Functional Requirements
Functional Requirements
Version: 2.0
Date: 14.06.12
Page 1 of 23
DOCUMENT APPROVAL
Position Title Users representative team /stakeholder group Project Manager Business Analyst
Signature
Date
Page 2 of 23
Contents 1. 2. 3. 4. Purpose of this Document ........................................................................................................................ 5 Reference documents............................................................................................................................... 5 Scope of the Functional Requirements Specification ............................................................................... 5 Business Processes ................................................................................................................................... 6
User Roles .................................................................................................................................................................... 6
5.
Functional Requirements.......................................................................................................................... 7
Business Process Name (eg. Receive Incoming Stock) ................................................................................................. 7
Sub-process Name (eg. Identify Order Details) .......................................................................................... 8 6. Data and Integration................................................................................................................................. 9 Current Data Access Expectations ............................................................................................................ 10 Governance .............................................................................................................................................. 10 Known Data Issues.................................................................................................................................... 10 Data life cycle and archiving ..................................................................................................................... 11 7. Security Requirements ........................................................................................................................... 12 Access & Authorisation............................................................................................................................. 12 Authentication .......................................................................................................................................... 13 Assurance ................................................................................................................................................. 13 8. 9. 10. Performance ........................................................................................................................................... 13 Availability and Recovery........................................................................................................................ 15 Capacity .................................................................................................................................................. 18 End Users .................................................................................................................................................. 18 Online Transaction Rates.......................................................................................................................... 18 Bulk or Periodic Transaction Rates ........................................................................................................... 18 Data Volumes ........................................................................................................................................... 20 Data Archive Requirements...................................................................................................................... 20 11. Data Migration & Conversion ................................................................................................................. 20 Data Sources ............................................................................................................................................. 20 Acceptance Criteria .................................................................................................................................. 20 Decommissioning and Archive ................................................................................................................. 20 12. 13. Glossary of Terms ................................................................................................................................... 21 Document Control .................................................................................................................................. 21 Document Status and Revision History .................................................................................................... 21
Page 3 of 23
Page 4 of 23
Define the scope of business objectives, business functions, and organisational units covered, Identify the business processes that the solution must facilitate, Facilitate a common understanding of what the functional requirements are for all parties involved, Establish a basis for defining the acceptance tests for the solution to confirm that what is delivered meets requirements.
2. Reference documents
Document Eg. <Project X> Business Requirements Statement Version
In Scope
Out of Scope
i.e. it may be that functional requirements comprise a number of documents elaborating on the same Business Requirements Specification
FILENAME AND PATH Page 5 of 23
4. Business Processes
Provide a list of business processes analysed and represented by these functional requirements. Group business processes according to their functional decomposition (where possible).
The following business processes were analysed for the purposes of determining the functional requirements.
Process Reference Eg 2 Process Name Receive Incoming Stock Process Owner Warehouse Manager
User Roles
This section provides some information about the user roles involved in the business processes. It can help to provide depth and context to the information described in the functional requirements
User Role
Role Description
Reports To
Responsible for the overall warehouse operations and all warehouse staff.
Page 6 of 23
5. Functional Requirements
A range of techniques are open to the analyst to specify functional requirements . An alternative to that set out below is to 4 describe the requirements via use cases, where e.g., process diagrams are grouped with the relevant use case .
3
Moreover, it may be necessary to develop multiple models using different techniques to completely analyse and document requirements, as suggested on page 105 of A Guide to the Business Analysis Body of Knowledge (BABOK Guide), Version 2, International Institute of Business Analysis (IIBA), 2009.
4
Depending on volume and complexity of use cases the analyst may determine that a separate Use Case document is warranted. In such cases, the analyst must clearly link documents as appropriate whether as reference links or as embedded objects. FILENAME AND PATH Page 7 of 23
Sub-Process Name: Objective Trigger\Events Inputs Outputs Functional Requirement 1 Functional Requirement Description Business Requirement Cross Ref Business Rules Business Importance Formulas Test Verification Functional Requirement 2 Functional Requirement Description Business Requirement Cross Ref Business Rules Business Importance Formulas Test Verification (Mandatory / High Priority / Optional) (Mandatory / High Priority / Optional)
Page 8 of 23
Data Classification5
Related To
Format
Business Rules
Order
Numeric up to 10 digits
The number must be unique. The Order Number cannot be changed by the user.
Page 9 of 23
Other Items State or Lifecycle Models (could also choose to add a diagram like this to add additional clarity at some point in the document. Its not that commonly needed though, so probably not worth adding to the template). Output templates [report layouts, letter templates, etc] (This is a good bit to put as an appendix, which can be then removed if not required for a particular project.) Screen Designs / Wireframes (relevant for web/form type projects helps define the user flow and how the information needs to be displayed for users. Again, would put as an appendix, and gets used if required/relevant. Could also go as a stand-alone template if you want
For each data group (or holistically), describe: Data Access Expectations, Data Governance, Known Data Issues & Data Lifecycle & Archiving,
Governance
Identify the business unit that has responsibility for data governance.
