Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
Preface
6
The federal government depends heavily on a variety of
7
information technology products and services to serve the public.
8
Each year the government spends billions of dollars on computer
9
equipment, services, software, and telecommunications. The success
10
or failure of information system acquisitions affects executive
11
agencies' credibility with the Congress and the public as well as
12
their abilities to carry out their missions effectively and
13
efficiently.
14
The General Accounting Office (GAO) and offices of inspectors
15
general have consistently identified problems with information
16
technology acquisitions. Problems identified in numerous
17
evaluations include information systems that do not meet users'
18
needs, exceed cost estimates, or take significantly longer than
19
expected to complete.
20
This guide provides a logical framework for evaluating
21
information technology acquisitions. It incorporates a risk
22
assessment methodology intended to reduce audit planning time and
23
ensure that significant issues are included. It is based on a model
24
of the acquisition process developed by GAO in cooperation with a
25
wide range of federal and private sector officials. 1 The model
26
outlines the process used to acquire information technologies and
27
identifies elements of the process that are essential for planning
28
and carrying out acquisitions.
29
This guide is intended for use in planning and conducting risk
30
assessments of computer hardware and software, telecommunications,
31
and system development acquisitions. A risk assessment is the
32
process of identifying potential risks in a system under
33
development and then determining the significance of each risk in
34
terms of its likelihood and impact on the acquisition's cost,
35
schedule, and ability
36
1Information Technology: A Model to Help Managers Decrease
37
Acquisition Risks (GAO/IMTEC-8.1.6, August 1990).
38
to meet the agency's needs. Such assessments may have their
39
greatest impact if carried out early, when an agency can more
40
easily alter its acquisition plans and strategy to manage and
41
control the identified risks.
42
The audit guide consists of 10 chapters, with appendixes.
43
Chapter 1 introduces the purpose of the guide, explains its
44
essential concepts and techniques, and provides direction in
45
tailoring the guide for use on specific assignments. Chapters 2
46
through 10 address specific activities in the acquisition process.
47
The nine chapters present audit guidance on:
48
49
50
51
management and user support,
52
53
54
55
project staffing,
56
57
58
59
needs/requirements/ specifications,
60
61
62
63
alternatives,
64
65
66
67
acquisition planning,
68
69
70
71
solicitation document,
72
73
74
75
source selection,
76
77
78
79
contract management, and
80
81
82
83
test and acceptance.
84
85
86
Each chapter lists audit objectives, commonly expected
87
documentation, detailed audit questions, and references to federal
88
regulations and guidance. The chapters are intended to assist in
89
the identification of specific risk areas and to contribute to an
90
overall assessment of how well an agency is meeting its acquisition
91
objectives.
92
This audit guide is also available in a software format,
93
accompanied by reference materials such as the GAO model of the
94
acquisition process, relevant federal acquisition regulations,
95
General Services Administration (GSA) guidance, and Office of
96
Management and Budget (OMB) circulars. The software version
97
utilizes a hypertext software package to help auditors quickly and
98
flexibly review
99
Page 2 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
100
all the included documents. This software may be requested from
101
GAO by returning the card included with this guide.
102
This guide supplements and does not replace other GAO policies
103
or procedures. It was prepared under the direction of Jack L.
104
Brock, Jr., Director, Government Information and Financial
105
Management, who can be reached at (202) 512-6406. Other major
106
contributors to the guide are listed in appendix IV.
107
108
Ralph V. Carlone Assistant Comptroller General Information
109
Management and
110
Technology Division
111
112
Werner Grosshans
113
Assistant Comptroller General for Policy
114
Contents
115
116
Preface
117
118
119
120
Chapter 3 22
121
Audit Objective
122
22
123
124
Project Staffing
125
Documentation Required
126
127
22
128
129
Audit Steps: Project Management
130
131
22
132
133
Audit Steps: Project Staff
134
135
23
136
137
References
138
139
24
140
141
142
Chapter 4 25
143
Audit Objectives 26
144
Needs /
145
Documentation Required
146
26
147
148
Requirements /
149
Audit Steps: Needs Determination
150
151
26
152
153
Audit Steps: Requirements Analysis 27Specifications
154
Audit Steps: Specifications 30
155
156
Audit Steps: Test Plans
157
158
32
159
160
References
161
162
32
163
164
165
166
Chapter 6 40
167
Audit Objective
168
40
169
170
Acquisition
171
Documentation Required
172
173
40
174
Planning
175
Audit Steps 41
176
177
References
178
179
43
180
181
182
183
Chapter 7 44
184
Audit Objectives 45
185
Solicitation
186
Documentation Required
187
188
45
189
Document
190
Audit Steps 46
191
192
References
193
194
49
195
196
197
Chapter 8 50
198
Audit Objective
199
50
200
201
Source Selection
202
Documentation Required 51
203
204
205
Audit Steps
206
207
51
208
209
References
210
211
54
212
213
214
Chapter 9 55
215
Audit Objectives 56
216
Contract
217
Documentation Required
218
56
219
220
Management
221
Audit Steps
222
223
56
224
225
References
226
227
59
228
229
230
Chapter 10 60
231
Audit Objectives 61
232
Test and
233
Documentation Required
234
61
235
236
Acceptance
237
Audit Steps
238
239
61
240
241
References
242
243
63
244
245
Appendixes
246
Appendix I: Acquisition Profile
247
248
Appendix II: Management Metrics 68
249
Appendix III: Reference Materials 80
250
Appendix IV: Major Contributors to This 86Audit Guide
251
Glossary 87
252
253
Table I.1: Map to the Audit Guide
254
255
Table
256
Figures
257
Figure II.1: Problem Reports in Software 73Project
258
Figure II.2: Problems By Priority Levels and 74Number
259
of Months Unresolved
260
Figure II.3: Software Requirements Changes 75
261
Figure II.4: Development Progress 76
262
Figure II.5: Software Size Estimates 78
263
Abbreviations
264
265
Chapter 1
266
267
268
Introduction
269
This audit guide is based on and incorporates GAO's information
270
technology acquisition model. The model describes three phases in
271
the acquisition process: presolicitation, solicitation and award,
272
and postaward. It sets out essential activities in each phase along
273
with critical factors related to those activities. The model is
274
intended to give managers an overview of the acquisition process
275
and to help them decrease acquisition risks.
276
The model's critical factors were drawn from the judgment and
277
expertise of a wide range of knowledgeable individuals from
278
government and private industry. Compliance with these critical
279
factors can increase the likelihood that an acquisition will meet
280
an agency's needs at a reasonable cost and in a timely manner.
281
This guide is intended to help auditors conduct more
282
Objectives focused reviews of information technology
283
acquisitions by enabling them to quickly identify significant areas
284
of risk. Using this guide will help auditors identify critical
285
factors not addressed by management, make a general assessment of
286
any procurement risks, and provide rapid feedback to agency
287
officials so they can take corrective action in a timely and
288
efficient manner. Use of the guide should be selectively tailored
289
to the requirements of particular reviews and adapted to the status
290
of the acquisition.
291
Auditors will need to exercise professional judgment in
292
assessing the significance of audit results or findings. For
293
example, the guide assists auditors in determining how an agency
294
identified and defined its requirements. Professional judgment is
295
necessary to evaluate this information and determine if the agency
296
conducted an adequate requirements analysis.
297
298
Page 8 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
299
Some areas of assessment will require the expertise of auditors
300
with specific technical skills and experience. These specific areas
301
include knowledge of solicitation procedures, benchmarking and
302
other performance or capability validation techniques, and
303
knowledge of technical areas such as database management and
304
telecommunications networks. These areas are identified within the
305
guide. The audit team should include experienced members with
306
enough knowledge of information technologies to satisfy the
307
Government Auditing Standards
308
requirement that auditors have appropriate skills and
309
knowledge.
310
The audit approach described in this guide is intended to result
311
in a risk assessment of an acquisition project at any point in its
312
development. The auditor will be trying to determine whether a
313
project will result in a specified product or level of performance
314
and will be delivered at a specified time and cost. An auditor
315
should use this guide to identify areas that are most likely to
316
result in technical failures, unmet user needs, cost overruns, or
317
schedule delays. Those risks should then be brought to the
318
attention of appropriate agency officials. The audit steps and
319
questions provided are directed toward assessing whether an agency
320
has sufficiently addressed critical factors, including support from
321
managers and users, adequate project staff, and controls over the
322
acquisition's scope before and after a contract is awarded.
323
324
325
Approach
326
Assignment Planning
327
When planning a risk assessment, the auditor should first review
328
the agency's acquisition policies and directives to identify the
329
organizations and individuals responsible for approving
330
procurements. Approval thresholds, for example, should show which
331
officials have the authority to review and approve
332
acquisitions.
333
334
335
Page 9 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
336
337
338
Organization and Use of the Audit Guide
339
The agency's directives should also show the specific milestones
340
and documentation required for a procurement.
341
The auditor should also review previous studies or audits of the
342
acquisition project and of the agency's information resources
343
management functions. Reports by GAO or other auditing institutions
344
can provide valuable background information. The auditor should
345
also determine whether previous recommendations have been carried
346
out.
347
The chapters of this audit guide focus on logically distinct
348
steps of the acquisition process, as described on page 10 of GAO's
349
acquisition model. 1 The following table identifies the appropriate
350
chapters for reviewing the various steps of an acquisition. In
351
general, the auditor will want to concentrate on the steps that are
352
relevant to the phase of the acquisition being reviewed. However,
353
regardless of how far the acquisition has advanced, at a minimum
354
the auditor should always ascertain whether senior managers and
355
users were involved in the project's initiation. The auditor should
356
also verify that the agency has defined its needs and requirements
357
to support its mission, and that those requirements continue to be
358
valid as the acquisition progresses through contract award and
359
contract management.
360
1GAO/IMTEC-8.1.6, August 1990.
361
362
Each of the following chapters provides references to
363
regulations and other guidance relevant to material in the chapter.
364
In addition, each chapter identifies specific audit objectives and
365
documentation expected for the major activities at that point in
366
the acquisition process. The documents listed may exist with
367
different names than those used here. The auditor should refer to
368
agency-specific requirements for more information. Finally, each
369
chapter sets out audit steps to help plan and conduct the
370
assessment of an acquisition. The questions may need to be tailored
371
to
372
Page 11 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
373
the particular circumstances of an audit, using the subject
374
agency's requirements.
375
The appendixes provide further information for use in planning
376
and conducting an acquisition audit. Appendix I contains a
377
worksheet, called an acquisition profile, to summarize essential
378
information about the acquisition project. The worksheet should
379
contain such information as the names and locations of units
380
responsible for the acquisition, the project purpose, and the
381
expected cost and time frames. The completed profile should be kept
382
available for later reference. If a profile exists from an earlier
383
assignment, the auditor should review and update it.
384
Appendix II of this guide describes techniques to use in
385
identifying software development risks of delays and cost overruns,
386
known collectively as management metrics or indicators. These
387
techniques require information about the size of the system being
388
developed and about progress after development has begun. Thus, the
389
techniques are only appropriate for use after the agency has
390
completed its design and progressed into developing the system. An
391
auditor using this guide to review an acquisition that includes
392
significant software development and has a contract in place should
393
review appendix II for techniques to help identify variances from
394
the agency's cost and schedule estimates. In some cases, the
395
project team may be unable to complete a project on time due to an
396
unrealistic schedule. The cost models described in appendix II can
397
be used to make a rough estimate of how long a system development
398
may require. Such an estimate can be compared to agency plans to
399
see if the agency has committed itself to unrealistically short
400
time frames. In other cases, delays in completing scheduled
401
activities, such as system design, coding, and testing, can lead to
402
project
403
Page 12 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
404
405
406
Application of Audit Guide to Prototyping Methodology
407
slippage later on. Auditors will need to tailor the use of the
408
tools described in appendix II to the circumstances of the
409
audit.
410
Appendix III provides a comprehensive list of references cited
411
throughout the guide, as well as publications that may be useful
412
for technical information. Finally, a glossary is attached that
413
defines a wide range of technical and procurement terminology.
414
This acquisition guide is intended for use in reviewing any
415
information technology acquisition, regardless of the system
416
development methodology being used. The guide is structured around
417
the federal acquisition process, and is independent of development
418
methods for information systems. An auditor should recognize that
419
there are different system development models that may be used when
420
a system development effort is acquired. Such models may include
421
the "waterfall" model, rapid prototyping, or evolutionary
422
development. Some of the documents required under different
423
development approaches may differ. Prototyping, for example, may
424
act as part of the requirements definition process, helping the
425
agency identify and control areas of high uncertainty and technical
426
risk. In this situation the auditor should
427
(1) focus on determining how one or more prototypesor
428
incremental versions function to define the agency's requirements
429
and (2) determine how the system development methodology used by
430
the agency controls the prototyping process.
431
One approach to using prototyping as part of the system
432
development process has been described as a "spiral" model of
433
system development. 2 The spiral
434
2For a description of prototyping and the spiral model, see
435
Roger S. Pressman, Software Engineering: A Practitioner's Approach,
436
3rd ed.
437
(New York: McGraw-Hill, Inc., 1992), pp. 26-34.
438
439
440
Presenting Conclusions and Recommendations
441
model portrays a process in which an agency iteratively (1)
442
determines its objectives, alternatives, and constraints; (2)
443
evaluates its alternatives and identifies and resolves risk issues;
444
(3) develops and verifies its next-level products; and (4) plans
445
its next phases. Prototypes are developed or modified as part of
446
the second phase. As part of this model, a prototype is developed
447
or revised whenever a risk analysis shows that significant areas of
448
uncertainty remain that pose substantial risks to project success.
449
When the system has been defined well enough to manage risks
450
effectively, the agency develops and tests a full-scale system.
451
In order to review an acquisition that is using prototypes, the
452
auditor should determine what regulations or guidance the agency
453
has to define a prototyping methodology. This methodology will
454
establish the documentation and approval points that agency
455
officials should meet. The auditor can then measure the progress of
456
the prototypes against the agency's criteria.
457
The auditor should conclude the review by identifying
458
outstanding areas of risk and the agency's actions to address those
459
risks. Note should be made of how well the agency has addressed the
460
critical factors in GAO's 1990 model of information technology
461
acquisitions as well as agency compliance with acquisition
462
regulations, standards, and other federal guidance. 3 Results of
463
the review should be communicated to agency officials for their
464
comment, in accordance with government auditing standards.
465
The auditor should also recommend changes to ensure that the
466
agency is properly addressing the critical factors in the GAO
467
model. For example, the
468
3GAO/IMTEC-8.1.6, August 1990.
