Library

Search Enterprise Architecture publications by keyword or browse by architectural layer.

Browse by Architectural Layer

Infrastructure

Cloud Asset Naming Conventions

 
 
 
 
Standard
This document presents a consolidated reference for consistent naming of Cloud Resources across all IT Organizations, which benefits the University in cost savings, automation and reduction of ambiguity.

...

Cloud Resource Tagging

 
 
 
 
Standard
This document describes the required metadata tags for Cloud Resources (e.g. instances, volumes, snapshots, managed databases, load balancers, distributed caching services) so that resources can be effectively leveraged across stakeholders.

...

How Many VPCs?

Advisory
This analysis of the architecture guidance on the number of production VPCs (Virtual Private Clouds) for services deployed in AWS examines four dimensions: Security, Cost, Operations, and Business Continuity and Disaster Recovery.
... Read more about How Many VPCs?

Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Standard
The scope of this standard extends to all server instances that are within the HUIT domains on a fully-managed basis, or are hosted within HUIT on behalf of customers that administer the server instances. The overarching goal of this work is to satisfy Harvard’s HUIT Information Security Policy Objectives and NIST Cyber-Security Framework (CSF) Objectives.

... Read more about Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Applications

User Experience

Digital Accessibility Policy ↳

Standard
The Harvard University Digital Accessibility Policy addresses the needs of individuals with disabilities who seek to use University Websites to participate in University programs and activities and/or conduct University Business.

Website Analytics

Advisory
This advisory provides guidance on striking a balance between using website traffic analysis tools (i.e. analytics) to create a better user experience for website visitors and avoiding unnecessary collection of information about our users that could constitute a breach of trust.
... Read more about Website Analytics

Data

Data Trust Model

 
 
 
 
Advisory
A set of documents that define a Trust Model, describe what is currently in place, and a plan to move toward reducing complexity and the need for data sources to provision applications individually.

...

Website Analytics

Advisory
This advisory provides guidance on striking a balance between using website traffic analysis tools (i.e. analytics) to create a better user experience for website visitors and avoiding unnecessary collection of information about our users that could constitute a breach of trust.
... Read more about Website Analytics

Interoperation

Middleware

Security

IT Security Policies ↳

Standard
These Information Security Requirements apply to everyone at Harvard. They provide additional detail on how to be compliant with Policy and should be used as a normal part of daily life at Harvard in order to keep both Harvard confidential data and your own personal information secure.

Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Standard
The scope of this standard extends to all server instances that are within the HUIT domains on a fully-managed basis, or are hosted within HUIT on behalf of customers that administer the server instances. The overarching goal of this work is to satisfy Harvard’s HUIT Information Security Policy Objectives and NIST Cyber-Security Framework (CSF) Objectives.

... Read more about Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Website Analytics

Advisory
This advisory provides guidance on striking a balance between using website traffic analysis tools (i.e. analytics) to create a better user experience for website visitors and avoiding unnecessary collection of information about our users that could constitute a breach of trust.
... Read more about Website Analytics

All Documents

Cloud Asset Naming Conventions

 
 
 
 
Standard
This document presents a consolidated reference for consistent naming of Cloud Resources across all IT Organizations, which benefits the University in cost savings, automation and reduction of ambiguity.

...

Cloud Resource Tagging

 
 
 
 
Standard
This document describes the required metadata tags for Cloud Resources (e.g. instances, volumes, snapshots, managed databases, load balancers, distributed caching services) so that resources can be effectively leveraged across stakeholders.

...

Data Trust Model

 
 
 
 
Advisory
A set of documents that define a Trust Model, describe what is currently in place, and a plan to move toward reducing complexity and the need for data sources to provision applications individually.

...

Digital Accessibility Policy ↳

Standard
The Harvard University Digital Accessibility Policy addresses the needs of individuals with disabilities who seek to use University Websites to participate in University programs and activities and/or conduct University Business.

How Many VPCs?

Advisory
This analysis of the architecture guidance on the number of production VPCs (Virtual Private Clouds) for services deployed in AWS examines four dimensions: Security, Cost, Operations, and Business Continuity and Disaster Recovery.
... Read more about How Many VPCs?

IT Security Policies ↳

Standard
These Information Security Requirements apply to everyone at Harvard. They provide additional detail on how to be compliant with Policy and should be used as a normal part of daily life at Harvard in order to keep both Harvard confidential data and your own personal information secure.

Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Standard
The scope of this standard extends to all server instances that are within the HUIT domains on a fully-managed basis, or are hosted within HUIT on behalf of customers that administer the server instances. The overarching goal of this work is to satisfy Harvard’s HUIT Information Security Policy Objectives and NIST Cyber-Security Framework (CSF) Objectives.

... Read more about Security Minimal Viable Product Requirements for HUIT Hosted/Managed Server Instances

Website Analytics

Advisory
This advisory provides guidance on striking a balance between using website traffic analysis tools (i.e. analytics) to create a better user experience for website visitors and avoiding unnecessary collection of information about our users that could constitute a breach of trust.
... Read more about Website Analytics
  •  
  • 1 of 2
  • »

Physical

Networking