Req. No. Eg 1
Are there any identified governance issues Data can only be created and changed by DSA staff. Data access is restricted by confidentiality requirements.
Impact Login uniquely identifies user and links to existing records. User will lose access to
Stakeholders DLTS
Proposal Link all data via unique identifier (eg PIDM) to permit login
Page 10 of 23
Data
Situation
Stakeholders
What is the lifecycle of the data Business Requirements for archiving data access archived data retaining archived data eg. Data is archived yearly Archived data needs to be available within 24 hours
Page 11 of 23
7. Security Requirements
All applications need to operate in an environment that has an appropriate level of security. Security controls will be determined by the data classification level of the data. Refer to the Master Data Classifications It is the data owner that dictates what level of sensitivity the data holds, and what level of availability is appropriate (It should be the responsibility of the data owner to define the classification level of the data. CSU has adopted AS/NZS ISO/IEC 27002:2006, S7.2.1 as the basis for its security standard. IT staff will manage the businesses data in accordance with the requirements laid down by the business.
Role
Description
Eg.
NO
NO
NO
Alternatively, it may be more appropriate to express the access requirements to files, reports or records using a simple CRUD table. An example is provided below:
Role
Description
<Function 3>
<Function 4>
Eg.
None
Page 12 of 23
Authentication
Authentication relates to the identification of the user and their role. The requirement here should steer clear of stating the solution unless that has already been determined as a result of one of the constraints already stated. Rather it should specify any specific business needs, such as seamless/single sign-on, the source of any existing User ID and or password that should be re-used, any user considerations in setting and maintaining passwords (eg users only have number pads, so should only contain numbers). Where appropriate, the functional requirements relating to authentication should be stated in the functional requirements area and the relevant processes documented. Definitions can be found in http://www.csu.edu.au/division/dit/eal/glossary.htm: Single Signon: once-only assertion / authentication per session, per credential Same Signon: The process whereby infrastructure presents the same authentication credentials (or some other predetermined information or token) to a subsequent application, without the user re-entering it, or even being aware of it. This enables those thirdparty packaged applications that have their own built-in authentication that is not able to be detached, to behave as though they are participating in a Single Sign-on solution
Single sign on no
Same sign on no
no n/a
yes n/a
Assurance
Assurance of systems seeks to prevent loss, modification or misuse of user data in applications. ie. How does the organisation assure itself that the security controls that have been put into place, are working, eg. Separation of Duties, Audit Logging, Reporting of Auditing (eg. Who is using the system), any information required by the Audit Office of NSW. This section may also be specified in the Functional Requirements or Technical Specification Document. For further information, see Section 10.10 of AS/NZS ISO/IEC 27002:2006
8. Performance
Provide system performance targets for the various usage scenarios. This should include: * Response times for key functions * Elapsed processing time for report or bulk processing operations It is normal to express performance requirements in bands, eg: 70% of transactions < 2 seconds 85% of transactions < 10 seconds
FILENAME AND PATH Page 13 of 23
100% of transactions < 30 seconds Performance targets should be realistic and reflective of the actual need. Insisting on sub-second response for every activity could add substantial hardware and/or software design costs to a project.
Page 14 of 23
System Availability Question Business Process or Function During which hours is the solution required to support the business Function. (per user group) Can the solution tolerate scheduled maintenance windows and if so when are the most appropriate times for these? (intra-day times or calendar periods) Critical Availability Times (intra-day times or calendar periods) Number of Affected Clients and Types affected by outages of the solution Describe the Business Process Reliance on System Recovery Point (The maximum amount of data loss tolerable expressed as time.) In the event of a data loss how easy is it to reconstitute the data. A=Simple (re-enter from paper forms) B= Difficult (advise remote users to resubmit) C= Impossible Recovery Time (The maximum amount of business function outage tolerable expressed as time.)
FILENAME AND PATH
Example Answer Eg Online subject enrollment Staff data entry 8Am 6Pm AEST Student Access any time Between 8:00Pm 4:00Am AEST During session breaks 8 weeks prior to start of session 20 Staff & 5,000 Students High 10 Minutes B
Answer
3 Hours
Page 15 of 23
System Availability Question Describe any Compliance requirements such as legislative or dependent funding that affect availability of the solution Provide a brief description of the impacts of an outage in relation to this business function.
Example Answer Annual Government reports must be lodged by the end of the Fiscal Year Direct enrolment students will not be able to enroll online and DSA staff will be unable to progress already submitted applications.
Answer
Page 16 of 23
System Outage Impacts Categorize the scope of the impact of a system failure E=Enterprise Wide D=Department only (state which) Categorize the scope of the impact of outages on the Business function C=Customer Facing I=Internal Function, How Many staff will be left substantially idle due to system failure Workaround options (How can business process continue without the system) Would a system outage result in lost customer recruitment opportunities Would a system outage result in a direct financial loss Could a system outage directly result in Damage to the Universitys reputation Could a system failure compromise any of the following P=Personal Safety, S=Data Security, I=Data Integrity C=Client Confidentiality (provide explanation)
Example Answer E
Answer
20 Admin Staff Students fill in paper enrollment forms. Yes Sales are reliant on the system Yes S, I
Page 17 of 23
10.
