TOGAF-EA-Practitioner - Delegate Pack v1.2
TOGAF-EA-Practitioner - Delegate Pack v1.2
TOGAF® Enterprise
Architecture
Practitioner
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
Edition
and apply the TOGAF Standard, 10th Edition to developing, sustaining, and
using an Enterprise Architecture.
I am the person who I am the person who I am not worried I am not worried about
does the work develops, maintains, about the theory how to structure or
and uses an EA maintain an EA
Capability
© The Knowledge Academy Ltd
TOGAF 9
Prerequisites
TOGAF 9
Foundation,
EA Foundation Foundation,
TOGAF EA
None None or TOGAF EA
Foundation,
TOGAF 9 Certified Foundation,
or higher
Via the Bridge or higher
ADM
Techniques
Applying
the ADM
Body of Knowledge
TOGAF® Series
Guide: Integrating TOGAF® Series
TOGAF® Series
Risk and Security G217 Guide: Using the
Capability G152 G176 Guide: Business
Architecture within a TOGAF® TOGAF Standard in
Scenarios
& Enterprise the Digital Enterprise
Content
Governance Architecture
12
symbol
TOGAF® Enterprise
Architecture
Practitioner
Unit 1- Concepts
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
❑ Guidance on effective change takes place during the activity to realise the approved EA.
It describes the future state and the current state of the Enterprise.
❑ The gap between the Enterprise’s current state and future state highlights what must change.
❑ It exists to guide and constrain change planning and work to perform the change.
❑ The scope of work embedded in a Request for Architecture Work should identify the applicable
characteristics of the EA Landscape.
❑ The primary purpose of the models is to facilitate the architect to understand the system being
examined.
EA to support Strategy:
deliver EA to provide a EA to support Solution
target architecture, Delivery: deliver EA
and develop roadmaps that is used to support
of change over a three the solution
to ten-year period deployment
Architect:
1. The development of the Target Architecture
❑ Governance of all change within the scope of the Target Architecture enables to develop a
good target that provides an organisation’s best achievable course forward.
❑ Typically, the Enterprise Architect and implementer are directed, and both are controlled by
the stakeholder.
2. The Enterprise and IT Governance functions will define a formal Architecture Compliance
review process for reviewing the compliance of all projects to the Enterprise Architecture
❑ A formal process for such reviews normally forms the core of an Enterprise Architecture
Compliance strategy.
❑ If the answer is no, then there is a decision on whether the Practitioner should rework the
architecture or the Architecture Project should be cancelled.
✓ Two governance roles are often performed: the Auditor and the Architect.
theknowledgeacademy
✓ Impact must be assessed on the same terms as the target was developed. Assessing on any
other terms invalidates the assessment and recommendation.
A good Architecture (developed in Phases A-F) will identify what products the Enterprise
needs, the boundary of the products, and what constraints a product owner has.
❑ Architecture will have a set of constraints that limit the choices of the Agile team — often
termed as guardrails
❑ There should be a focus on risk mitigation, to ensure that the project meets its objectives.
❑ The Practitioner must track the Architecture states across two characteristics:
theknowledgeacademy
1) Time
2) A Conformance Test
❑ The four characteristics of the EA Landscape: breadth, depth, time, and recency
❑ The different Architecture Projects that can work on the same subject at different times and
at different levels of detail
❑ Shared services
❑ Impenetrable dependencies
❑ It builds on enterprise information that is already available in the Enterprise Architecture, and
it produces information that influences the Enterprise Architecture.
❑ Doing it right the first time saves costs and increases effectiveness compared to bolting on
security afterwards.
❑ The uncertainty is concerned with predicting future outcomes, given the limited amount of
information available when making a business decision.
❑ This information can never be perfect, although our expectation is that given better quality
information we can make better quality decisions
❑ the likelihood associated with each identified outcome. Identifying and assessing these
factors is known as “risk assessment” or “risk analysis”
process.
❑ Risk can be seen at the strategic long-term level (overall direction of the business), the
medium term tactical level (transformation projects and programs), and at the operational
level (regular day-to-day operational decisions, processes, and practices).
