BA Best Practices
BA Best Practices
BA should assist in identifying and defining business needs for the business area concerned by
understanding the current problems and exploring any opportunities for continuous service
improvements. Defining business needs helps to explain why a change to the current system is required.
Identify Stakeholders
Perform Analysis
1. BUSINESS NEED
a. Why change to current system required
b. Problem/limitation with current system and exploring new opportunities
c. Define desired outcome, major functions and features & processes to be improved or
redesigned.
2. GAP ANALYSIS
a. In order to understand the gap between the current as-is state and future to-be state
b. Technique such as SWOT analysis can be used to perform gap analysis
3. SCOPE
a. Define business processes to be involved or redesigned
b. Business related dependencies e.g. regulatory, operational
c. External system dependency both upstream and downstream
d. Any business related assumptions and constraints business rules
4. ELICITATION
a. Various techniques can be used to say few brainstorming, Analysis, Interviews,
Workshop, Prototyping, Survey/Questionnaires etc.
b. Understanding existing system with available resources
c. All provided information should be properly recorded and documented and summary
should be floated
d. BA should agree with stakeholders on
i. scope of work
ii. elicitation work schedule
iii. mechanism for verifying and sign off elicited results
5. PRIORITISE REQUIREMENT
a. Business Value
b. Stakeholder Agreement
c. Impact on users
i. effecting their current processes
ii. require additional staff, training etc
d. Impact on other systems
i. may not be capable
ii. not willing to do the change
e. Regulatory and Compliance
f. Dependency
i. other requirement that needs to early implemented due to higher dependency
g. Urgency or time sensitivity
h. Business or technical risk
i. Implementation difficulty
MoSCoW technique can be used for quick prioritization
Purpose
4 FUNCTIONAL REQUIREMENTS
The functional requirements describe the core functionality of the application. This section
includes the data and functional process requirements.
Context
User requirement
Process requirements may be expressed using data flow diagrams, text, or any technique
that provides the following information about the processes performed by the application:
Context
Detailed view of the processes
Data (attributes) input to and output from processes
Logic used inside the processes to manipulate data
Accesses to stored data
Processes decomposed into finer levels of detail
5 OPERATIONAL REQUIREMENTS
Operational requirements describe the non-business characteristics of an application.
5.3 Security
The security Section describes the need to control access to the data. This includes
controlling who may view and alter application data.
State the consequences of the following breaches of security in the subject application:
5.4 Audit Trail
List the activities that will be recorded in the application’s audit trail. For each activity,
list the data to be recorded.
5.6 Reliability
Reliability is the probability that the system will be able to process work correctly and
completely without being aborted.
5.7 Recoverability
Recoverability is the ability to restore function and data in the event of a failure. Answer
the following questions in this section:
In the event the application is unavailable to users (down) because of a system failure,
how soon after the failure is detected must function be restored?
In the event the database is corrupted, to what level of currency must it be restored? For
example “The database must be capable of being restored to its condition on no more
than one hour before the corruption occurred.”
If the process site (hardware, data, and onsite backup) is destroyed how soon must the
application be able to be restored?
5.9 Performance
Describe the requirements for the following:
Connect Intentionally
Innovate Courageously
Decide Insightfully
Execute Relentlessly