application $cala%ility.................................................................................................................22
Project Name
6.INTERFACE REQUIREMENTS............................................................................................................23 6.1.USER INTERFACE REQUIREMENTS........................................................................................................23 6.2.S#STEM INTERFACE REQUIREMENTS...................................................................................................23 7.BUSINESS GLOSSARY...........................................................................................................................23 APMS UPDATE............................................................................................................................................24 REVISION LOG...........................................................................................................................................24 APPENDICES...............................................................................................................................................24 APPROVAL..................................................................................................................................................25 (ho $houl! )e #n*ol*e! in the Creation of the )RD+.........................................................................26 ,rere-uisites for )RD...........................................................................................................................26 .*erall ,ro/ect Details an! )est ,ractices..........................................................................................27 )est ,ractices.......................................................................................................................................27 ,ac0aging the )RD...............................................................................................................................27 )usiness ,artner $ign1off.....................................................................................................................2" A!!itional Details.................................................................................................................................2" Data to %e 2el!3 $ample A!*ice...........................................................................................................2& $ummary...............................................................................................................................................2&
Project Name
() *ntroduction
()() Document Purpose
+he purpose o, this -ocument is to -escri"e "usiness re.uirements o, an App'ication comp'ete'y( accurate'y an- unam"iguous'y in +echno'ogy in-epen-ent manner% A'' attempts ha/e "een ma-e in using most'y "usiness termino'ogy an- "usiness 'anguage 0hi'e -escri"ing the re.uirements in this -ocument% 1ery minima' an- common'y un-erstoo- +echnica' termino'ogy is use-% 'se case / Desi#ner approac+ is use- in mo-e'ing the "usiness re.uirements in this -ocument% [Delete the approach that is not applicable.]
Project Name
Currentl, t'o approaches to modeling the Business Requirements are supported b, 3inistr,4s 1D5 standards 6 738 7se case modeling using an, tool that supports the 738 notation and standards as described in the 1D5 standards 'eb site 9 5ntit, Relationship Diagram .5RD/ and :unction +ierarch, Diagram .:+D/ modeling using %racle Designer tool.
his document template supports both 7se case and Designer modeling approaches. 0t is highl, recommended that onl, one of the t'o modeling approaches is adopted for describing the Business Requirements in this document and not a h,brid approach. Data models ma, be presented either in 5RD notation or in 738 class notation" regardless of 'hich modeling approach 'as used. 1ll 3odeling should conform to 3inistr,4s modeling standards. If Use case approach is followed, then please delete Designer sections and vice versa. The section numbers in the document are automatically re-sequenced when certain sections are deleted. 1fter finishing the document" please re;generate the complete able of Contents to reflect the correct page numbering. .2elect the able of contents9 right;clic)9 select #update fields( and select #update entire table( commands./
#usiness re.uirements ,or major enhancements to an e2isting app'ication% #usiness re.uirements ,or ne0 app'ication -e/e'opment% #usiness re.uirements ,or rep'acement app'ication -e/e'opment% #usiness re.uirements ,or a re.uest ,or proposa's 3$4P5%
Project Name
()5) Benefits2Rationale
+his section -escri"es the major "ene,its to "e achie/e- 0ith the imp'ementation o, the #usiness $e.uirements%
()6) Sta.e+olders
Sta6eho'-ers are the in-i/i-ua's or groups 0ho ha/e a /este- interest in this project an- 0hose interests nee- to "e consi-ere- throughout the project% +his section 'ists the Sta6eho'-ers o, the App'ication / Project ,or 0hich these #usiness re.uirements are -ocumente-%
()9) References
+his section 'ists the re,erences to pre/ious -ocumentation( correspon-ence etc ( i, any( that are re'ate- to these #usiness $e.uirements%
Project Name
+his section -escri"es major assumptions that 0ere ma-e prior to or -uring the #usiness $e.uirements gathering an- -ocumentation%
,) Requirements Scope
+his section sho0s 0hat "usiness ,unctiona'ity is in scope an- out o, scope ,or 7mp'ementation% 7n 8se case approach( the out o, scope 8se cases are in-icate- in a separate "oun-ary "o2% 7n 9rac'e Designer approach the out o, scope 4unctions are sho0n in grey co'oure- "o2es%
Project Name
-) ;unctional Requirements
+his section -escri"es the :unctional requirements part o, the #usiness $e.uirements% 7n 8se case approach( the :unctional Requirements comprises o, Actor Pro,i'e Speci,ication( :ssentia' 8se case -iagram an- :ssentia' 8se case speci,ication in narrati/e te2t ,orm% 7n 9rac'e Designer approach the :unctional Requirements comprises o, #usiness 8nit De,inition $eport( 4unction ;ierarchy Diagram an- 4unction De,inition $eport%
Project Name
A !"# N$%&
!ctor Type
omments
S&'()*+,-). P./0'.1 A2&+. S344+.&/56 A2&+. S&'()*+,-). P./0'.1 A2&+. S344+.&/56 A2&+. S&'()*+,-). P./0'.1 A2&+. S344+.&/56 A2&+. S&'()*+,-). P./0'.1 A2&+. S344+.&/56 A2&+.