❑ This context represents the bare minimum requirements of delivering digital value.
❑ The Team context covers the basic elements necessary for a collaborative product team to
achieve success while remaining at a manageable human scale.
❑ The team is all in the same location, and can still communicate informally, but there is enough
going on that it needs a more organised approach to getting work done.
and is now faced with the realities of operating a sustainable business over periods of time
longer than the next product cycle.
TOGAF® Enterprise
Architecture
Practitioner
Unit 2- Stakeholder
Management
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
the current Architecture Project, and subsequently has decision rights to the suitability of the
implementation
❑ Concern: a consistent set of subjects that capture the stakeholder’s interests and act to
consolidate requirements
❑ A concern addresses the stakeholder’s power, interest, and requirements against this topic.
❑ This approach surfaces topic-based decision rights and provides the ability to perform a trade-
off between competing requirements.
❑ A consistent set of core concerns aligned to Enterprise priority facilitates a focus on priority.
Concern 1 Concern 2
Power Interest Requirement Power Interest Requirement
Stakeholder 1 High Low Low High
Stakeholder 2 High High Low Low
Stakeholder N Low High High Low
❑ Often it is a potential architecture, and the view serves to help the stakeholder’s potential
target and associated change, allowing a stakeholder to put things in context and have
confidence about the target and the change.
❑ When stakeholders understand the architecture, the change, and the trade-offs,
implementation governance is possible.
❑ Each viewpoint should identify the concern, the stakeholder(s), how the view should be
constructed, and the information required to address the question.
must make.
represents the whole system - the perspective of each stakeholder constrains how they see the
overall system.
❑ Questions:
1. Name some elements in the pilot’s view not viewed by the controller
2. Name some elements in the controller’s view not viewed by the pilot
3. Name some shared elements
❑ Stakeholders own the architecture and the value preference and priority the architecture is
expected to enable.
❑ They typically perform several roles: they will act as Subject Matter Experts (SMEs) and agents
for their stakeholders in addition to developing architecture.
❑ As an SME, the Practitioner is a source of expert advice. As an agent, the Practitioner may
speak on behalf of a stakeholder.
▪ Mission
▪ Business model
▪ Strategies
❑ Different stakeholders have different concerns about the architecture. These concerns must be
addressed and represented effectively to the stakeholder to enable the stakeholder to approve
the Target Architecture.
❑ The second part of the method defines alternatives based on the criteria and builds
understanding of each.
❑ The third part of the method will either select one of the alternatives, or else combine features
from more than one, to create the proposed alternative.
❑ Effective trade-off requires understanding value preference and priority as well as the scope of
change necessary to realise the target.
❑ Practitioners are most valuable facilitating trade-off between stakeholders and across
organisational boundaries allowing different stakeholders to effectively measure preferences,
priorities, and costs that they do not intuitively understand.
And
“losing one quality, aspect, or amount of something in return for gaining another quality
aspect, or amount”.
TOGAF® Enterprise
Architecture
Practitioner
Unit 3- Phase A, the Starting
Point
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
• §6 The Architecture
Development Method
Concepts 3.4
Outputs necessary to proceed with the Architecture
Development
❑ Define scope
❑ Evaluate capabilities
Explore the EA Repository for superior architecture constraints and guidance. Do the
Stakeholder Map. Be completely clear which stakeholders must be served and what they are
worrying about.
❑ Define scope
❑ Evaluate capabilities
❑ Evaluate capabilities
❑ Define scope
❑ Evaluate capabilities (of the EA team)
Take a hard look at the EA team and confirm the ability of the team to deliver on this architecture
development project. A good EA team covers gaps in experience, skill, and bias to deliver the
architecture that is useful, overcoming weaknesses of few members of the team.
communicate to the key stakeholders how the problem can be addressed and what the scope
of change is.
❑ Be clear on the target, the value of the target, and the work to change.