469
auditor may recommend a greater role for users if they are not
470
involved in approving alternatives or validating system
471
requirements. Similarly, the auditor should recommend that the
472
agency take appropriate actions where senior management involvement
473
seems lacking, or where the project organization is unstable and
474
subject to high turnover. The recommendations should be reviewed
475
with agency officials and be appropriate to the probability and
476
significance of the risks identified.
477
Chapter 2
478
479
480
481
Management and User Support
482
This chapter focuses on levels of commitment and support for a
483
planned acquisition by senior managers and users, two key
484
stakeholders in an acquisition. Senior managers include those who
485
have overall agency responsibility for strategic, including
486
information-related, objectives. Users are those who operate or
487
rely on agency information resources and include the managers and
488
staff responsible for agency policies and programs supported by the
489
acquisition.
490
The involvement and support of senior management throughout an
491
acquisition is essential for success. Senior management should
492
envision the agency's acquisition goals, define strategic
493
objectives, and oversee the projects that implement the overall
494
vision. One or more senior managers should act as system sponsors,
495
with sufficient authority to ensure that applicable resources are
496
available for the project.
497
Users should also be involved and provide support throughout the
498
acquisition to ensure that their requirements are understood and
499
that the resulting system is both accepted and used. User
500
involvement should be sustained from the needs determination phase
501
through final acceptance and implementation. User involvement in
502
the acquisition process will help avoid the development of products
503
that ultimately do not meet agency requirements.
504
The audit steps in this section should be used to assess the
505
potential risks posed by the lack of management or user support. An
506
acquisition that lacks either or both of these elements is at risk
507
of incurring unnecessary cost overruns, not meeting its planned
508
delivery schedule, and not satisfying agency needs.
509
510
Audit Objectives
511
512
513
1.
514
To ensure that senior managers support and areactively
515
involved throughout the development and implementation of an
516
acquisition.
517
518
519
2.
520
To ensure that users support the acquisition byactively
521
participating in defining procurement requirements, developing the
522
solicitation document, and verifying that the equipment and/or
523
services contracted for meet the agency's needs.
524
525
526
• Decision papers, memoranda, or other records of
527
528
529
Documentation
530
senior management oversight and approval ofRequired acquisition
531
objectives and plans.
532
533
534
535
Program management directives or other written directives
536
from senior managers stating goals and objectives of the
537
acquisition and delegating authority to carry out the
538
acquisition.
539
540
541
542
Budget exhibits and plans showing that sufficient funding
543
is committed to the acquisition.
544
545
546
547
Project plans showing the role of users in planning and
548
overseeing the acquisition. Any documentation of the users' role in
549
validating acquisition requirements, alternatives, and the
550
solicitation document. Users' roles and responsibilities may be
551
detailed in a memorandum of understanding between user
552
organizations and the program office.
553
554
555
556
Agency policies or guidelines on the structure of
557
steering committees or other oversight bodies, with
558
responsibilities of project members and senior managers
559
delineated.
560
561
562
563
564
Audit Steps: Top Management Support
565
1. Identify senior management officials responsiblefor the
566
acquisition. Include senior program officials heading the user
567
organizations, information resource management officials, and
568
members of senior oversight or steering committees. Determine the
569
roles
570
Page 17 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
571
and responsibilities of any groups or committees of senior
572
managers, and the relationships between them.
573
2. Review the documentation related to theacquisition and
574
determine if the senior managers identified in the acquisition
575
profile:
576
577
578
a.
579
Approve the goals and objectives of the
580
acquisition.
581
582
583
b.
584
Designate a program sponsor who is responsibleand
585
accountable for the acquisition.
586
587
588
c.
589
Establish a formal process to keep concernedparties
590
appropriately informed.
591
592
593
d.
594
Participate in the specified reviews and
595
decisions.
596
597
598
599
600
601
Determine how promptly management reviews are conducted
602
and approvals given and if the approvals are given at the
603
appropriate levels.
604
605
606
607
Review documentation of such reviews, such as decision
608
memoranda and review-committee minutes.
609
610
611
612
613
Determine the frequency of reviews and the quality of
614
direction senior managers give to project personnel.
615
616
617
618
e.
619
Provide initial funding for the project and
620
establishnear- and long-term funding commitments, periodically
621
informing Congress of acquisition objectives and status.
622
623
624
f.
625
Secure any necessary support from key
626
externalorganizations, such as OMB, GSA, and relevant congressional
627
committees.
628
629
630
g.
631
Assign independent officials to ensure that securityand
632
internal controls needs are met.
633
634
635
636
637
3. On the basis of the above audit steps and oncontacts with
638
other project officials, determine
639
Page 18 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
640
641
642
Audit Steps: User Involvement
643
whether senior managers fostered good working relations among
644
the sponsor, acquisition manager (program manager), other top
645
managers, the technical offices, and the contracting community.
646
Specifically, determine whether the managers:
647
648
649
a.
650
Coordinate agreement for developing theevaluation and
651
source selection plans and gain acceptance of the evaluation
652
process and criteria.
653
654
655
b.
656
Coordinate an agreement between the programstaff and
657
technical and contracting offices for managing the
658
contract.
659
660
661
c.
662
Obtain the support of important acquisitionofficials in
663
the department or agency, such as the official responsible for
664
source selection.
665
666
667
4. Obtain users' and project staff's evaluations ofmanagement's
668
support in the above steps. Find out how long it took to get
669
approvals from management and the direction management gave to
670
project personnel.
671
672
673
1.
674
Identify the population of users from projectdocuments
675
and the agency's organization charts. Review agency criteria
676
(regulations and procedures) to determine the roles the agency
677
assigns to users. Determine from the program manager and selected
678
users which user organizations are actively involved in the
679
acquisition. Identify significant user groups who are not involved
680
in the acquisition.
681
682
683
2.
684
Determine if users:
685
686
687
a. Are involved in periodic reviews, and if so, howfrequently
688
they are involved.
689
Page 19 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
690
691
692
b.
693
Sign off on needs and requirements statements orotherwise
694
validate the requirements and corresponding solutions when
695
developed. (For more information see ch. 4, step 3 under Needs
696
Determination, step 4 under Requirements Analysis, and step 1 under
697
Specifications.)
698
699
700
c.
701
Validate alternatives against original requirements.(See
702
step 1 of ch. 5 for related audit steps.)
703
704
705
d.
706
Approve the alternative selected (such as thechoice
707
between off-the-shelf technologies or custom development,
708
centralized or distributed processing, etc). (See step 1 of ch. 5
709
for related audit steps.)
710
711
712
e.
713
Validate the specifications against therequirements. (For
714
more information see step 4a under Specifications, in ch.
715
4.)
716
717
718
f.
719
Provide acceptance criteria.
720
721
722
g.
723
Assist in preparing the solicitation document andawarding
724
the contract (for example, user representatives may assist in
725
developing evaluation criteria and participate in the source
726
selection team evaluating alternative proposals). (See ch. 7, step
727
4, and ch. 8, step 1d, for related information.)
728
729
730
h.
731
Participate in postaward activities that may
732
includeinstallation, test, and acceptance of equipment.
733
734
735
i.
736
Participate in reviews of contractor-prepareddeliverable
737
documents such as design specifications, system analyses, and user
738
and training manuals.
739
740
741
j.
742
Participate in government/contractor
743
workinggroups.
744
745
746
Page 20 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
747
k. Participate in the postaward audit for assessing thedegree of
748
success of the acquisition.
749
750
751
3.
752
Determine if users allocate staff time and otherresources
753
to the project.
754
755
756
4.
757
Determine if the users participating in the programhave a
758
high, moderate, or low turnover rate.
759
760
761
5.
762
Assess the adequacy of users' funding support tothe
763
project.
764
765
766
767
768
a.
769
Obtain funding commitment from users.
770
771
772
b.
773
Identify appropriations to be used and theiravailability
774
to support contract award.
775
776
777
• Federal Information Resource Management
778
779
780
References
781
Regulation (FIRMR), Part 201-2: Designated Senior Officials.
782
• GAO, Information Technology: A Model to Help
783
Managers Decrease Acquisition Risks
784
(GAO/IMTEC-8.1.6, August 1990), Phase I, steps 2 and 3; Phase
785
II, step 1; Phase III, step 1.
786
Chapter 3
787
788
789
790
Project Staffing
791
Project management for an acquisition is accomplished primarily
792
by a program manager and staff responsible for carrying out project
793
activities. The program manager should have sufficient authority
794
and an appropriate mix of skills and experience to successfully
795
manage the project.
796
The acquisition project staff should be assigned clear roles and
797
responsibilities. The team should include members who are skilled
798
in the information technology procurement process, understand the
799
technology, and have experience in managing contracts. The team
800
should also have members knowledgeable about the programs that the
801
acquisition is to support.
802
To determine if the acquisition team has theAudit Objective
803
necessary skills and authority to effectively plan and execute the
804
acquisition.
805
• A list of key project team members showing their
806
807
Documentation
808
responsibilities, job titles, and experience. TheRequired
809
auditor may have to generate this list on the basis of interviews
810
if one is not available.
811
• The agency procurement request for a delegation of procurement
812
authority from GSA, showing names and experience of senior project
813
officials (as required by GSA guidance detailed in its FIRMR
814
Bulletin C-5).
815
816
817
Audit Steps: Project Management
818
819
820
1.
821
Review the agency's criteria for acquisition todetermine
822
the responsibility and accountability of the program manager and
823
his/her required qualifications.
824
825
826
2.
827
Review the documentation related to theacquisition to
828
determine how clearly the program
829
830
831
832
833
Audit Steps: Project Staff
834
manager's responsibility and accountability are defined.
835
Determine if the program manager has:
836
837
838
a.
839
A charter to establish authority, responsibility, and
840
accountability.
841
842
843
b.
844
A clearly defined relationship with the program,
845
technical, and procurement offices.
846
847
848
c.
849
A clearly defined relationship with the sponsor and
850
users.
851
852
853
d.
854
Access to senior agency officials.
855
856
857
e.
858
The authority to manage acquisition funds.
859
860
861
f.
862
Input to the budgetary process.
863
864
865
866
867
3.
868
Review the qualifications of the program managerto
869
determine if the program manager has the appropriate mix of skills
870
and experience. Has the program manager directed other projects of
871
similar size and complexity? Is he or she trained to manage complex
872
acquisitions (GSA's Trail Boss program may be an example of such
873
training).
874
875
876
4.
877
Review management continuity on the acquisitionas shown
878
by the turnover rate of program managers.
879
880
881
882
883
1.
884
Review the agency's acquisition criteria todetermine both
885
the responsibility and accountability of project personnel as well
886
as their required qualifications.
887
888
889
2.
890
Review the make-up of the project team to ensurethat a
891
mix of appropriate acquisition skills are represented. (See ch. 9,
892
steps 2 and 3, for related audit steps.)
893
894
895
Page 23 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
896
897
898
a.
899
Determine the authority and experience level of
900
theContracting Officer's Technical Representative.
901
902
903
b.
904
Identify key project staff and review theirexperience and
905
qualifications. Determine whether the Contracting Officer is
906
trained and experienced in information technology
907
acquisitions.
908
909
910
c.
911
Determine if the project staff is experienced inmanaging
912
contractors.
913
914
915
d.
916
Determine the extent of turnover within the
917
projectstaff.
918
919
920
921
922
3.
923
Determine if the agency trains project staff tomaintain
924
their skills and qualifications.
925
926
927
4.
928
Review the reasonableness of project milestonesand
929
schedule with project team members.
930
931
932
• OMB Circular A-109: Major System Acquisitions.
933
934
935
References
936
• GAO, Information Technology: A Model to Help
937
Managers Decrease Acquisition Risks
938
(GAO/IMTEC-8.1.6, August 1990), Phase I, step 5...i
939
940
941
942
GSA, Overview Guide, pp. 2-3 to 2-7.
943
944
945
946
947
GSA, Guide for Contracting Officers' Technical
948
949
Representatives, Chapter 2.
950
951
952
953
FIRMR Bulletin C-5: Delegation of Procurement Authority
954
for a Specific Acquisition.
955
956
957
Chapter 4
958
959
960
961
Needs / Requirements / Specifications
962
The purpose of this chapter is to guide the auditor in
963
determining whether the agency has developed an accurate
964
description of its information technology needs. The acquisition
965
should be clearly linked to program needs, to the agency's overall
966
strategies, and to governmentwide policies and standards. The
967
agency should expand on its basic description of needs to define
968
specific requirements so providers of information technology can
969
respond with meaningful solutions. In some cases, an agency may use
970
prototypes to help define or validate its requirements. The
971
requirements then form the basis for even more detailed
972
specifications.
973
In identifying its requirements, an agency should plan for
974
testing the information resources it needs. These plans should
975
cover acceptance, security, and certification requirements. The
976
test plans developed at this point form the basis for later
977
evaluations of contract performance.
978
Failure to clearly and accurately define information technology
979
requirements poses high risks for any agency. For instance,
980
improperly defined requirements may preclude alternatives, restrict
981
competition, increase the risk of cost and schedule overruns, and
982
lead to systems that are inconsistent with an agency's overall
983
architecture and incompatible with other agency systems. The
984
hardware or software purchased may also be inconsistent with
985
government standards. Designing and implementing a system is also
986
more difficult if input, output, and processing specifications are
987
incomplete or inaccurate. In addition, if security and internal
988
control requirements are not well defined, control over sensitive
989
information or other assets may be lost.
990
Page 25 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
991
Chapter 4 Needs / Requirements / Specifications
992
993
Audit Objectives
994
995
996
1.
997
To ensure that the acquisition is based on
998
clearlyunderstood needs or opportunities and that it is consistent
999
with the overall strategy and architectures used by the
1000
agency.
1001
1002
1003
2.
1004
To ensure that the agency defines its requirements,based
1005
on the needs identified earlier and validated by functional users,
1006
well enough to support the acquisition of hardware, software,
1007
telecommunications, and system development services. These
1008
requirements should primarily be expressed in functional terms in
1009
accordance with FIRMR policy.
1010
1011
1012
3.
1013
To ensure that system specifications clearly
1014
andaccurately summarize the agency's requirements.
1015
1016
1017
1018
1019
Documentation • Needs statement.
1020
Required • Requirements analysis or functional requirements
1021
document.
1022
1023
1024
1025
System specifications, if prepared. Also, draft
1026
specifications with industry comments if draft specifications were
1027
released.
1028
1029
1030
1031
Test plan and requirements prepared before contract
1032
award. Test requirements may be summarized in a test and evaluation
1033
master plan.
