Every application must have both an Application Business Owner and an Application Technical Owner - typically a UCD unit or school that has the sufficient authority, skills, and resources to fulfil the role effectively. See Application Ownership Roles & Responsibilities
The two Exemplar Digital Applications Ownership RASCI, shown below, cover Application Ownership and Technical Management Responsibilties for Cloud-based and 3rd Party Managed Applications.
These should be reviewed, adapted, and agreed between the Application Business Owner and Application Technical Owner prior to acquiring, deploying, or developing an application.
1. Responsibility Matrix for Application Ownership
Responsibilities / Tasks |
Application Business Owner |
Application Technical Owner |
Governance
Proposed applications must adhere to the Digital Governance Policy, and have been reviewed by the Technical Assessment/Advisory Group. |
A, R |
S |
Defining Business Requirements
|
A,R |
I |
Defining Technical Requirements
|
I |
A,R |
Application Development/Selection
An application should be selected based on evaluation of both functional and technical requirements, as provided and assessed by the Business Owner and Technical Owner. |
A,R |
S |
Risk Management Decisions
Business Owner makes final decision on risk acceptance with Technical Owner consultation. All users, including Business and Technical Owners, are expected to raise risks on discovery. |
A,R |
C |
Compliance with Regulatory and Legal considerations
|
A,R |
S |
Performance Monitoring
The Business Owner is informed of significant issues. |
I |
A, R |
Business Continuity
|
A, R |
C |
Procurement and Budget
Technical Owner supports development of technical budget needs; Business Owner allocates and approves the budget. |
A, R |
S |
Vendor Management
Includes management of service provider(s) and third party contractors. |
A, R |
S |
Change Management and User Support
|
A, R |
C |
Identity, Account Management and Role Based Access
|
A, R |
S |
Data Management and Protection
For applications that process or store confidential or sensitive personal information, UCD IT Services strongly recommends the use of an external company to conduct a (opens in a new window)security assessment. IT Services will be able to provide you with a list of security partners to assist with the assessment. Other key considerations that fall under Data Protection include Privacy Statements, DPIA, DPA, ROPA. |
A, R |
S |
Periodic Quality Review and Evaluation
|
A, R I |
I A,R |
Technical Delivery and Support
* The “Technical Management Responsibilities Matrix” below outlines in detail the responsibilities related to technical management (as opposed to Technical Ownership) |
C |
A,R |
Application Security
|
S |
A,R |
Application Upgrades and Patches
|
A, R |
S |
Change Control and Communications
Technical Owner manages technical changes; Business Owner approves and communicates changes to stakeholders. |
R, S |
A, R |
2. Technical Management Responsibility Matrix for Cloud-based and 3rd Party Managed Applications
There must always be an Application Technical Owner in UCD ultimately accountable for the technical delivery and security of the application, even where responsibility for carrying out specific technical management tasks has been shared or devolved to one or more third parties. As such, it is critical that a clear demarcation of roles and responsibilities is established.
The table below may assist. It should be completed by the Application Technical Owner in conjunction with the third party service provider(s) (e.g. cloud service provider, vendor, third party teams), so that it is clear and unambiguous who is responsible for the outlined management tasks related to the delivery of the service.
This is aligned to the UK National Cyber Security Centre’s (opens in a new window)Cloud Security shared responsibility model
Technical Management Responsibilities Matrix for Cloud-based and 3rd Party Managed Applications
Responsibilities / Tasks |
(UCD) Application Technical Owner |
Third Party Service Provider (e.g. cloud service provider, vendor, third party teams) |
Ensuring that the service can meet UCDs technical requirements |
A, R |
|
Securely configuring the services that you have chosen to use |
A, R |
|
Deciding which data you store in the services you use |
A, R |
|
Management of the Application Configuration (including accuracy of customer/UCD data) |
A, R |
|
Management of Identify and Access Controls |
A, R |
|
Management of Application Data Storage (e.g. database schema, block and file level storage systems) |
A, R |
|
Management of Application |
A, R |
|
Management of Operating System |
A, R |
|
Management of Network Flow Controls |
A, R |
|
Management of Host Infrastructure |
A, R |
|
Management of Physical Security |
A, R |
RASCI Roles and Descriptions
RASCI |
Description |
|
R |
Responsible |
Does the work. Others can be asked to assist in a supporting role. There is just one responsible person for any given task. |
A |
Accountable |
Ultimately answerable for the correct and thorough completion of the work. There is just one accountable person for any given task. |
S |
Supports |
As part of a team, roles with a support function work with the person responsible. The support role helps complete the task. |
C |
Consulted on |
Those whose opinions are requested and with whom there is two-way communication. The consulted role does not help complete the task. |
I |
Informed |
Those who are kept informed of progress. |
UCD IT Services
Computer Centre, University College Dublin, Belfield, Dublin 4, Ireland.Contact us via the UCD IT Support Hub: www.ucd.ie/ithelp