Professional Documents
Culture Documents
Togaf
Togaf
Togaf
operates for all relevant ADM phases Establish the Architecture Capability:
Manage architecture requirements identified during any execution of
the ADM cycle or a phase
Ensure that relevant architecture requirements are available for use by
each phase as the phase is executed
It includes information about defining the scope, identifying the stakeholders, creating the Architecture Vision,
and obtaining approvals
Ensure that the architecture lifecycle is maintained
Ensure that the Architecture Governance Framework is
executed
Business Architecture describes the product and/or service strategy, and the organizational,
Ensure that the enterprise Architecture Capability
functional, process, information, and geographic aspects of the business environment.
meets current requirements
Determine who are the legitimate actors who will interact with the product/service/process
Assess and baseline current security-specific business processes (enhancement of existing
objective)
Determine whom/how much it is acceptable to inconvenience in utilizing security measures
Establish architecture artifact, design, and code Identify and document interconnecting systems beyond project control
reviews and define acceptance criteria for the Determine the cost (both qualitative and quantitative) of asset loss/impact in failure cases
successful implementation of the findings Identify and document the ownership of assets
Implement methods and procedures to review
evidence produced by the system that reflects
operational stability and adherence to security
policies Assess and baseline current security-specific architecture elements (enhancement of
existing objective)
Identify and evaluate applicable recognized guidelines and standards
Revisit assumptions regarding interconnecting systems beyond project control
Assess the impact of new security measures upon other Determine and document the sensitivity or classification level of information
new components or existing leveraged systems stored/created/used
Implement assurance methods by which the efficacy of Identify and document custody of assets
security measures will be measured and communicated Determine approaches to address identified risks:
on an ongoing basis
Identify correct secure installation parameters, initial
conditions, and configurations
Implement disaster recovery and business continuity Assess and baseline current security-specific technologies (enhancement of existing
plans or modification objective)
Identify existing security services available for re-use Revisit assumptions regarding interconnecting systems beyond project control
Engineer mitigation measures addressing identified risks Identify and evaluate applicable recognized guidelines and standards
Evaluate tested and re-usable security software and security Identify methods to regulate consumption of resources
system resources Identify minimal privileges required for any entity to achieve a technical or business
Identify new code/resources/assets that are appropriate for re-use objectiv
Identify mitigating security measures, where justified by risk assessment
Sales
250,000
200,000
150,000
100,000