Capacity
This section is used to detail the expected volumes of data and transaction flows. This should be laid out in a similar manner to the following.
End Users
Detail the expected user loads for each of the distinct user functions or roles. The user roles or titles should line up with the actor definitions provided in the business process requirements.
Connected Concurrently Role Average Eg. Data Entry 20 Max 35 Growth 10%
Transactions per annum Transaction Descriptions Average Online company searches refer UC217 Search for Company 3.5m Max 4.7m Growth 30%
Transactions per annum Transaction Descriptions Average ROP's to non-complying org, refer UC101 Dispatch Notices 3.5m Max 4.7m Growth 30%
Page 18 of 23
Page 19 of 23
Data Volumes
This section is used to detail the expected storage requirements in terms of numbers of entities. This will form the basis for later data storage calculations once the data storage design work has been completed. The Business Entities must match to entities shown in the entity model in the Business Process Requirements.
11.
Data Sources
Identify and briefly describe each of the source systems from which data will be migrated. For each system identify which entities are being extracted and converted.
Acceptance Criteria
On what basis will the migration be deemed a success, eg by entity or source system what percentage of target records must be migrated successfully? What balancing figures will be checked and what degree of variance will be accepted? Is it a requirement that the new system be implemented prior to or after migration? How much data will be migrated, eg last 3 years only or data since inception? What degree of data discards during migration will be accepted. How will the conversion / migration be verified?
Page 20 of 23
12.
Term
Glossary of Terms
Definition Higher Education Contribution Scheme)
(E.g. HECS
13.
Document Control
Author C.Cox C.Cox C.Cox Issue date 13th October 16th February 2012 17th February 2012 Following Workshop 1 with BA, EA, SA, SCs Following workshop 2, changes as follows: Remove section titled Impact on current businesses processes and the nature of the impact: (migrated from the FR Checklist). This should be covered as part of the business requirements analysis sub process. CC to pursue whether and how this is covered in that area. Remove the section titled Legislative and compliance requirements (migrated from the FR checklist) and insert a note regarding legislative /compliance in the functional Requirements section because: Revisions
Legislative implications really belong at the business requirements analysis stage where the BA would be aware of legislative/compliance considerations when developing the BR requirements. This flows through to the functional requirements specification. Should any additional legislative / compliance need be suggested in the course of specifying functional requirements, then these should be noted against relevant requirements.
The sub section data archiving requirements within the Capacity section, to be reviewed and compared to other sections to see what overlap exists and to resolve as appropriate. Mavis will lead a short exercise to resolve this and include representation from EA and SA members from this working group.
The subsection Data creation and management under the section: Data and Integration is removed. A column Data classification is added to the table under Data definition and a legend and link provided on classification.
Move the section Data migration and conversion after the section Data and integration. Rethink the section Availability and Recovery. Kieran to lead this exercise with assistance from BA and SA representatives. Update to the Data Definition example table suggested by C.Middleton to include at left an additional column titled:
Page 21 of 23
DRAFT 4
C.Cox
1.
Version
Author
Issue date
Revisions 2. Business Object/Entity.(CM) In the Data Definition section change the format of the note at the end on Data Security Classification Level so that it looks more like a note (MW). Updated Availability and Recovery section following Kierans working group efforts
Changes from Mavis sub group 1. Move the Section on Data & Integration to before Security (& after functional requirements)
Rationale: Data is the section you generally work on next after you have worked through the functional, and that the other sections (Security, Performance etc) will stem from accurately identifying both functional & data components. 2. Have Colleens Data Definitions table as the first item in Data & Integration, and changed to landscape Retained the section Data Archive Requirements in Capacity, but removed the example
Rationale: There is still a need for capacity estimates on archived data but the example was confusing and worked against the intent of the section. Moving the Data & Integration section before Capacity makes this section more logical. 4. Introduced a sub-section Data Access Expectations into Data & Integration Restructured the heading in Data Life cycle & archiving table to make it clearer about archiving data requirements Suggestion to remove Integrity, Event Logging & Audit Trails
Rationale: these items should be in the functional requirements/use cases (thinking from a couple of BAs) 7. Re-arrange the headings in the Data & Integration section Rationale: so it logically flows more easily for the BA. So the Data & Integration Section should be moved in the document & now has the headings Data Definitions Table Current Data Access Expectations Governance Known Data Issues Data Lifecycle & Archiving
DRAFT 6`
12.2.20 12
C.Cox.
Section: Data & Integration - Update the prompter for Data Definition and also the Data definition table - change received from Colleen.
Page 22 of 23
Revisions Include sample table under Current Data Access Expectations from MW Introduction of Word styles & tidy up of formatting. Updating of Security section. Finalised following review session with Mavis.
Document Distribution
No. Recipient Position
Page 23 of 23