1034
1035
1036
1037
1038
Audit Steps: Needs Determination
1039
1. Review the agency's stated needs, which may bedocumented in a
1040
Mission Element Needs Statement, Statement of Operational Need, or
1041
System Operational Concept. Determine whether the needs statement
1042
clearly and accurately reflects the users' needs as indicated in
1043
the mission statement and strategic objectives of the users'
1044
organization, the strategic information plan, or the computer
1045
security plan.
1046
Chapter 4 Needs / Requirements / Specifications
1047
1048
1049
Audit Steps: Requirements Analysis
1050
2. Check the needs statement for:
1051
1052
1053
a.
1054
Existing system architecture and functions to besupported
1055
(i.e., description, cost, volume of work, projected
1056
growth).
1057
1058
1059
b.
1060
Justification for changes, such as correctingdeficiencies
1061
in existing capabilities, complying with new or changed program
1062
requirements, or taking advantage of opportunities for increased
1063
economy and efficiency.
1064
1065
1066
3. Contact several users as well as project staff whoare not
1067
users to determine if they generally agree that the needs analysis
1068
presented in the needs statement adequately addresses actual
1069
problems. (See ch. 2 for related questions.)
1070
1071
1072
1.
1073
Review the requirements analysis to determine if
1074
itdescribes the current system. This description should include all
1075
the functions of the existing system that any new system will have
1076
to perform. The users, functions, work load, operating costs, and
1077
components of the current system should also be
1078
identified.
1079
1080
1081
2.
1082
Confirm that the agency has defined its
1083
informationrequirements for the new information resources. These
1084
requirements include:
1085
1086
1087
1088
1089
a.
1090
Information now being received or information thatis
1091
needed but that is not being received.
1092
1093
1094
b.
1095
Information to be provided to or obtained fromother
1096
agencies or the public.
1097
1098
1099
c.
1100
Sources available from which to obtain the
1101
neededinformation.
1102
1103
1104
Page 27 GAO/IMTEC-8.1.4 Assessing Acquisition Risks Chapter 4
1105
Needs / Requirements / Specifications
1106
1107
1108
d.
1109
Information relationships.
1110
1111
1112
e.
1113
The degree of information validation, integrity,
1114
accuracy, completeness, and reliability.
1115
1116
1117
f.
1118
The quantity of information to be processed and types of
1119
output expected.
1120
1121
1122
g.
1123
The timeliness and format of the information.
1124
1125
1126
h.
1127
The security, accessibility, and privacy
1128
requirements.
1129
1130
1131
3. Determine if the agency has defined its functionaland support
1132
requirements, including:
1133
1134
1135
a.
1136
Present and projected work loads and capacity analysis,
1137
including peak load requirements and requirements for future
1138
capacity management.
1139
1140
1141
b.
1142
Privacy and security requirements.
1143
1144
1145
c.
1146
Contingency requirements for resources whose losswould
1147
either prevent or significantly impair the agency from performing
1148
its mission or would have an adverse impact on the
1149
nation.
1150
1151
1152
d.
1153
Records management factors relating to integrationof
1154
electronic records with other agency records, records retention and
1155
disposition, and safeguards against unauthorized use or destruction
1156
of records.
1157
1158
1159
e.
1160
Space and environment factors, such as floorloading, heat
1161
dissipation, and power supply.
1162
1163
1164
f.
1165
Federal standards with which the new technologymust
1166
comply.
1167
1168
1169
g.
1170
Organizational training needs.
1171
1172
1173
Page 28 GAO/IMTEC-8.1.4 Assessing Acquisition Risks Chapter 4
1174
Needs / Requirements / Specifications
1175
1176
1177
h.
1178
Interfaces with other systems.
1179
1180
1181
i.
1182
User interface requirements.
1183
1184
1185
j.
1186
Compatibility limitation requirements.
1187
1188
1189
k.
1190
Capability or performance validation
1191
requirements.
1192
1193
1194
4. Determine whether the requirements analysisprovides for:
1195
1196
1197
a.
1198
A methodology for having users validate therequirements
1199
analysis for both capability and performance. (See ch. 2 for
1200
related questions).
1201
1202
1203
b.
1204
Measurable requirements that may be used later toverify
1205
system effectiveness.
1206
1207
1208
1209
1210
5.
1211
Determine if the requirements are presented infunctional
1212
or performance terms in consideration of full and open competition.
1213
Functional requirements promote full and open competition, while
1214
performance requirements may not.
1215
1216
1217
6.
1218
With regard to restrictive requirements (which donot lead
1219
to full and open competition), determine:
1220
1221
1222
1223
1224
a.
1225
If brand-name-or-equal or specific make and
1226
modelrestrictions are appropriately justified.
1227
1228
1229
b.
1230
Whether all required justifications are completed and
1231
approved for other compatibility-limited requirements.
1232
1233
1234
(See ch. 6, step 3, for more information on procurements that do
1235
not promote full and open competition).
1236
Page 29 GAO/IMTEC-8.1.4 Assessing Acquisition Risks Chapter 4
1237
Needs / Requirements / Specifications
1238
1239
1240
Audit Steps: Specifications
1241
7. With regard to the process of revising requirementsduring the
1242
acquisition, determine:
1243
1244
1245
a.
1246
Whether a core of basic requirements has beenidentified
1247
in order to maintain project scope.
1248
1249
1250
b.
1251
If a formal change control process has beenestablished to
1252
manage changes when necessitated by a changing
1253
environment.
1254
1255
1256
c.
1257
Who is responsible for reviewing and approvingchanges to
1258
requirements.
1259
1260
1261
d.
1262
How often requirements have been changed.
1263
1264
1265
e.
1266
Whether proposed new requirements are validatedagainst
1267
mission needs.
1268
1269
1270
f.
1271
What process is used to analyze the impacts ofchanges on
1272
the other elements of the requirements.
1273
1274
1275
1276
1277
1.
1278
Determine whether functional users and/or theprogram
1279
manager confirmed that the specifications accurately reflect the
1280
requirements and conform to the approved acquisition strategy
1281
discussed in the acquisition strategy module. Did users or the
1282
program manager sign off on the system specifications? (See ch. 2
1283
for related questions.)
1284
1285
1286
2.
1287
Examine the specifications document for:
1288
1289
1290
1291
1292
a.
1293
A summary of the functional requirements to besatisfied
1294
by the technology.
1295
1296
1297
b.
1298
Performance evaluation requirements.
1299
1300
1301
c.
1302
Performance requirements that addressinformation
1303
accuracy; data integrity requirements;
1304
1305
1306
Page 30 GAO/IMTEC-8.1.4 Assessing Acquisition Risks Chapter 4
1307
Needs / Requirements / Specifications
1308
timing for response, update processing, information transfer,
1309
transmission, and throughput; and flexibility to changes in the
1310
requirements.
1311
1312
1313
d.
1314
An identification of new types of equipmentrequired
1315
(e.g., processors, input/output devices, or information
1316
transmission devices).
1317
1318
1319
e.
1320
An identification of support and test
1321
software.
1322
1323
1324
f.
1325
A description of interfaces.
1326
1327
1328
g.
1329
A description of overall security and
1330
privacyrequirements.
1331
1332
1333
h.
1334
A description of the operational controls
1335
needed.
1336
1337
1338
i.
1339
A description of the operating characteristics of theuser
1340
and computer centers where the software will be used.
1341
1342
1343
j.
1344
A description of the logic flow of the entire
1345
system.
1346
1347
1348
k.
1349
A specification of the functions to be satisfied bythe
1350
software.
1351
1352
1353
1354
1355
3.
1356
Determine how restrictions to full and opencompetition in
1357
the specifications (e.g., equipment characteristics and performance
1358
elements) are handled. Ensure that all required justifications are
1359
completed and properly approved for such restrictions. (See ch. 6,
1360
step 3, for more information on procurements that do not promote
1361
full and open competition.)
1362
1363
1364
4.
1365
Determine how changes to the originalspecifications are
1366
handled.
1367
1368
1369
Page 31 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
1370
Chapter 4 Needs / Requirements / Specifications
1371
1372
1373
Audit Steps: Test Plans
1374
1375
1376
a.
1377
Establish responsibility for reviewing and approving
1378
changes to specifications. Interview users to determine whether or
1379
not they actually reviewed and approved changes to specifications.
1380
(See ch. 2, step 2e, under User Involvement.)
1381
1382
1383
b.
1384
Review documentation on change requests.Determine how
1385
often specifications are changed, whether new specifications are
1386
validated against requirements, and what process is used to
1387
identify impacts of changes on other elements of
1388
specifications.
1389
1390
1391
5. Determine if feedback (comments and questions)from users and
1392
industry is accounted for, considered, and incorporated as
1393
appropriate on a continual basis. (See ch. 7, step 6, for related
1394
information.)
1395
1396
1397
1.
1398
Determine if the agency has developed test plansbased on
1399
acceptance criteria furnished or validated by the users.
1400
1401
1402
2.
1403
Verify that test plans incorporate security
1404
andcertification requirements.
1405
1406
1407
3.
1408
Determine if test plans adequately measure
1409
systemperformance requirements to be specified in the request for
1410
proposals (RFP).
1411
1412
1413
(Note: Refer to ch. 10 for more information on test plans.)
1414
• FIRMR 201-20.1: Requirements Analysis.
1415
1416
1417
References
1418
1419
1420
1421
FIRMR 201-20.303: Standards.
1422
1423
1424
1425
Federal Acquisition Regulation (FAR) Part 6: Competition
1426
Requirements.
1427
1428
1429
Page 32 GAO/IMTEC-8.1.4 Assessing Acquisition Risks Chapter 4
1430
Needs / Requirements / Specifications
1431
1432
1433
1434
FAR Part 10: Specifications, Standards, and Other
1435
Purchase Descriptions.
1436
1437
1438
1439
1440
GSA, Guide for Requirements Analysis and
1441
Analysis
1442
1443
of Alternatives, Chapter 2: Requirements Analysis.
1444
1445
1446
1447
1448
American National Standards Institute/Institute for
1449
Electrical and Electronic Engineers (ANSI/IEEE) Standard 830: IEEE
1450
Guide to Software Requirements
1451
1452
Specifications.
1453
1454
1455
1456
GAO, Information Technology: A Model to Help
1457
1458
1459
Managers Decrease Acquisition Risks
1460
(GAO/IMTEC-8.1.6, August 1990), Phase I, steps 1, 6, 11, 12, 13,
1461
14.
1462
• Federal Information Processing Standards (FIPS) Publication
1463
64: Guidelines for Documentation of
1464
Computer Programs and Automated Data Systems for
1465
the Initiation Phase.
1466
• FIPS Publication 101: Guideline for Lifecycle
1467
Validation, Verification, and Testing of Computer
1468
Software.
1469
Chapter 5
1470
1471
1472
1473
Alternatives
1474
1475
Audit Objectives
1476
After identifying its requirements, the agency should assess
1477
alternatives for cost-effectively meeting those requirements. The
1478
approach selected should reflect an understanding of what is
1479
available in the commercial market as well as what is available
1480
within the government. Approaching the acquisition this way will
1481
lessen, but not eliminate, the risk that an agency may select an
1482
alternative that does not fully meet user requirements or that is
1483
unnecessarily complex and expensive.
1484
1485
1486
1.
1487
To determine if the agency has considered allreasonable
1488
alternatives for meeting its needs.
1489
1490
1491
2.
1492
To determine if the agency identified the risks,costs,
1493
and benefits of each alternative.
1494
1495
1496
3.
1497
To verify that the agency selected an
1498
alternativebalancing expected benefits against costs, time, and
1499
risks of failure.
1500
1501
1502
1503
1504
Documentation Required
1505
1506
1507
1508
Record of alternatives analysis, such as a system
1509
decision paper. Economic and risk analyses should accompany or be a
1510
part of the decision paper.
1511
1512
1513
1514
Market survey research conducted to identify alternatives
1515
for meeting user needs and to support cost estimates.
1516
1517
1518
1519
Findings and approvals statements to support restrictions
1520
on specifications, such as compatibility-limited
1521
requirements.
1522
1523
1524
1525
Cost/benefit analysis to justify the selection of the
1526
alternative selected over other alternatives, in dollar terms or in
1527
terms of some other criteria, such as effectiveness.
1528
1529
1530
1. Assess the involvement of responsible parties andAudit Steps
1531
verify whether:
1532
1533
1534
a.
1535
Users agreed with the range of alternativesconsidered and
1536
were involved in validating those alternatives against the original
1537
requirements. (For related information on this and the next point
1538
see ch. 2, steps 2c and 2d, under User Involvement.)
1539
1540
1541
b.
1542
Users agreed with the alternative finally
1543
selected.
1544
1545
1546
c.
1547
Appropriate senior management approved thealternative
1548
selected. (See ch. 2, step 2, under Top-management Support, for
1549
more information.)
1550
1551
1552
d.
1553
The Contracting Officer or other contracting personnel
1554
participated in the alternatives analysis to ensure that a feasible
1555
acquisition approach was selected.
1556
1557
1558
e.
1559
Project staff conducted market surveys to determine how
1560
industry can best meet the agency's requirements.
1561
1562
1563
1564
1565
2.
1566
Ensure that the agency considered, as appropriate,the
1567
alternatives included in GAO's acquisition model and FIRMR
1568
201-20.203-1.
1569
1570
1571
3.
1572
Assess how the agency evaluated alternatives
1573
bydetermining whether:
1574
1575
1576
1577
1578
a.
1579
The agency consistently analyzed alternatives usingthe
1580
same criteria for each alternative.
1581
1582
1583
b.
1584
The alternatives are described in sufficient detail to
1585
support time and cost estimates and cost/benefit
1586
analyses.
1587
1588
1589
c.
1590
The alternatives considered fit within the agency's
1591
information architecture.
1592
1593
1594
d.
1595
The range of alternatives considered was restricted by
1596
resource assumptions (staff or funding limitations).
1597
1598
1599
4. Determine whether the agency consistentlyanalyzed the costs
1600
and benefits of each alternative. Ensure that the economic analysis
1601
includes present values for costs and benefits and is updated
1602
periodically. Identify the system life used as a basis for
1603
evaluating alternatives and determine whether it appears realistic
1604
in light of user needs, expected changes in the technology,
1605
expected availability of maintenance and other support, and the
1606
time needed to prepare subsequent acquisitions. Verify that the
1607
economic analysis includes a sensitivity analysis to identify
1608
factors that affect the choice of one alternative over another. The
1609
costs and benefits considered for each alternative should
1610
include:
1611
1612
1613
a.
1614
Conversion costs.
1615
1616
1617
b.
1618
Personnel costs.
1619
1620
1621
c.