C.)'&) R)'U4-'&) D),)&) C.)'&) R)'U4-'&) D),)&) C.)'&) R)'U4-'&) D),)&) C.)'&) R)'U4-'&) D),)&)
P./5& E74+.& O&*).8 P./5& E74+.& O&*).8 P./5& E74+.& O&*).8 P./5& E74+.& O&*).8
ase Dia#ram
+his section is app'ica"'e on'y to 8se case approach% +his section -epicts the #usiness $e.uirements in the ,orm o, :ssentia' 8se case -iagram% 7n the 8se case approach( the 4unctiona' $e.uirements are -ecompose- into a num"er o, :ssentia' 8se cases% :ssentia' use cases are o, primary importance ear'y in a project?s re.uirements/ana'ysis phase% +heir purpose is to -ocument the "usiness process that the App'ication must support 0ithout "ias to techno'ogy an- imp'ementation%
ase Specifications
+his section is app'ica"'e on'y to 8se case approach% +his section -escri"es each :ssentia' 8se case in narrati/e te2t ,orm% A use case typica''y has one "asic course o, action an- one or more a'ternate courses o, actions% +he "asic course o, action is the main start to ,inish path that the use case 0i'' ,o''o0( 0here as the a'ternate courses represent the in,re.uent'y use- paths ane2ceptions( error con-itions etc% +he comp'ete "usiness 'ogic o, a use case such as "asic course o, action( a'ternate course o, action( pre con-ition( post con-ition etc is not -epicte- in the 8se case -iagram% $ather they are -ocumente- in narrati/e sty'e in use case speci,ications% 7, the num"er o, use cases is 'ess than &5( the :ssentia' 8se case speci,ications in narrati/e ,orm are inc'u-e- in this #$D in ta"u'ar ,ormat% :ach use case is -escri"e- in a separate ta"'e% 7, the
Project Name
num"er o, use cases is greater than &5( the :ssentia' 8se case speci,ications in narrati/e ,orm are attache- as a separate -ocument 0ith this #$D%
Project Name
'se ase *d : ## 'se ase Name Description !ctors Business Rules @ist the "usiness ru'es o, Section )%6 that this use case re,erences% Mention on'y the #usiness ru'e 7- here% Pro/i-e hyper'in6s to the "usiness ru'es o, section )%6% !lternate ;lo%s
Basic ;lo%
Non=;unctional Requirements Pre= onditions Post= onditions <8tension Points $ist of >>included?? use cases <8tension ondition $ist of >>e8tended?? use cases <8tendin# 'se ase
Project Name
+his section is app'ica"'e on'y to Designer approach% +his section -escri"es each #usiness 4unction in narrati/e te2t ,orm%
Project Name
Business Rule *d
Rule Name
Rule Description
Rule Source Po 'icy manua' Str ategic -ecisions Bo ntractua' o"'igations Su "ject matter e2perts 9t her Sources 3mention the sources5
#$AAAA
/) Data Requirements
+his section -escri"es the Data re.uirements part o, the #usiness $e.uirements%
Project Name
/)-) Data
on4ersion
Project Name
!rotected "6 information that" if compromised" could reasonabl, be e!pected to cause injur, .harm/" e.g. loss of pri-ac,9 !rotected #6 information that" if compromised" could reasonabl, be e!pected to cause serious injur, .harm/" e.g. the conduct of a court proceeding 'ould be ad-ersel, affected9 !rotected $6 information that" if compromised" could reasonabl, be e!pected to cause e!tremel, gra-e injur, .harm/" e.g. loss of life.