1622
Operation and maintenance costs.
1623
1624
1625
d.
1626
Nonrecurring but quantifiable benefits in terms of
1627
information processing, administration, and support (these may
1628
include cost reductions resulting from improved system operations
1629
or value enhancement through improved use of resources).
1630
1631
1632
e.
1633
Recurring and quantifiable benefits on a monthly and/or
1634
quarterly basis over the system life from reductions in such items
1635
as salaries, fringe benefits, supplies, utilities, and space
1636
occupancy.
1637
1638
1639
Page 36 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
1640
f. Any nonquantifiable benefits, such as improved service and
1641
enhanced organizational image.
1642
5. Determine whether the agency analyzed thefollowing noncost
1643
factors for each feasible alternative:
1644
1645
1646
a.
1647
Obsolescence: strategies for avoiding outdatedresources
1648
over the system life. A technology upgrade clause is one way to
1649
avoid obsolescence by allowing an agency to buy advanced versions
1650
of equipment or software when they become available.
1651
1652
1653
b.
1654
Availability: to what extent the system will beavailable
1655
to users.
1656
1657
1658
c.
1659
Reliability: how frequently the system requirescorrective
1660
maintenance.
1661
1662
1663
d.
1664
Maintainability: the ease with which failed
1665
systemcomponents can be repaired, taking into account the level of
1666
service, personnel support, and supplies needed.
1667
1668
1669
e.
1670
Expandability: the ease with which the system canbe
1671
enhanced to meet anticipated growth.
1672
1673
1674
f.
1675
Flexibility: the extent to which the alternative can
1676
accommodate changes in the nature of the work load.
1677
1678
1679
g.
1680
Security: the ability to prevent unauthorized access and
1681
tampering and consideration of national security and emergency
1682
preparations.
1683
1684
1685
h.
1686
Privacy: the extent to which the privacy
1687
ofpersonnel-related data can be maintained.
1688
1689
1690
Page 37 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
1691
1692
1693
i.
1694
Affect on personnel: the impact on the level of support
1695
personnel needed, including the skills required.
1696
1697
1698
j.
1699
User acceptance: the overall impact on the user
1700
community, including the amount of change to user
1701
procedures.
1702
1703
1704
k.
1705
Accountability: the ability of the alternative toallow
1706
system activity to be tracked and measured.
1707
1708
1709
1710
1711
6.
1712
Review the risk analysis to see if it identifiessensitive
1713
data and vulnerabilities. Verify that the magnitude of each
1714
vulnerability has been stated. Determine whether or not the risk
1715
analysis conforms with the standards identified in FIPS
1716
Publications 65 and 73 and OMB Circular A-130.
1717
1718
1719
7.
1720
Verify that each alternative is evaluated forfinancial,
1721
technical, and schedule risks. Financial risk refers to the extent
1722
to which each alternative is subject to unexpected additional
1723
costs. Technical risk indicates the probability that each
1724
alternative's technical objectives will prove difficult to achieve
1725
in whole or in part. Schedule risk is the extent to which each
1726
alternative is subject to unexpected schedule delays and slippage
1727
in meeting the system's technical objectives, regardless of
1728
cost.
1729
1730
1731
8.
1732
Ensure that the agency has selected the mostadvantageous
1733
and realistic alternative with respect to benefits, costs, and
1734
risks (based on steps 4 and 7).
1735
1736
1737
9.
1738
Verify that users and senior managers approve anychanges
1739
to the planned scope of the project.
1740
1741
1742
• FIRMR Part 201-20.2: Analysis of Alternatives.
1743
1744
1745
References
1746
• GAO, Information Technology: A Model to Help
1747
Managers Decrease Acquisition Risks
1748
(GAO/IMTEC-8.1.6, August 1990), Phase I, steps 7, 8,
1749
9.
1750
1751
1752
1753
1754
GSA, Guide for Requirements Analysis and
1755
Analysis
1756
1757
of Alternatives, Chapter 3: Analysis of Alternatives.
1758
1759
1760
1761
OMB Circular A-130: Management of Federal Information
1762
Resources.
1763
1764
1765
1766
OMB Circular A-109: Major System Acquisitions.
1767
1768
1769
1770
OMB Circular A-76: Performance of Commercial
1771
Activities.
1772
1773
1774
1775
FIPS Publication 64: Guidelines for Documentation
1776
of
1777
1778
1779
Computer Programs and Automated Data Systems for
1780
the Initiation Phase.
1781
1782
1783
1784
1785
FIPS Publication 65: Guidelines for Automatic
1786
Data
1787
1788
Processing Risk Analysis.
1789
1790
1791
1792
FIPS Publication 73: Guidelines for Security
1793
of
1794
1795
1796
Computer Applications.
1797
Chapter 6
1798
1799
1800
1801
Acquisition Planning
1802
Acquisition planning is the process of coordinating and
1803
integrating the efforts of personnel responsible for acquisitions.
1804
A major objective of acquisition planning is to promote and provide
1805
for full and open competition. To ensure that the planning is
1806
accomplished in an effective, economical, and timely manner, the
1807
agency should prepare an acquisition plan containing an overall
1808
strategy for managing the preaward, acquisition, and postaward
1809
phases.
1810
An effective acquisition plan is critical to project success.
1811
The plan sets out what the agency will do to complete a procurement
1812
and how it will do it. The plan also specifies the type of contract
1813
that will be awarded, how the agency will select a contractor, cost
1814
and schedule goals, milestones, significant risk areas, and
1815
contract management controls.
1816
Auditors should assess the extent to which the agency's
1817
acquisition planning is realistic and comprehensive. One part of
1818
this assessment should be the review of the Agency Procurement
1819
Request (APR) to ascertain whether it is complete and accurately
1820
reflects the objectives and scope of the project.
1821
To verify that the agency has defined an effectiveAudit
1822
Objective strategy and plan for selecting a contractor and managing
1823
contract performance.
1824
• Acquisition plan and related documents as
1825
1826
Documentation
1827
appropriate, such as a plan of action and milestones.Required •
1828
Agency procurement request and other correspondence with GSA.
1829
1. Determine whether the acquisition plan was
1830
Audit Steps reviewed and approved in a timely manner by the
1831
officials designated in the agency's acquisition regulations.
1832
Ensure that the program manager periodically reviews the
1833
acquisition plan and updates it when necessary.
1834
2. Review the acquisition plan and determine if itcontains the
1835
elements required by the FAR Section 7.1 and GAO's Information
1836
Technology: A Model to Help
1837
Managers Decrease Acquisition Risks. These elements
1838
include acquisition objectives; cost goals; responsible
1839
decision-makers; capability or performance characteristics; risks
1840
associated with technical matters, scheduling, and costs; plan of
1841
action; competition; source selection procedures; contract type and
1842
special contract provisions; contract management procedures or
1843
organization; budget and funding; information needed to monitor
1844
contractor performance; test and evaluation; security and privacy;
1845
and acquisition milestones. The plan should also identify the
1846
acquisition method, key "go/no-go" points, a formal training plan,
1847
and a contingency plan to minimize losses.
1848
1849
1850
3.
1851
Determine if the acquisition plan calls for full andopen
1852
competition. If the plan calls for limiting the acquisition to
1853
resources compatible with existing equipment, verify that
1854
conversion cost studies have been completed to justify
1855
compatibility restrictions. If the plan calls for other than full
1856
and open competition, verify that restrictions on competition, such
1857
as make and model restrictions or sole source requirements, have
1858
been justified and approved by the designated authority. (See ch. 4
1859
step 6, under Requirements and step 3, under
1860
Specifications.)
1861
1862
1863
4.
1864
Determine whether the agency has planned a"grand design"
1865
project or organized the acquisition
1866
1867
1868
Page 41 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
1869
into modules. Incremental purchasing may limit risks by
1870
identifying problems earlier, which allows for easier change or
1871
correction.
1872
1873
1874
5.
1875
Evaluate the project management tools andtechniques to
1876
satisfy management information requirements for monitoring
1877
contractor performance, tracking progress against the acquisition
1878
plan, and taking action on cost or schedule slippage.
1879
1880
1881
6.
1882
Review the agency's schedule for developing
1883
thesolicitation document and for source selection activities.
1884
Assess the reasonableness of the schedule through discussions with
1885
procurement officials and reviews of project progress.
1886
1887
1888
7.
1889
Identify the dollar limit of the agency's
1890
generaldelegation of procurement authority from GSA. Confirm that
1891
the agency receives a specific delegation of authority from GSA if
1892
the value of the acquisition exceeds the agency's authority level.
1893
Confirm that the new delegation of procurement authority was
1894
received before a solicitation document is issued or a contract
1895
awarded.
1896
1897
1898
8.
1899
Review the APR if the acquisition exceeds theagency's
1900
delegated procurement authority level. Determine if the APR
1901
identifies the officials responsible for managing the effort, in
1902
accordance with the GSA guidance provided in FIRMR Bulletin C-5.
1903
The APR should include:
1904
1905
1906
1907
1908
a.
1909
Names and titles of senior project officials, with
1910
adescription of their roles in the organization. If the acquisition
1911
exceeds $25 million, the APR should also describe the project
1912
manager's experience in previous acquisitions, responsibilities,
1913
and scope of authority, and the reporting structure for each
1914
official as well as whether each official is assigned full- or
1915
part-time to the acquisition.
1916
1917
1918
b.
1919
The project title and a brief description of the
1920
acquisition.
1921
1922
1923
c.
1924
Information resources currently in use.
1925
1926
1927
d.
1928
Resources to be acquired.
1929
1930
1931
e.
1932
The contracting approach. The approach shouldinclude any
1933
limitations on competition, the planned dates for release of the
1934
solicitation and for contract award, and a strategy for a follow-on
1935
implementation if a prototype is to be used.
1936
1937
1938
f.
1939
Estimated contract life and contract cost.
1940
1941
1942
g.
1943
Completion dates for key project documents.
1944
1945
1946
• FAR Part 7: Acquisition Planning.
1947
1948
1949
References
1950
1951
1952
1953
FAR Part 34: Major System Acquisition.
1954
1955
1956
1957
GSA, Overview Guide, p. 4-3.
1958
1959
1960
1961
OMB Circular A-109: Major System Acquisitions.
1962
1963
1964
1965
GAO, Information Technology: A Model to Help
1966
1967
1968
Managers Decrease Acquisition Risks
1969
(GAO/IMTEC-8.1.6, August 1990), Phase I, step 10.
1970
• FIRMR Bulletin C-5: Delegation of Procurement Authority for a
1971
Specific Acquisition.
1972
Page 43 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
1973
Chapter 7
1974
1975
1976
1977
Solicitation Document
1978
A solicitation document provides information necessary for
1979
vendors to propose equipment, software, and services to meet the
1980
agency's requirements. In most cases, information resources will be
1981
purchased by issuing an RFP, which forms the basis for the
1982
resulting contract. Less commonly, an agency may acquire
1983
information resources using an invitation for bids. An RFP may be
1984
preceded by a request for information or request for quotation.
1985
An RFP should be clear and comprehensive and include the
1986
elements described in GSA's guidance on standard solicitation
1987
documents. 1 The areas of most interest to auditors include section
1988
C: Description/Specifications/Work Statement, section
1989
E: Inspection and Acceptance, and section M:Evaluation Factors
1990
for Award. Section C describes the tasks to be performed by the
1991
contractor and the products to be delivered. Section E sets out
1992
government and contractor responsibilities in ensuring that
1993
contract deliverables are acceptable to the agency. Section M
1994
explains how the agency intends to select a winning contractor by
1995
describing the importance of all factors to be considered in
1996
evaluating proposals.
1997
In developing the RFP an agency may hold presolicitation or
1998
preproposal conferences in order to seek industry views on the
1999
planned acquisition and to encourage companies to offer proposals.
2000
Once the RFP is developed, it may be released in draft form in
2001
order to obtain industry questions and reactions. Auditors should
2002
determine what steps the agency has taken to get feedback on its
2003
requirements, how the agency has handled comments or questions on a
2004
proposed RFP, and whether the agency has acted to ensure that
2005
contractor proposals are competitive.
2006
1See, for example, U.S. General Services Administration,
2007
Information Resources Management Service, Overview Guide:
2008
Acquisition of Information Resources, (Jan. 1990).
2009
A proper RFP is a critical element of a successful acquisition
2010
because it becomes part of the binding contract once a proposal is
2011
made and accepted. If the RFP does not accurately and clearly
2012
describe the agency's requirements, or if the evaluation factors do
2013
not accurately reflect the agency's priorities, then the resulting
2014
acquisition may not meet user needs. If the RFP is unjustifiably
2015
restrictive, favoring one contractor over others, the agency may be
2016
unable to benefit from full and open competition.
2017
Auditors should become familiar with the standard format for an
2018
RFP. The audit team should include persons sufficiently
2019
knowledgeable about the information technology being purchased to
2020
judge how well the agency has defined its requirements in the RFP.
2021
Team members should include or have access to people who can
2022
identify areas where the RFP does not define the agency's needs
2023
well enough to protect the government's interests. These persons
2024
should also know enough about performance or capability validation
2025
techniques to determine whether or not the agency's requirements
2026
are reasonable and effective.
2027
Audit Objectives To determine whether or not the solicitation
2028
document is complete, clear, and consistent, verify that
2029
requirements continue to reflect user needs, and determine if the
2030
proposed evaluation process will result in an effective and
2031
economical acquisition.
2032
2033
Documentation Required
2034
2035
2036
2037
Record of presolicitation or preproposal
2038
conference.
2039
2040
2041
2042
Solicitation document: RFP or invitation for bid. Draft
2043
RFPs and Requests for Information, if any were issued.
2044
2045
2046
2047
Report of a solicitation review panel or committee if
2048
appropriate.
2049
2050
2051
2052
Source selection plan.
2053
2054
2055
2056
Benchmark materials or other capability and performance
2057
validation requirements.
2058
2059
2060
2061
Vendor comments or questions on solicitation document. If
2062
a vendor protests the solicitation determine the basis of the
2063
protest and how it was resolved.
2064
2065
2066
2067
Proposal evaluation guide.
2068
2069
2070
Audit Steps 1. Determine whether the solicitation document
2071
contains:
2072
2073
2074
a.
2075
A statement of work or specifications statementthat
2076
clearly and accurately describes the government's requirements,
2077
including a clear definition of all deliverables and the conditions
2078
of their acceptability.
2079
2080
2081
b.
2082
A clear definition of government and contractor
2083
responsibilities.
2084
2085
2086
c.
2087
The relative importance of evaluation factors.
2088
2089
2090
d.
2091
A proposal format requiring that cost and
2092
technicalelements be separated.
2093
2094
2095
e.
2096
Reasonable provisions that protect the agency(such as
2097
liquidated damages provisions) or give incentives to the contractor
2098
(such as bonuses for good performance). Identify option clauses
2099
that create uncertainty in work-load projections.
2100
2101
2102
2. Examine the evaluation criteria to ensure:
2103
2104
2105
a.
2106
They are consistent with the requirements
2107
analysis,specifications, and proposal preparation
2108
instructions.
2109
2110
2111
b.
2112
They provide all the factors and significantsubfactors to
2113
be considered in evaluating offers and the relative importance of
2114
different technical or cost factors, in accordance with FAR
2115
15.605.
2116
2117
2118
3. Evaluate the performance evaluation package theagency will
2119
use. Determine whether the agency reimburses contractors for
2120
participating in benchmarking or other testing, and whether the
2121
cost of such performance evaluation efforts constitutes a barrier
2122
to competition.
2123
2124
2125
a.
2126
If there is a benchmark, has the benchmark been
2127
independently examined by some outside organization? Review the
2128
benchmark plan to confirm that demonstration criteria are clearly
2129
stated. Determine how the agency selected a representative mix of
2130
programs for the benchmark. Determine if the complexity of programs
2131
in the benchmark is representative of the projected work load.
2132
Determine how the agency validated the benchmark as representative
2133
of the agency's work load.
2134
2135
2136
b.
2137
If there is simulation or modeling, determine how the
2138
agency selected parameters for the model. Review any concerns or
2139
complaints raised by vendors.
2140
2141
2142
c.
2143
If a compute-off (demonstration of prototypes) is to be
2144
used, confirm that the agency has established plans for prototype
2145
and follow-on contracts.
2146
2147
2148
4. Interview users and managers, if necessary, todetermine
2149
whether they concur with the solicitation. Determine whether users
2150
or managers identify new or changed requirements not included in
2151
the RFP. Find out if there are any factors considered important for
2152
selecting an offer that are not included in the
2153
Page 47 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2154
evaluation criteria or if other included factors unfairly
2155
restrict the competition. (For related information see ch. 2, step
2156
2g, under User Involvement.)
2157
2158
2159
5.
2160
Review the agency's source selection plan to ensurethat
2161
it clearly describes the source selection organization and
2162
activities. Ensure that the source selection plan has been approved
2163
by the source selection authority before presolicitation
2164
conferences are held or the solicitation document is issued, in
2165
accordance with FAR 15.612.
2166
2167
2168
6.
2169
Review the industry feedback process anddetermine
2170
if:
2171
2172
2173
2174
2175
a.
2176
Comments received on the draft solicitationidentify any
2177
need for clarification, restrictive specifications, or alternative
2178
ways of satisfying user needs. (See ch. 4, step 5 under
2179
Specifications, for a related question.)
2180
2181
2182
b.
2183
The agency responded promptly and thoroughly tothe
2184
comments received. (Judgmental sampling techniques may be required
2185
in this section if the number of vendors and vendor comments are
2186
substantial.)
2187
2188
2189
c.
2190
The feedback provided adequate comments onproduct
2191
availability in the market.
2192
2193
2194
d.
2195
The use of an ombudsman facilitated the process of
2196
addressing vendor concerns, disputes, and grievances.
2197
2198
2199
2200
2201
7.
2202
Determine who has performed legal reviews of
2203
thesolicitation document.
2204
2205
2206
8.
2207
Determine if any vendor submitted a protest, towhom (the
2208
agency, GAO, or GSA's Board of Contract
2209
2210
2211
Page 48 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2212
Appeals), and how it was resolved. Determine the basis of the
2213
protest and its resolution.
2214
• GSA, Overview Guide, Chapter 6.
2215
2216
2217
References
2218
2219
2220
2221
2222
FAR, Part 15: Contracting by Negotiation,
2223
Subpart
2224
2225
15.4: Solicitation and Receipt of Proposals andQuotations;
2226
Subpart 15.612: Formal Source Selection; Subpart 15.605: Evaluation
2227
Factors.
2228
2229
2230
2231
FAR Part 14: Sealed Bidding.
2232
2233
2234
2235
FAR Part 5: Publicizing Contract Actions.
2236
2237
2238
2239
FAR Part 34: Major System Acquisition.
2240
2241
2242
2243
GAO, Information Technology: A Model to Help
2244
2245
2246
Managers Decrease Acquisition Risks
2247
(GAO/IMTEC-8.1.6, August 1990), Phase II, steps 2 through 7.
2248
• FIPS Publications 75 and 42-1.
2249
Chapter 8
2250
2251
2252
2253
Source Selection
2254
The source selection process is critical to securing the best
2255
value for the government. All proposals must be evaluated in
2256
accordance with the criteria published in the RFP. If the
2257
evaluation process does not conform to the RFP the agency runs a
2258
greater risk of a successful bid protest by losing vendors. The
2259
agency should receive proposals, evaluate the technical and cost
2260
merits of different proposals, negotiate with contractors, and
2261
award a contract in accordance with a source selection plan
2262
developed before release of the RFP.
2263
The auditor should be aware of the agency's organization and
2264
procedures for making a contract award. Agencies may use some or
2265
all of the following positions:
2266
2267
2268
2269
Contracting Officer (CO). The Contracting Officer
2270
publicizes the procurement, amends the RFP if necessary, and
2271
conducts all negotiations with offerors.
2272
2273
2274
2275
Source Selection Authority (SSA). The SSA makes the final
2276
decision on contract award. The Contracting Officer may be the SSA
2277
for some procurements, while in other cases a more senior manager
2278
may serve as SSA.
2279
2280
2281
2282
Source Selection Advisory Council (SSAC). The SSAC
2283
reviews the evaluations of different proposals and makes a
2284
recommendation to the SSA on contract award.
2285
2286
2287
2288
Source Selection Evaluation Board (SSEB). The SSEB
2289
conducts technical and cost evaluations of vendor
2290
proposals.
2291
2292
2293
To ensure that the source selection process isAudit Objective
2294
planned and carried out in order to successfully reach a contract
2295
that gives the best value to the government.
2296
Page 50 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2297
• Source selection plan, including source selection
2298
2299
Documentation
2300
organization.
2301
Required • Lessons learned report or other report by the
2302
Contracting Officer describing negotiations and selection
2303
activities.
2304
2305
2306
2307
Contracting Officer's contract file.
2308
2309
2310
2311
Records of debriefings, if any.
2312
2313
2314
2315
Results of benchmarks or other performance and capability
2316
validation techniques used.
2317
2318
2319
2320
Correspondence between offerors and the agency regarding
2321
questions or clarifications and any amendments to the
2322
RFP.
2323
2324
2325
2326
Proposal evaluation guide.
2327
2328
2329
2330
Preaward survey reports.
2331
2332
2333
2334
2335
Audit Steps
2336
1. Examine the evaluation process by reviewingrecords of the
2337
source selection procedures and determine:
2338
2339
2340
a.
2341
If evaluation personnel strictly adhered to andapplied
2342
the publicized evaluation process and criteria in the
2343
solicitation.
2344
2345
2346
b.
2347
If evaluation factors were applied that were notlisted in
2348
the solicitation.
2349
2350
2351
c.
2352
Whether cost and technical evaluations were done
2353
separately.
2354
2355
2356
d.
2357
The role users played in the evaluation process. (See ch.
2358
2, step 2g, for related question.)
2359
2360
2361
e.
2362
If the process resulted in (1) the establishment of a
2363
competitive range and (2) removal of offerors from further
2364
consideration, in accordance with FAR 15.609.
2365
2366
2367
2368
2369
2.
2370
Determine how many vendors received thesolicitation and
2371
how many submitted proposals.
2372
2373
2374
3.
2375
Determine if any vendor submitted a protest and, ifso,
2376
whether the protest was handled by the agency, GAO, or GSA's Board
2377
of Contract Appeals. What was the basis of the protest? How was the
2378
protest resolved?
2379
2380
2381
4.
2382
Determine whether the Contracting Officerestablished
2383
prenegotiation objectives for cost, profit and fee, and other
2384
issues in accordance with FAR 15.807. These objectives should help
2385
determine the overall reasonableness of proposed prices, and may be
2386
based on an independent government cost estimate and other
2387
information, such as a field pricing report on each contractor's
2388
proposal.
2389
2390
2391
5.
2392
Determine if the agency obtained field pricingsupport in
2393
accordance with FAR 15.805-5. Was a preaward audit of the cost
2394
proposal obtained and used during negotiations? Were the offeror's
2395
proposed rates compared with the direct, indirect, overhead, and
2396
general and administrative rates recommended by the appropriate
2397
contract audit activity?
2398
2399
2400
6.
2401
Examine the negotiation process.
2402
2403
2404
2405
2406
a.
2407
Confirm that discussions with all vendors in the
2408
competitive range were held and the proceedings
2409
documented.
2410
2411
2412
b.
2413
Determine from a review of documentation the controls
2414
that existed to protect the security of sensitive
2415
information.
2416
2417
2418
c.
2419
Contact responsible officials for their evaluationsof
2420
security.
2421
2422
2423
Page 52 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2424
2425
2426
d.
2427
Determine if technical leveling or technicaltransfusions
2428
occurred that would change vendors' proposals. FAR 15.610 describes
2429
these and other prohibited actions, such as indicating a cost or
2430
price that offerors must meet to be considered for contract award
2431
or informing a vendor of its price standing relative to others
2432
seeking the contract.
2433
2434
2435
e.
2436
Determine if estimated life cycle costs werereconciled
2437
with each vendor's proposal to ensure that cost estimates appear
2438
realistic.
2439
2440
2441
7. Examine how the agency handled best and finaloffers.
2442
2443
2444
a.
2445
Determine if the agency made multiple calls forbest and
2446
final offers, justified in accordance with FAR 15.611.
2447
2448
2449
b.
2450
Determine if the best and final offers were solicitedand
2451
evaluated in accordance with the source selection plan.
2452
2453
2454
8. Determine if all debriefings:
2455
2456
2457
a.
2458
Were scheduled as soon as possible whenrequested by the
2459
vendor.
2460
2461
2462
b.
2463
Were based on a debriefing plan that addressed
2464
andresolved issues likely to cause concern and complaints among the
2465
losing vendors.
2466
2467
2468
c.
2469
Were documented.
2470
2471
2472
d.
2473
Adequately explained why the losing vendor(s) lostthe
2474
contract. (Note: In the explanation, the agency cannot make
2475
point-by-point comparisons with other proposals, but can point out
2476
the government's evaluation of significantly weak or deficient
2477
elements in the proposal of the vendor being debriefed. Refer to
2478
FAR 15.1003 for more information.)
2479
2480
2481
9. Examine the effort made to identify lessonslearned.
2482
2483
2484
a.
2485
Determine what policies or procedures the agencyusers
2486
have to evaluate acquisition results and communicate "lessons
2487
learned" to staff conducting future assignments and to other
2488
agencies. Do these include a comparison of the preaward activities
2489
to the acquisition plan?
2490
2491
2492
b.
2493
Review the lessons learned report, if one wascompleted,
2494
to determine how agency officials assessed the contracting
2495
process.
2496
2497
2498
• FAR Part 15: Contracting by Negotiation:
2499
2500
2501
References
2502
Subpart 15.4: Proposals and Quotations. Subpart 15.6: Source
2503
Selection. Subpart 15.8: Price Negotiations. Subpart 15.10:
2504
Notifications, Protests, and Mistakes.
2505
2506
2507
2508
FIRMR Part 201-39: Acquisition of Federal Information
2509
Processing Resources by Contracting.
2510
2511
2512
2513
GSA, Overview Guide, Chapter 7: Source
2514
Selection.
2515
2516
2517
2518
GSA, Guide for Acquiring Commercial Software.
2519
2520
2521
2522
GAO, Information Technology: A Model to Help
2523
2524
2525
Managers Decrease Acquisition Risks
2526
(GAO/IMTEC-8.1.6, August 1990), Phase II, steps 8 through
2527
13.
2528
Page 54 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2529
Chapter 9
2530
2531
2532
2533
Contract Management
2534
Contract management includes the steps required to ensure that
2535
the agency receives products and services within established costs
2536
and time frames. An agency is required to monitor contractor
2537
performance, ensuring that work done conforms to the agency's
2538
requirements. The agency must also control changes to the contract
2539
and accept or reject contract deliverables. Finally, an agency
2540
should conduct postimplementation reviews to determine how well
2541
acquisition goals were met and whether the information resources
2542
acquired should be added to or replaced.
2543
The agency's Contracting Officer and Contracting Officer's
2544
Representative/Contracting Officer's Technical Representative hold
2545
primary responsibility for administering the contract. The
2546
Contracting Officer monitors costs as required by the contract type
2547
(fixed-price or cost-reimbursable) and makes contract modifications
2548
as needed. The program manager helps monitor contractor performance
2549
to ensure that user requirements are met by the products or
2550
services delivered and that senior officials provide support and
2551
oversight.
2552
A contract consists of the agency's RFP, as amended, and the
2553
successful vendor's proposal. The contract should specify all
2554
deliverables required from the vendor. The Contracting Officer and
2555
Contracting Officer's Representative/Contracting Officer's
2556
Technical Representative should ensure that deliverables are
2557
received as required. Any status and cost reports required from the
2558
contractor should be reviewed and action taken to correct problems,
2559
if necessary. Training, documentation, and maintenance requirements
2560
should be fulfilled.
2561
Page 55 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2562
2563
Audit Objectives
2564
To ensure that the agency:
2565
2566
2567
1.
2568
Oversees contractor performance.
2569
2570
2571
2.
2572
Ensures that contract requirements continue toaccurately
2573
reflect user needs.
2574
2575
2576
3.
2577
Verifies that products and services delivered meetuser
2578
needs.
2579
2580
2581
4.
2582
Implements configuration management.
2583
2584
2585
5.
2586
Modifies the contract only as needed.
2587
2588
2589
6.
2590
Enforces contract provisions intended to protectthe
2591
agency, such as warranties or liquidated damages
2592
clauses.
2593
2594
2595
• Agency regulations or directives specifying
2596
2597
2598
Documentation
2599
requirements for periodic reviews, managementRequired oversight,
2600
and configuration management.
2601
2602
2603
2604
The contract as awarded and with
2605
modifications.
2606
2607
2608
2609
The agency's contract management organization and
2610
structure.
2611
2612
2613
2614
Current status reports and cost or schedule
2615
projections.
2616
2617
2618
2619
Current budget reports.
2620
2621
2622
2623
The configuration management plan for the
2624
project.