onceptual Name
lass 2 <ntity
Project Name
*nitial Data &olume (appro8)) !nnual Data #ro%t+ rate (in appro8) D) !ttributes (fields) of t+e class
Name E Description E Name E Description E Name E Description E Name E Description E Name E Description E Name E Description E
Project Name
*nitial Data &olume (appro8)) !nnual Data #ro%t+ rate (in appro8) D) !ttributes (fields) of t+e <ntity
Name E Description E Name E Description E Name E Description E Name E Description E Name E Description E Name E Description E
0) Non=;unctional requirements
+his section -escri"es the non ,unctiona' re.uirements part o, the #usiness $e.uirements% A non ,unctiona' re.uirement is typica''y a specia' re.uirement that is not easi'y or natura''y speci,ie- in the te2t o, the use case?s or ,unction?s e/ent ,'o0% :2amp'es o, non ,unctiona' re.uirements inc'u-e 'ega' an- regu'atory re.uirements( app'ication stan-ar-s( an- .ua'ity attri"utes o, the system to "e "ui't inc'u-ing usa"i'ity( re'ia"i'ity( per,ormance or supporta"i'ity re.uirements%
0)()() !ut+entication
+his section -escri"es the Authentication re.uirements part o, the #usiness $e.uirements% Authentication is the process o, /eri,ying the genuineness o, c'aims that a person/group ma6es to esta"'ish i-entity/e'igi"i'ity ,or access to ser/ices% 7n or-er to ascertain the Authentication
Project Name
re.uirements o, the App'ication( it is re.uire- to ana'yse the type o, transactions that -i,,erent 8se cases/#usiness 4unctions trigger 0ithin the App'ication% +he ,o''o0ing criteria is use- in -etermining transaction types o, each use case/,unction 3in 'ine 0ith the Do/ernment Bore Po'icy Manua'5 E %evel & ' "nonymous transaction < triggers transactions that do not require or allo' a person to be identified" or transactions 'hich require protection of a person=s identit,. :or e!ample" access to online information about go-ernment programs or ser-ices or protecting a person=s identit,. Combining the transaction data 'ith other data must not allo' identification of a particular indi-idual. %evel ( ' !seudonymous transaction < triggers transactions that do not require a person to be identified but do require a means for further contact to deli-er a product or ser-ice. :or e!ample" a note from someperson>internet.ca can not be readil, translated into an indi-idual4s name" but it ma, be sufficient to request information" to pro-ide some ser-ices" or on;going follo' up. %evel ) ' Identified transaction < triggers transactions that require that a person be specificall, identified. he nature of the transaction ma, require confirmation of a person=s identit, .e.g." name" address" birth date" etc./ and/or data lin)ing the person to a transaction .e.g." in-oice number" personal health number" etc./. %evel * ' +erified transaction < triggers transactions that require6 the person to be specificall, identified9 -erification of the integrit, of the data e!changed and the e!change itself9 and" the creation of sufficient e-idence to indicate that the person agreed to be bound b, the transaction. :or e!ample" a note signed 'ith a digital certificate" audit trails and securit, logs ma, pro-ide sufficient e-idence that a specific person intended to conduct a transaction.
Transaction type tri##ered ($e4el : : !nonymousC $e4el ( : PseudonymousC $e4el , : *dentifiedC $e4el - : &erified)
ontrols
+his section -escri"es the Authori<ation an- Access Bontro' re.uirements part o, the #usiness $e.uirements at a high 'e/e'% Authori<ation is the process o, -etermining i, the person/group( once i-enti,ie- through the =Authentication process>( is permitte- to ha/e access to certain
Project Name
ser/ices% +he Authori<ation an- Access Bontro' re.uirements are "est -escri"e- through a matri2%
Type of !ccess ontrol needed on t+e onceptual lass 2 Business <ntity : reate R Read ' 'pdate D Delete
Project Name
Project Name
!4ailability Requirements = Re#ular %or. +ours = ,/86 = !ny ot+er (please describe)
Project Name
Belp Requirements = ;ield le4el (online) = Screen le4el (online) = Belp Printin# 3ptions = 3perations "anual (3ffline) = !ny ot+er (please describe)
Project Name
5) *nterface Requirements
+his section -escri"es 8ser an- System 7nter,ace re.uirements ,or the propose- system%
6)
Business 1lossary
Project Name
!P"S 'pdate
APMS up-ate re.uire-F APMS up-ate-/to "e up-ate- on 3-ate5E BommentsE Ges No
Re4ision $o#
Date [-ate] +ersion $hange ,eference ,eviewed by
!ppendices
Project Name
!ppro4al
+his -ocument has "een appro/e- as the o,,icia' #usiness $e.uirements Document ,or the Project Name project% 4o''o0ing appro/a' o, this -ocument( changes 0i'' "e go/erne- "y the project?s change management process( inc'u-ing impact ana'ysis( appropriate re/ie0s an- appro/a's( un-er the genera' contro' o, the Master Project P'an an- accor-ing to Project Support 9,,ice po'icy% !repared by
Author's Name [+it'e] [9rgani<ation]
-ignature
Date
"pproved by
[B'ient Acceptor?s Name] [+it'e] [9rgani<ation]
-ignature
Date
Project Name
Project core team Business partner(s) Process owner(s) or representatives Subject matter experts Change/project/product management, quality department and/or IT management as needed or available
Prerequisitesfor BRD
Prerequisite one for a BRD is the project charter, created during the define phase of a DMAIC project. The BRD provides the opportunity to review the project charter to ensure that the objective, goals, scope, project team, and approvers are accurately reflected. Prerequisite two is a current environment assessment created during the measure phase. This includes a detailed process map of the current environment highlighting areas that will be changed during the project. Detailed as is process maps should include:
Clearly defined start and end points of the process Level two and three process functions Defined areas of rework and non-value added steps Cycle time, capacity and rework information for each process step as available Baseline for each CTQ for the current environment Prerequisite three is CTQs, identified in either the define or measure phases, and validated with baseline measurements, targets and specifications.