2625
2626
2627
2628
2629
Audit Steps
2630
2631
2632
2633
1.
2634
Review agency directives to identify the
2635
agency'srequirements for contract oversight. Department of Defense
2636
Standard 2167A, for example, requires periodic reviews of contract
2637
deliverables, with cost and status reports from the contractor.
2638
Defense also has directives governing configuration management
2639
activities to ensure that the contractor delivers the equipment or
2640
services called for and that no changes
2641
2642
to the contract are made without consideration of their overall
2643
impact.
2644
2645
2646
2.
2647
Identify the roles of users and senior managers
2648
inmonitoring the contract, verifying that both users and senior
2649
managers are involved in managing the contract and approving any
2650
changes.
2651
2652
2653
3.
2654
Determine the authority and experience level of
2655
theContracting Officer's Representative or Contracting Officer's
2656
Technical Representative. (See ch. 3, step 2, for a related
2657
step.)
2658
2659
2660
4.
2661
Evaluate the project staff.
2662
2663
2664
2665
2666
a.
2667
Identify key project staff and review theirexperience and
2668
qualifications. Is the Contracting Officer trained and experienced
2669
in information technology procurement? Does the project include
2670
staff experienced in managing contractors?
2671
2672
2673
b.
2674
Determine how much turnover there has beenwithin the
2675
project staff, including the project manager. (See ch. 3, step 2,
2676
for a related step.)
2677
2678
2679
2680
2681
5.
2682
Assess changes to the agency requirements toensure that
2683
the contract continues to reflect valid user needs. Review
2684
configuration management activities to verify that changes to
2685
requirements are recorded and controlled and that impacts of
2686
changes to contract requirements are identified.
2687
2688
2689
6.
2690
Assess changes to the agency's cost and
2691
scheduleestimates. Are variances in cost and schedule projections
2692
tracked by the project manager or Contracting Officer's Technical
2693
Representative? Are cost and schedule estimates changed
2694
appropriately?
2695
2696
2697
Page 57 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2698
7. Determine if agency monitoring of the contractor'sperformance
2699
includes:
2700
2701
2702
a.
2703
Periodically reviewing both scheduled and completed
2704
deliverables and effectively reacting to any delays. Determine how
2705
the agency compares contractor progress with the contract work
2706
schedule.
2707
2708
2709
b.
2710
Periodically reviewing contract reports. Review a sample
2711
of status and cost reports to verify that they are regularly
2712
submitted by the contractor as required by the contract. Discuss
2713
their usefulness with the project staff.
2714
2715
2716
c.
2717
Assessing the adequacy of the contractor's
2718
qualityassurance process.
2719
2720
2721
8. Assess the effectiveness of the agency's workingrelationship
2722
with the contractor.
2723
2724
2725
a.
2726
Verify that the agency has controlled changes to
2727
thecontract and integrated the change process into the acquisition
2728
management structure. Determine the impact of changes on contract
2729
cost and schedule.
2730
2731
2732
b.
2733
Determine if corrections are made, awards are
2734
implemented, and damages assessed, as appropriate.
2735
2736
2737
9. Determine if the agency controls contractmodifications
2738
by:
2739
2740
2741
a.
2742
Requiring the contracting office to approve allcontract
2743
modifications.
2744
2745
2746
b.
2747
Establishing a review process to ensure thatproposed
2748
engineering changes are within the scope of the
2749
contract.
2750
2751
2752
Page 58 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2753
c. Regularly comparing contract expenditures withthe delegation
2754
of procurement authority to ensure that the agency does not exceed
2755
its authorized level of total expenditures.
2756
• GSA, Overview Guide, Chapter 8: Contract
2757
2758
2759
References
2760
Administration.
2761
2762
2763
2764
2765
GSA, Guide for Contracting Officers' Technical
2766
2767
Representatives, Chapter 2.
2768
2769
2770
2771
GAO, Information Technology: A Model to Help
2772
2773
2774
Managers Decrease Acquisition Risks
2775
(GAO/IMTEC-8.1.6, August 1990), Phase III.
2776
Chapter 10
2777
2778
2779
2780
Test and Acceptance
2781
Testing provides the basis for making decisions on whether to
2782
accept contract deliverables. For testing to be effective, it must
2783
be addressed relatively early in the acquisition so it can be
2784
properly included in planning. Test plans provide testing
2785
procedures and the evaluation criteria to assess results of the
2786
testing.
2787
An agency should establish its initial test plans in the
2788
presolicitation phase. These plans should show how the agency will
2789
verify that the acquired equipment, software, or services meet user
2790
needs and satisfy security requirements. After a contract is
2791
awarded the agency will need to carry out test and acceptance
2792
procedures. The auditor should ensure that test planning is
2793
conducted early enough so that test requirements are included in
2794
the contract.
2795
In assessing the postaward phase, the auditor should ensure that
2796
the agency has not accepted equipment or software that does not
2797
meet its requirements. The contract should specify conditions for
2798
acceptable performance. For example, the contract may require that
2799
a computer operate successfully for 30 consecutive days out of a
2800
90-day test period. Agency personnel should ensure that the
2801
contractor fully meets the conditions for acceptable performance.
2802
Internal auditors may be required to verify that the equipment or
2803
software pass the specified tests.
2804
Assessing the test and acceptance phase may require a high level
2805
of technical skill on the part of auditors, such as when an agency
2806
has contracted for software development services and must test the
2807
quality of delivered software. The auditor should be able to
2808
understand the system requirements, development methodologies, and
2809
test tools being used.
2810
Page 60 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2811
To confirm that the agency has:
2812
2813
Audit Objectives
2814
2815
2816
1.
2817
Fully defined its requirements for testing thetechnology
2818
to be purchased.
2819
2820
2821
2.
2822
Effectively carried out test and acceptanceprocedures to
2823
verify that the resources purchased meet the agency's
2824
needs.
2825
2826
2827
• Agency directives giving requirements for cost and
2828
2829
2830
Documentation
2831
status reporting, configuration management, andRequired
2832
management oversight.
2833
2834
2835
2836
Records of configuration reviews or other progress
2837
reports.
2838
2839
2840
2841
Trouble reports or other records of deficiencies found by
2842
agency personnel.
2843
2844
2845
2846
Records of product acceptances.
2847
2848
2849
2850
Test plans for inspection and acceptance.
2851
2852
2853
2854
2855
Audit Steps
2856
1. Determine if test plans were developed todetermine whether
2857
the mandatory:
2858
2859
2860
a.
2861
Functional requirements were satisfied.
2862
2863
2864
b.
2865
Security requirements arising from governmentalpolicy,
2866
agency mission needs, and specific user needs were
2867
satisfied.
2868
2869
2870
2. Determine if the test plans include:
2871
a. Types of testing.
2872
2873
2874
2875
Unit testing-e.g., in software, individual code modules
2876
are tested by the programmer who wrote them.
2877
2878
2879
2880
Integrated testing-e.g., in software, aggregate functions
2881
formed by groups of modules and intermodule communication links are
2882
tested.
2883
2884
2885
2886
2887
System testing-examines the operation of the system as an
2888
entity in an actual or simulated operating environment.
2889
2890
2891
2892
b.
2893
The locations for testing.
2894
2895
2896
c.
2897
A realistic testing schedule.
2898
2899
2900
d.
2901
The resource requirements.
2902
2903
2904
2905
2906
2907
Test equipment needed, including the specific period of
2908
use, types, and quantities needed.
2909
2910
2911
2912
Software needed to support the testing.
2913
2914
2915
2916
2917
Personnel from both user and acquisition groups with
2918
their needed numbers and skills specified.
2919
2920
e. Testing materials to be used.
2921
2922
2923
2924
Documentation needed, such as source code and
2925
manuals.
2926
2927
2928
2929
Software to be tested and its medium.
2930
2931
2932
2933
Test inputs and sample outputs.
2934
2935
2936
2937
Test control software and worksheets.
2938
2939
2940
f. Training in testing to be given, personnel to betrained, and
2941
the training staff.
2942
2943
2944
3.
2945
Determine whether criteria have been establishedfor
2946
certifying that security requirements are met.
2947
2948
2949
4.
2950
Determine whether the appropriate userrepresentative has
2951
formally acknowledged the completion of testing and acceptance of
2952
the system. If not, determine the reasons and the potential
2953
impact.
2954
2955
2956
Page 62 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
2957
2958
2959
a.
2960
Determine if deficiencies discovered in
2961
contractdeliverables are expeditiously resolved.
2962
2963
2964
b.
2965
Determine if any requirements that were not metby the
2966
delivered hardware, software, and telecommunications are still
2967
pending and why.
2968
2969
2970
5. Interview system operators and users to determineif the
2971
system has been successfully integrated into the existing
2972
environment.
2973
• GSA, Overview Guide, chapter 9: Installation and
2974
2975
2976
References
2977
Operation.
2978
• GAO, Information Technology: A Model to Help
2979
Managers Decrease Acquisition Risks
2980
(GAO/IMTEC-8.1.6, August 1990), Phase I, step 14; Phase III,
2981
steps 4 to 6.
2982
• FIPS Publication 101: Guideline for Lifecycle Validation,
2983
Verification, and Testing of Computer
2984
Software.
2985
Appendix I
2986
2987
2988
2989
Acquisition Profile
2990
The acquisition profile, which is a mechanism for documenting
2991
key information about an acquisition under review, is used to help
2992
auditors plan and conduct assessments of an acquisition. The
2993
profile, which is kept available for future reference, includes
2994
the
2995
• overall characteristics of the acquisition including its
2996
objectives shown within the context of the mission(s) or
2997
function(s) to be supported,
2998
2999
3000
3001
management organization and staffing of the acquisition
3002
project, and
3003
3004
3005
3006
acquisition schedule and cost estimates.
3007
3008
3009
1. What is the project's name?
3010
3011
Overall
3012
Characteristics 2. What is the purpose of the information
3013
technology acquisition? What missions or functions is the
3014
acquisition to support?
3015
3. What type of acquisition is it?
3016
3017
3018
3019
system integration,
3020
3021
3022
3023
commercial off-the-shelf applications,
3024
3025
3026
3027
software conversion,
3028
3029
3030
3031
software development,
3032
3033
3034
3035
3036
hardware, or • other (specify).
3037
3038
3039
3040
4.
3041
Are there any related in-house efforts?
3042
3043
3044
5.
3045
With what systems will this acquisition
3046
interface?
3047
3048
3049
6.
3050
Is the acquisition based on
3051
3052
3053
3054
3055
3056
full and open competition,
3057
3058
3059
3060
competition restricted by compatibility
3061
limitations,
3062
3063
3064
Page 64 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3065
3066
3067
Management Organization and Staffing
3068
3069
3070
3071
limited competition (such as make or model limited),
3072
or
3073
3074
3075
3076
3077
noncompetitive, sole source.
3078
3079
7. Is the contract based on
3080
3081
3082
3083
fixed prices (specify type of fixed-price contract),
3084
or
3085
3086
3087
3088
3089
cost reimbursement (specify type of cost-reimbursement
3090
contract).
3091
3092
3093
3094
8.
3095
What project management tools or techniques arein use to
3096
oversee the project (such as Gantt charts or critical path
3097
method/Program Evaluation and Review Technique).
3098
3099
3100
9.
3101
What, if any, development tools and techniques(such as
3102
Computer-Aided Software Engineering-CASE) are in use?
3103
3104
3105
10.
3106
If a primary contractor has been selected for
3107
theacquisition, list the contractor name, address, telephone
3108
number, and point of contact.
3109
3110
3111
11.
3112
Identify key subcontractors, with company
3113
names,addresses, telephone numbers, and points of
3114
contact.
3115
3116
3117
12.
3118
How is the management of the acquisition projectorganized
3119
and structured?
3120
3121
3122
13.
3123
What are the title, name, and phone numbers
3124
ofthe
3125
3126
3127
3128
3129
3130
acquisition sponsor,
3131
3132
3133
3134
acquisition manager,
3135
3136
3137
3138
contracting officer,
3139
3140
3141
3142
user representatives, and
3143
3144
3145
3146
senior officials who approve acquisitions.
3147
3148
3149
Page 65 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3150
3151
3152
14.
3153
What are the responsibilities and duties of
3154
theacquisition manager? What is his/her authority (for example,
3155
planning, budget, staffing, or progress reporting)?
3156
3157
3158
15.
3159
Has an acquisition steering committee beenestablished?
3160
What are the committee's responsibilities and duties?
3161
3162
3163
16.
3164
Who staffs the acquisition team and what are theteam
3165
members' qualifications?
3166
3167
3168
17.
3169
What was the most recent milestone or key
3170
3171
3172
3173
3174
Acquisition
3175
Schedule and decision point approved?
3176
Cost Estimates 18. What are the actual or estimated dates for
3177
the following:
3178
• original start/completion dates,
3179
3180
3181
3182
current start/completion dates,
3183
3184
3185
3186
requirements analysis completed and approved,
3187
3188
3189
3190
solicitation document completed for release,
3191
3192
3193
3194
contract awarded,
3195
3196
3197
3198
initial operation,
3199
3200
3201
3202
test and acceptance, and
3203
3204
3205
3206
3207
full operation.
3208
3209
3210
3211
19.
3212
Is the project on schedule or has there been
3213
aslippage?
3214
3215
3216
20.
3217
Has the agency completed an estimate of life cyclecost?
3218
If so, what are the original and current estimates?
3219
3220
3221
21.
3222
Identify the budget authority and outlays by yearfor the
3223
project.
3224
3225
3226
3227
3228
Page 66 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3229
3230
3231
22.
3232
Identify the net benefits or cost savings projectedby the
3233
cost/benefit analysis used to justify a chosen alternative, if the
3234
acquisition has progressed to this point.
3235
3236
3237
23.
3238
Has the project received scheduled funds andresources or
3239
have there been shortfalls? (Explain any variances and their
3240
effects.)
3241
3242
3243
Appendix II
3244
3245
3246
3247
Management Metrics
3248
3249
Purpose
3250
This appendix describes tools and techniques for measuring the
3251
status of acquisitions involving significant software development.
3252
It describes techniques, known as software metrics, for
3253
quantitatively measuring how closely a project conforms to
3254
development plans and assessing whether an acquisition is at risk
3255
of delay or cost increases. These techniques require considerable
3256
information about the system being developed and can only be used
3257
after system design. The metrics described here will generally be
3258
used after contract award, in order to assess how well the agency
3259
is managing the system development process.
3260
Software metrics, which use mathematical models to measure
3261
elements of the development process, are intended to help
3262
organizations better understand and manage the relationships
3263
between resource decisions, development schedules, and the cost of
3264
software projects. By using software metric tools an auditor can
3265
independently evaluate software development projects by analyzing
3266
project budgets, requirements, schedules, and resources, and then
3267
confirm or question cost, schedule, and resource estimates.
3268
Different metrics may be useful for an audit, depending on the
3269
objectives and status of an acquisition. Using cost models to
3270
estimate the cost and length of time necessary to develop a new
3271
software system, for example, is appropriate only after
3272
requirements have been defined, a system design has been developed,
3273
and the size of the new system has been estimated. The models
3274
described here require estimates of either the lines of code or
3275
number of function points that the new system will include. Cost
3276
models project the time and cost to develop a system on the basis
3277
of estimates of the system's size and other pertinent factors. They
3278
may be used before a solicitation for software development is
3279
Page 68 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3280
issued in order to assess the reasonableness of the agency's
3281
schedule (if a system design has been prepared), or after a
3282
contract has been awarded and software development has begun. The
3283
other metrics described in this appendix require that system
3284
development work be underway. A comparison of the actual number of
3285
functions successfully tested to the number planned in the
3286
acquisition schedule, for example, requires that system testing be
3287
underway.
3288
Cost Models Cost models are tools that estimate the effort
3289
needed to develop software, based on assumed relationships between
3290
the size of a system and the effort needed to design, code, and
3291
test the software. These models can help the auditor assess whether
3292
the acquisition's estimated cost and schedule are reasonable. Each
3293
model uses cost drivers, which are parameters such as the level of
3294
experience of the programmers, the reliability requirements of the
3295
programs, and the complexity of the project, along with the
3296
estimated project size, to derive overall cost and schedule
3297
estimates for the acquisition. When a system involving software is
3298
being developed, one or more cost models may be useful. A model
3299
will be more reliable if it takes into account the agency's
3300
historical experience in developing systems.
3301
Cost models are available both commercially and from a few
3302
agencies within the Department of Defense. Most of the tools were
3303
developed initially for use with Defense department projects, but
3304
can also be used with non-Defense systems. Many are based on
3305
industry-recognized models such as the Constructive Cost Model
3306
(COCOMO), PRICE, Putnam, and Jensen. The commercial tools range in
3307
cost from about $500 to well over $20,000. Government-developed or
3308
government-modified tools are available free of
3309
Page 69 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3310
charge with a nominal charge for upgraded copies of the
3311
software.
3312
Because many different packages are available, and because more
3313
than one can be used, auditors should determine what models, if
3314
any, are used in their agencies. Typically cost models are derived
3315
using data gathered from years of experience with a wide range of
3316
software projects. Therefore, accuracy of predictions may improve
3317
as further experience is accumulated in an agency.
3318
Auditors should use cost models to look for discrepancies with
3319
the cost and schedule estimates established for an acquisition. By
3320
varying the estimated values for cost drivers, the auditor may also
3321
be able to perform a sensitivity analysis illustrating where
3322
project estimates are most susceptible to change. However, cost
3323
models have significant limitations in accuracy unless their
3324
underlying assumptions of system size and cost drivers are
3325
carefully chosen and reflect the agency's previous experience in
3326
system development. It is a matter of auditor judgment to decide
3327
how discrepant project estimates and estimates provided by cost
3328
models should be to raise concerns about risks of cost and schedule
3329
overruns. In making this judgment, the auditor should take into
3330
account the uncertainty of estimates and assumptions made in using
3331
a cost model.
3332
Auditors should use a cost model to provide general estimates
3333
and not precise figures. Therefore, in applying software metrics to
3334
audit work, care must be taken to follow generally accepted
3335
government auditing standards when drawing conclusions based on the
3336
results of software metrics. Specifically, all findings should be
3337
qualified by the recognition that these tools are limited by the
3338
accuracy of the
3339
Page 70 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3340
estimated system size and other project data provided for the
3341
model, the historical data from which the model was developed, and
3342
the fact that all estimates are projections of an inherently
3343
uncertain future. Procedures for minimizing the effect of these
3344
limitations require, for example, proper technical advice,
3345
qualifying language in audit reports, and a review of data and
3346
assumptions by agency officials.
3347
Auditors should also ensure that the model used is consistent
3348
with the software development methodology of the project under
3349
consideration. A system developed through rapid prototyping, for
3350
example, should be evaluated with a model that takes prototyping
3351
into account.
3352
The following indicators are intended to help auditors
3353
3354
3355
Other Indicators
3356
assess how effectively an agency is managing a system
3357
development contract. These indicators measure differences between
3358
what an agency planned for its contractor to accomplish by certain
3359
points in the systems development life cycle and the actual
3360
results. In most cases this comparison is most easily done
3361
graphically. Using more than one indicator can give a broader
3362
picture of a project's status. Auditors should use indicators
3363
appropriate to the project under review and for which data are
3364
available.
3365
Problem Reports This indicator involves tracking the number of
3366
open and closed problems reported by a contractor as a system is
3367
developed. A problem could be any anomaly discovered during design,
3368
coding, testing, or implementation. Problems are distinguished from
3369
failures of code, which represent defects discovered during
3370
operation. Contracts should specify how problems are to be
3371
identified and reported. By reviewing these reports and noting how
3372
quickly
3373
Page 71 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3374
problems are resolved, auditors can obtain an understanding of
3375
how well the contractor is performing.
3376
The project manager or Contracting Officer's Technical
3377
Representative may be the best source for problem reports. Because
3378
an agency may choose to prioritize problems in order of their
3379
impact, the reports should distinguish between priority levels of
3380
problems.
3381
Figure II.1 shows one way to present this kind of analysis. It
3382
shows the number of new problems reported and the number of
3383
problems closed in order to show a trend over time and to show any
3384
backlog that may be developing. The auditor may also choose to
3385
report total problems reported and resolved or break them out by
3386
level of priority. Figure II.2 shows the length of time that
3387
problems have remained open in order to demonstrate how quickly
3388
software problems are resolved once found. In this example, three
3389
levels of priority are distinguished for reported problems.
3390
Figure II.1: Problem Reports in Software Project
3391
3392
Figure II.2: Problems by Priority Levels and Number of Months
3393
Unresolved
3394
3395
Software Volatility Software volatility is also measured
3396
graphically. Figure II.3 shows changes in the total number of
3397
approved system requirements. Cumulative changes are also tracked,
3398
including additions, deletions, and modifications to requirements.
3399
Steady increases in the number of requirements and changes to
3400
requirements may indicate that the project is at risk for delays
3401
and cost overruns.
3402
Figure II.3: Software Requirements Changes
3403
3404
Development Progress
3405
This indicator involves the comparison of actual and expected
3406
progress in the design, coding, and integrating of system units.
3407
Units can be measured in terms of computer software units or
3408
computer software configuration items. If the project team does not
3409
complete its design or programming and testing activities as
3410
planned, this indicator can show schedule delays before major
3411
milestones are reached. The progress indicator can show all
3412
elements of design, coding, testing, and integrating, or it may
3413
treat them as separate indicators. Figure II.4 shows how
3414
Page 75 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3415
planned and actual progress in the design and coding of software
3416
units can be displayed.
3417
Figure II.4: Development Progress
3418
3419
Software Size This indicator records changes in the expected
3420
magnitude of the software development effort. The size of the
3421
system, measured in source lines of code as established by the
3422
system design, may change as the system is coded. Changes in size
3423
can be expressed
3424
Page 76 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3425
as total lines of code or can be broken out into new, modified,
3426
and reused lines of code. Changes in the estimated system size may
3427
indicate that the project was overestimated or underestimated in
3428
size and complexity. These changes may also indicate that
3429
requirements are changing and may be related to the software
3430
volatility issue described earlier. Increasing estimates of
3431
software size should alert the auditor that the project's schedule
3432
and expected cost may be underestimated. Changes in the expected
3433
system size may necessitate reestimates of the development cost,
3434
using the cost models described earlier in this appendix. Figure
3435
II.5 shows how the estimates of software size can be tracked over
3436
time.
3437
Figure II.5: Software Size Estimates
3438
3439
Personnel Stability Tracking the total number of people assigned
3440
to a system development effort compared to planned staffing levels
3441
provides another indicator of potential problems. The auditor can
3442
examine projected versus actual levels of total personnel or of
3443
key, experienced personnel. Understaffing may result in schedule
3444
slippage. Adding personnel late in a project can actually cause
3445
further slippage.
3446
Other metrics may be chosen as needed. Auditors could, for
3447
example, compare expected to actual usages of hardware resources in
3448
order to identify emerging computer capacity problems. Another
3449
approach would involve tracking changes to the estimated completion
3450
date for a system. The metrics described here offer suggestions to
3451
be tailored for use as appropriate to particular projects.
3452
Appendix III
3453
3454
3455
3456
Reference Materials
3457
3458
Federal Regulations
3459
Each chapter of this guide lists applicable reference materials
3460
including federal regulations and guidance published by GSA, OMB,
3461
and other agencies. When using these references, summarized below,
3462
auditors should ensure that the most current version available is
3463
used.
3464
Applicable regulations include both general rules for
3465
procurement, the FAR, and the FIRMR regulations written by GSA
3466
specifically for acquiring federal information processing
3467
resources. GSA issues regulations under its Brooks Act authority.
3468
In addition to the FIRMR, GSA issues bulletins that provide
3469
guidance on a wide range of federal information processing
3470
acquisition issues:
3471
GSA • Federal Acquisition Regulation (FAR)
3472
• Federal Information Resource Management Regulation (FIRMR)
3473
OMB Circulars • A-109: Major System Acquisitions
3474
3475
3476
3477
A-130: Management of Federal Information Resources-under
3478
proposed revision
3479
3480
3481
3482
A-76: Performance of Commercial Activities
3483
3484
3485
3486
A-11: Preparation and Submission of Budget
3487
Estimates
3488
3489
3490
GSA Acquisition Guide Series
3491
3492
3493
3494
Overview Guide
3495
3496
3497
3498
Guide for Requirements Analysis and Analysis of
3499
Alternatives
3500
3501
3502
3503
Guide for Acquiring Maintenance Services
3504
3505
3506
3507
Guide for Acquiring Commercial Software
3508
3509
3510
3511
Guide for Contracting Officer's Technical
3512
Representatives
3513
3514
3515
3516
Guide for Acquiring Systems Integration
3517
Services
3518
3519
3520
National Institute of • Federal Information Processing Standard
3521
(FIPS) Publications. FIPS Publications describe federal
3522
Science and
3523
Technology standards for hardware, software, and the
3524
management of information technologies. FIPS(NIST)-formerly
3525
Publications relevant to the acquisition of informationthe National
3526
Bureau technology include the following: of Standards
3527
FIPS PUB 11-3-Guideline: American National Dictionary for
3528
Information Processing Systems,
3529
Feb. 1, 1991. FIPS PUB 38-Guidelines for Documentation of
3530
Computer Programs and Automated Data Systems,
3531
Feb. 15, 1976. FIPS PUB 42-1-Guidelines for Benchmarking ADP
3532
Systems in the Competitive Procurement
3533
Environment, May 15, 1977.
3534
FIPS PUB 46-1-Data Encryption Standard, Jan. 22, 1988. FIPS PUB
3535
64-Guidelines for Documentation of
3536
Computer Programs and Automated Data Systems for
3537
the Initiation Phase, Aug. 1, 1979. FIPS PUB 65-Guideline for
3538
Automatic Data
3539
Processing Risk Analysis, Aug. 1, 1979.
3540
FIPS PUB 73-Guidelines for Security of Computer
3541
Applications, June 30, 1980. FIPS PUB 75-Guideline on
3542
Constructing
3543
Benchmarks for ADP System Acquisitions,
3544
Sept. 18, 1980. FIPS PUB 76-Guideline for Planning and Using
3545
a
3546
Data Dictionary System, Aug. 20, 1980.
3547
FIPS PUB 87-Guidelines for ADP Contingency
3548
Planning, Mar. 27, 1981. FIPS PUB 88-Guideline on Integrity
3549
Assurance and
3550
Control in Database Administration, Aug. 14, 1981.
3551
FIPS PUB 96-Guideline for Developing and
3552
Implementing A Charging System for Data Processing
3553
Services, Dec. 6, 1982. FIPS PUB 99-Guideline: A Framework for
3554
the
3555
Evaluation and Comparison of Software Development
3556
Tools, Mar. 31, 1983. FIPS PUB 101-Guideline for Lifecycle
3557
Validation,
3558
Verification, and Testing of Computer Software,
3559
June 6, 1983. FIPS PUB 102-Guidelines for Computer Security
3560
Certification and Accreditation, Sept. 27, 1983.
3561
FIPS PUB 106-Guideline on Software Maintenance,
3562
June 15, 1984. FIPS PUB 124-Guideline on Functional
3563
Specifications for Database Management Systems,
3564
Sept. 30, 1986. FIPS PUB 127-1-Database Language SQL,
3565
Feb. 2, 1990. FIPS PUB 132-Guideline for Software
3566
Verification
3567
and Validation Plans, Nov. 19, 1987. FIPS PUB 146-1-Government
3568
Open Systems
3569
Interconnection Profile, Apr. 3, 1991. FIPS PUB 151-1-POSIX:
3570
Portable Operating System
3571
Interface for Computer Environments, Mar. 28, 1990.
3572
FIPS PUB 158-The User Interface Component of the
3573
Applications Portability Profile, May 29, 1990.
3574
• Special publications. Publications relevant to information
3575
technology acquisition include the following:
3576
500-087-Management Guide for Software
3577
Documentation, January 1982. 500-090-Guide to Contracting for
3578
Software
3579
Conversion Services, May 1982. 500-105-Guide to Software
3580
Conversion Management.
3581
500-106-Guide on Software Maintenance.
3582
500-109-Overview of Computer Security
3583
Certification and Accreditation. 500-120-Security of Personal
3584
Computer Systems: A
3585
Management Guide. 500-133-Technology Assessment: Methods for
3586
Measuring the Level of Computer Security. 500-134-Guide on
3587
Selecting ADP Backup Processing
3588
Alternatives. 500-147-Guidance on Requirements Analysis for
3589
Office Automation Systems (Update). 500-148-Application Software
3590
Prototyping and
3591
Fourth Generation Languages. 500-153-Guide to Auditing for
3592
Controls and Security:
3593
A System Development Life Cycle Approach. 500-154-Guide to
3594
Distributed Database Management.
3595
500-155-Management Guide to Software Reuse.
3596
500-161-Software Configuration Management: An
3597
Overview. 500-165-Software Verification and Validation: Its
3598
Role in Computer Assurance and Its Relationship
3599
with Software Product Management Standards. 500-172-Computer
3600
Security Training Guidelines.