Current measures: Data that defines and describes current performance sigma level of the CTQ includes a definition of how the product/services characteristic is to be quantified. Target/nominal value: What is the aim of the product/service? If there was never any variation in the product/service, this would be the constant value. Specification limits: How much variation is the customer willing to tolerate in the delivery of the product or service? Define upper and lower specification limits as required by the customer needs. Allowable defect rate: How often are the producers willing to produce a product/service outside the specification limits? Prerequisite four is the target environment assessment, created in the measure phase, and includes a detailed process map of the target environment including level two functions. When distinguishing between level two or three functions, group the process functions into the following categories:
People: People are processing information and making decisions [core team designs high-level design/low-level design (HLD/LLD)] Systems: Systems is processing information and making decisions Systems/people: System is processing information and people are making the decisions
Project Name
Distinguish leadership requirement for associate in case decision making authority has to Fishbone: For each process function for impact assessment
Are there any regulatory or geographic constraints (i.e., state law) to consider? If so, these constraints need to be clearly documented in the process detail table of the BRD or in the overall project details section of the appendix.
What assumptions or dependencies apply? What business rules apply? Are there any measurements or reporting requirements that apply to the project?
BestPractices
1. Validate scope: review and refine the scope as needed based on a process detail table, identifying any changes to what is in or out of scope now that the requirements have been developed. Complete this prior to obtaining the business partner(s) sign-off and lock down the scope of the project. Any changes to the project after this phase will be handled through a change control process. 2. Create systems impacted document: Create a design-elements diagram for each level two or three process function for impact assessment for: People Process Technology Materials and supplies Facilities Product Machinery and equipment Others as necessary (depending on the organization) Definitions and acronyms: Define any terms not clearly understood by all.
o o o o o o o o
3.
Packagingthe BRD
Package the BRD so it has a logical flow and is easy to follow. An example of a high-level list of sections follows:
Project overview including project charter information, scope, and objectives Current environment assessment and systems overview (see additional details below) Future process map Process detail table Overall project business rules and constraints Impact assessment (fishbone for process functions)
Project Name
BusinessPartnerSignoff
Business partners should be active participants in the development of the BRD, but a final review and signoff is also essential.
AdditionalDetails
There are a number of items included in the BRD that require detailed documentation to ensure successful implementation. Following is a high-level overview of the types of detail to consider: Sample questions for the current environment assessment and systems overview:
Who is the intended user? How many users are there? Are they the same type of user or different? What level of computer experience will the users have (or is needed)? What is the required security? Are there hardware constraints networked or stand-alone? What are the approximate numbers of records required initially plus the anticipated growth? What technical support is necessary and available in-house? What other systems need to integrate/communicate? Backup. Describe the current back-up regime (e.g., tape back-up one/day). How will the new system fit with this? If this is not currently defined then think how much data could be inadvertently lost. For example would it be a major disaster if the last 30 minutes of work was lost, or could yesterdays/last weeks data be retained?
Deliverables. What are the expectations system, help files, documentation, full source code, training, support, etc.? Detail what is essential versus nice. Do not automatically ask for everything unless necessary. If the project manager is to maintain the system make sure he states that he requires the full source code alternatively if the developer is to maintain the system consider settling for an escrow agreement (where the source is held by an independent third party). Be specific about tools necessary to help. If the developer is unwilling to provide the support necessary find someone else who will. The functional requirements section should describe what the system is to accomplish rather than the how. Develop a prioritized list similar to the following:
A detailed description of the requirement including goals (e.g., produce a report of spend/department/year on demand with the user selecting the department and the financial year required), it is necessary to know how the company defines the financial year.
How important is this requirement (essential, preferred, nice to have, not essential, etc.)? Any known design/implementation issues relating to this requirement?
Project Name
Summary
As with any tool, the BRD can have both benefits and failure modes. Benefits derived from a good BRD include reduced changes during the improve and control phases of DMAIC and reduced time to deployment. Failure modes from a poor BRD means the system developed will not meet business requirements. Creating a successful BRD requires planning and coordination. There are a few best practices that should be followed in this process. The team should hold a dedicated off-site session to complete the BRD with all required resources 100 percent available. Scheduling is the key to success here. As each tool/deliverable is completed within the methodology build the BRD. Allow a one-week deadline to finish action items from the off-site session and hold a final review session two to three hours after completion of action items.