3601
500-173-Guide to Data Administration.
3602
500-174-Guide for Selecting Automated Risk
3603
Analysis Tools. 500-175-Management of Networks Based on Open
3604
Systems Interconnection (OSI) Standards: Functional
3605
Requirements and Analysis. 500-180-Guide to Software
3606
Acceptance.
3607
500-183-Stable Implementation Agreements for
3608
Open System Interconnection Protocols. 500-184-Functional
3609
Benchmarks for Fourth
3610
Generation Languages. 500-187-Application Portability Profile,
3611
The U.S.
3612
Government's Open System Environment Profile
3613
OSE/1 Version 1.0. 500-192-Government Open Systems
3614
Interconnection
3615
Profile Users' Guide, Version 2. 500-193-Software Reengineering:
3616
A Case Study and
3617
Lessons Learned.
3618
800-4-Computer Security Considerations in Federal
3619
Procurements: A Guide for Procurement Initiators, Contracting
3620
Officers, and Computer Security Officials,
3621
March 1992.
3622
GAO Audit Guidance • Information Technology: A Model to Help
3623
Managers
3624
Decrease Acquisition Risks (GAO/IMTEC-8.1.6,
3625
August 1990).
3626
• Government Auditing Standards, 1988 Revision.
3627
Appendix IV
3628
3629
3630
3631
Major Contributors to This Audit Guide
3632
3633
Information Management and Technology Division, Washington,
3634
D.C.
3635
Mark E. Heatwole, Assistant Director David R. Turner,
3636
Evaluator-in-Charge Bernard R. Anderson, Senior Evaluator Peter C.
3637
Wade, Senior Evaluator Trinh N. Hoang, Computer Programmer David
3638
Chao, Technical Reviewer Shane D. Hartzler, Editor
3639
3640
3641
3642
Glossary
3643
3644
Acquisition
3645
The obtaining, by contract with appropriated funds, of supplies
3646
or services (including construction) by and for the use of the
3647
federal government through purchase or lease, whether the supplies
3648
or services are already in existence or must be created, developed,
3649
demonstrated, and evaluated. Acquisition begins at the point when
3650
agency needs are established and includes the description of
3651
requirements to satisfy agency needs, solicitation and selection of
3652
sources, award of contracts, contract financing, contract
3653
performance, contract administration, and those technical and
3654
management functions directly related to the process of fulfilling
3655
agency needs by contract.
3656
3657
3658
Acquisition Planning
3659
The process by which the efforts of all personnel responsible
3660
for an acquisition are coordinated and integrated through a
3661
comprehensive plan for fulfilling the agency need in a timely
3662
manner and at a reasonable cost. It includes developing the overall
3663
strategy for managing the acquisition.
3664
A request by a federal agency for GSA to acquireAgency
3665
information processing resources or for GSA toProcurement delegate
3666
the authority to acquire these resources.
3667
3668
3669
Request (APR)
3670
The overall structure of a computer system including
3671
3672
3673
Architecture
3674
hardware and software.
3675
The degree to which a system or component isAvailability
3676
operational and accessible when required for use, often expressed
3677
as a probability.
3678
Page 87 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3679
3680
3681
Baseline
3682
(1) A specification or product that has been formallyreviewed
3683
and agreed upon that thereafter serves as
3684
the basis for further development and that can be changed only
3685
through formal change control procedures. (2) A document or set of
3686
such documents formally designated and fixed at a specific time
3687
during the life cycle of a configuration item. Note: Baselines,
3688
plus approved changes from those baselines, constitute the current
3689
configuration identification. (3) Any agreement or result
3690
designated and fixed at a given time from which changes require
3691
justification and approval.
3692
A test that uses a representative set of programs and
3693
3694
3695
Benchmark Test
3696
data designed to evaluate the performance of computer hardware
3697
and software in a given configuration.
3698
A final opportunity for offerors in the competitive
3699
3700
3701
Best and Final
3702
Offer range to revise proposals.
3703
3704
3705
Capability Validation
3706
The technical verification of the ability of a proposed system
3707
configuration, replacement component, or the features or functions
3708
of its software, to satisfy functional requirements. The intent is
3709
to ensure that the proposed resources can provide the required
3710
functions. Performance requirements are not implied or measured in
3711
the validation. Examples of capability validation include:
3712
3713
3714
a.
3715
operational capability demonstrations of thefunctions of
3716
the hardware, operating system, or support software;
3717
3718
3719
b.
3720
verification of conformance with informationprocessing
3721
standards;
3722
3723
3724
Page 88 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3725
3726
3727
Certification
3728
3729
3730
c.
3731
expert examination of the technical literaturesupplied
3732
with the offer;
3733
3734
3735
d.
3736
contacts with other users of the proposedinformation
3737
processing resource; and
3738
3739
3740
e.
3741
vendor certification of conformance with thefunctional
3742
requirements.
3743
3744
3745
(1) A written guarantee that a system or componentcomplies with
3746
its specified requirements and is acceptable for operational use.
3747
For example, a written authorization that a computer system is
3748
secure and is permitted to operate in a defined environment. (2) A
3749
formal demonstration that a system or component complies with its
3750
specified requirements and is acceptable for operational use. (3)
3751
The process of confirming that a system or component complies with
3752
its specified requirements and is acceptable for operational
3753
use.
3754
See configuration control.
3755
3756
3757
Change Control
3758
A daily publication that lists the government's
3759
3760
3761
Commerce
3762
procurement invitations, contract awards,
3763
Business Daily subcontracting leads, sales, surplus property,
3764
and foreign business opportunities. (GSA/IRMS, A Guide for
3765
Acquiring Commercial Software, Jan. 1991, p. A-1.)
3766
(1) The ability of two or more systems or components
3767
Compatibility to perform their required functions while sharing
3768
the same hardware or software environment. (2) The ability of two
3769
or more systems or components to exchange information.
3770
A statement of requirements expressed in terms
3771
thatCompatibility-require items to be compatible with
3772
existingLimited information processing resources.
3773
3774
3775
Requirement
3776
The group of offerors selected, after technical andCompetitive
3777
cost evaluation, to whom award of a contract is aRange reasonable
3778
possibility.
3779
3780
3781
Configuration
3782
(1) The arrangement of a computer system ornetwork as defined by
3783
the nature, number, and chief characteristics of its functional
3784
units. (2) The physical and logical elements of an information
3785
processing system, the manner in which they are organized and
3786
connected, or both. The term may refer to a hardware configuration
3787
or a software configuration.
3788
An element of configuration management, consistingConfiguration
3789
of the evaluation, coordination, approval orControl disapproval,
3790
and implementation of changes to
3791
configuration items after formal establishment of
3792
their configuration identification.
3793
An aggregation of hardware and/or software that isConfiguration
3794
designated for configuration management and treatedItem as a single
3795
entity in the configuration management
3796
process.
3797
The continuous control of changes made to a
3798
system'sConfiguration hardware, software, and documentation
3799
throughoutManagement the development and operational life of the
3800
system.
3801
Page 90 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3802
A person with the authority to enter into,
3803
administer,Contracting and/or terminate contracts and make
3804
relatedOfficer (CO) determinations and findings.
3805
An individual to whom the CO delegates certainContracting
3806
contract responsibilities, usually related to technicalOfficer's
3807
acceptance issues.
3808
3809
3810
Technical Representative (COTR)
3811
Modification of existing software to enable it to
3812
3813
3814
Conversion
3815
operate with similar functional capability in a different
3816
environment; for example, converting a program from FORTRAN to Ada
3817
or converting a program that runs on one computer to run on
3818
another.
3819
A contract in which the government reimburses the
3820
3821
3822
Cost
3823
contractor for expenses so long as the contractorReimbursement
3824
provides its "best effort" to complete the work called Contract
3825
for.
3826
Authority to acquire information processing resourcesDelegation
3827
of up to a specified limit, issued by GSA in response toProcurement
3828
an agency procurement request.
3829
3830
3831
Authority (DPA)
3832
The regulation that codifies uniform acquisition
3833
3834
3835
Federal
3836
policies and procedures for executive agenciesAcquisition
3837
governmentwide. Regulation (FAR) The regulation that sets forth
3838
uniform policies and
3839
3840
3841
Federal
3842
procedures for acquiring information processingInformation
3843
resources; used in conjunction with the FAR. Resources Management
3844
Regulation (FIRMR)
3845
A contract that provides for a firm price or in
3846
3847
3848
Fixed-Price
3849
appropriate cases, a firm price with fees or otherContract
3850
adjustments.
3851
A requirement that specifies a function that a system
3852
3853
3854
Functional
3855
Requirement or system component must be able to perform.
3856
Verification and validation performed by anIndependent
3857
organization that is technically, managerially, andVerification and
3858
financially independent of the development Validation (IV&V)
3859
organization. (See verification and validation, defined
3860
separately as follows.)
3861
The solicitation document used when contracting by
3862
3863
3864
Invitation for Bid
3865
(IFB) sealed bidding.
3866
The ability of information technology resources to
3867
Interoperability provide services to and accept services from
3868
other resources and to use the services so exchanged to enable them
3869
to operate effectively together.
3870
Compensation to the government for a contractor'sLiquidated
3871
failure to perform in a timely manner.
3872
3873
3874
Damages
3875
Page 92 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3876
Maintainability The ease with which maintenance of a functional
3877
unit can be performed in accordance with prescribed
3878
requirements.
3879
3880
3881
Market Survey
3882
Attempts to ascertain whether other qualified sources capable of
3883
satisfying the government's requirement exist. This testing of the
3884
marketplace may range from written or telephone contacts with
3885
knowledgeable federal and non-federal experts regarding similar or
3886
duplicate requirements and the results of any market test recently
3887
undertaken, to the more formal sources-sought announcements in
3888
pertinent publications (e.g., technical/scientific journals, the
3889
Commerce Business Daily), or solicitations for
3890
information or planning purposes.
3891
The technical verification of the ability of a proposed
3892
3893
3894
Performance
3895
system configuration or replacement component to
3896
Validation handle agency-specific work-load volumes (present and
3897
expected) within agency-determined performance time
3898
constraints.
3899
The key management official who represents the
3900
Program Manager program office in formulating resource
3901
requirements and managing presolicitation activities. In some
3902
organizations the program manager or another management official is
3903
designated as the acquisition manager for a specific
3904
acquisition.
3905
A written objection by an interested party to (1) a
3906
3907
3908
Protest
3909
solicitation for a proposed contract, (2) a proposed award, or
3910
(3) the award of a contract.
3911
Page 93 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3912
A preliminary type, form, or instance of a system thatPrototype
3913
serves as a model for later stages or for the final, complete
3914
version of the system.
3915
A hardware and software development technique in
3916
Prototyping which a preliminary version of part or all of the
3917
hardware or software is developed to permit user feedback,
3918
determine feasibility, or investigate timing or other issues in
3919
support of the development process.
3920
A type of prototyping in which emphasis is placed onRapid
3921
developing prototypes early in the developmentPrototyping process
3922
to permit early feedback and analysis in
3923
support of the development process.
3924
The ability of a system or component to perform itsReliability
3925
required functions under stated conditions for a stated period of
3926
time.
3927
An announcement in the Commerce Business Daily orRequest for
3928
other publication requesting industry comment onComment draft
3929
specifications for resources.
3930
An announcement in the Commerce Business Daily orRequest for
3931
other publication requesting information fromInformation industry
3932
about a planned acquisition, and, in some
3933
cases, corporate capability information.
3934
The solicitation document used in negotiatedRequest for
3935
procurements to communicate governmentProposals (RFP) requirements
3936
and to solicit proposals.
3937
Page 94 GAO/IMTEC-8.1.4 Assessing Acquisition Risks
3938
An official government request for bids/proposals
3939
3940
3941
Solicitation
3942
generally publicized in the Commerce Business Daily in
3943
accordance with federal regulations.
3944
The government official in charge of selecting the
3945
3946
3947
Source Selection
3948
source for an acquisition. Most often the title is usedAuthority
3949
(SSA) when the selection process is formal and the official is
3950
other than the Contracting Officer.
3951
A board composed of technical, contract, information
3952
3953
3954
Source Selection
3955
resources managers, and other government personnelEvaluation
3956
Board whose primary function is to evaluate proposals (SSEB)
3957
received in response to an RFP.
3958
A document that describes the entire process for
3959
3960
3961
Source Selection
3962
awarding a contract-proposal evaluation criteria,Plan evaluation
3963
methodology, evaluator's responsibilities, and final selection
3964
procedures.
3965
A description of the government's requirement forSpecific Make
3966
resources which is so restrictive that only a particularand Model
3967
manufacturer's products will satisfy the government's
3968
3969
3970
Specification needs.
3971
3972
3973
3974
Technical Leveling
3975
Helping an offeror to bring its proposal up to the level of
3976
other proposals through successive rounds of discussion, such as by
3977
pointing out weaknesses resulting from the offeror's lack of
3978
diligence, competence, or inventiveness in preparing the
3979
proposal.
3980
3981
The mix of tasks typically run on a given computer
3982
3983
3984
Work Load
3985
system. Major characteristics include input/output requirements,
3986
amount and kinds of computation, and computer resources
3987
required.
3988
3989
Ordering Information
3990
The first copy of each GAO report and testimony is free.
3991
Additional copies are $2 each. Orders should be sent to the
3992
following address, accompanied by a check or money order made out
3993
to the Superintendent of Documents, when necessary. Orders for 100
3994
or more copies to be mailed to a single address are discounted 25
3995
percent.
3996
Orders by mail:
3997
U.S. General Accounting Office
3998
P.O. Box 6015Gaithersburg, MD 20884-6015
3999
or visit:
4000
Room 1100 700 4th St. NW (corner of 4th & G Sts. NW)
4001
U.S. General Accounting OfficeWashington, DC
4002
4003
4004
Orders may also be placed by calling (202) 512-6000 or by using
4005
fax number (301) 258-4066, or TDD (301) 413-0006.
4006
Each day, GAO issues a list of newly available reports and
4007
testimony. To receive facsimile copies of the daily list or any
4008
list from the past 30 days, please call (301) 258-4097 using a
4009
touchtone phone. A recorded menu will provide information on how to
4010
obtain these lists.
4011
4012
4013
United States General Accounting Office Washington, D.C.
4014
20548-0001
4015
Official Business Penalty for Private Use $300
4016
Address Correction Requested
4017
Bulk Mail Postage & Fees Paid GAO Permit No. G100
4018
4019
4020
4021
4022
4023
4024