❑ Completing the outputs of Phase A requires exploring all of the domains – whether the
exploration is to understand what should change, or where change is not an option to
determine the impact of retaining current architecture.
▪ Key stakeholder agreement on a summary of the target and the work to reach the target
Architecture Work, or the subset of scope and goals associated with this iteration of
architecture development.
❑ The order of the steps in Phase A as well as the time at which they are formally started and
completed should be adapted to the situation at hand in accordance with the established
Architecture Governance.
Check the learning studies documents: Page 15
▪ Satisfy the security stakeholders that the end-state does not represent any unknown or
unacceptable risk and aligns with corporate policies, standards, and principles
▪ Satisfy business stakeholders – in particular those who control the budget – that the
Security Architecture is instrumental in enabling and supporting the overall architecture
required to deliver the business opportunities and benefits identified with the right balance
between risk, compliance, and business benefits
stakeholder requirements are gathered to determine the security blueprint needed to address
the various concerns the stakeholders have.
❑ Stakeholders typically have value concerns related to the Security Architecture. Value may be
measuring items such as reduced risk and enablement of the overall architecture.
❑ The viewpoints and business cases must build on Security Principles, drivers, key risks, and risk
appetite and should be an integral part of the overall Architecture Vision deliverables.
❑ Architecture Principles
❑ Capability Assessment
❑ Architecture Vision
❑ Communications Plan
❑ The Statement of Architecture Work is typically the document against which successful
execution of the architecture project will be measured and may form the basis for a contractual
agreement between the supplier and consumer of architecture services.
❑ The purpose of the Architecture Vision is to provide key stakeholders with a formally agreed
outcome. Early agreement on the outcome enables the architects to focus on the detail
necessary to validate feasibility.
❑ Effective communication of targeted information to the right stakeholders at the right time is a
critical success factor for Enterprise Architecture.
❑ What the Enterprise values and consumes is typically different than what the Practitioner
produces. Practitioners deliver an essential output.
❑ The intent is to keep the focus on the outcome being pursued, not what is done.
TOGAF® Enterprise
Architecture
Practitioner
Unit 4– Architecture
Development
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
• §6 The Architecture
Development Method
4.4, How to apply Phases B, C, and D, and how they contribute to the
4.6,4.8 Architecture Development work
Concepts
4.5 Information relevant to Phase C (Data and Applications)
to produce outputs for the Architecture Development
▪ Given a set of stakeholders and concerns, what information do you need to know about the
system being examined to address their concerns?
▪ Given a set of information, how will you model, represent, capture, and analyse it?
▪ Are there reference models that allow you to skip to gathering and analysing rather than
inventing?
▪ If part of the EA Landscape will have no change, and is not needed for traceability, what
useful reason is there for a Practitioner to spend time describing it?
❑ Without understanding the work required to reach the target, stakeholders will approve the
impossible.
▪ Explores the impact of their candidate architecture against other candidate architectures,
transition states, the target state, and in-flight Implementation Projects
▪ Works with the Enterprise risk management process to assess impact to the Enterprise’s
risk; this is one of the most complex activities for an engaged high-functioning EA team
competing preferences over time. They have taken the time to explore options and impacts.
▪ Is the information that will address the question at hand already available?
▪ Is there a superior architecture that guides and constrains the task at hand?
▪ Business-level trust
▪ Risk
▪ Controls
❑ These are independent from specific IT or other systems within the specific scope of the
architecture engagement.
❑ The security elements of Phase C comprise functional security services and their security
classification.
❑ In most cases, the development of specific Technology Architecture security artifacts is not
necessary, as long as it incorporates the relevant security controls and mechanisms defined in
earlier phases.
❑ The Security Architect must ensure that the required controls are included in the Technology
Architecture and verify whether the controls are used in an effective and efficient way.
❑ A summary answer to the problem that is acceptable to the stakeholders (the Architecture
Vision).
❑ Non-Architectural Inputs
▪ Capability Assessment
▪ Communications Plan
❑ Architecture Principles
❑ Enterprise Continuum
❑ Architecture Repository
❑ Architecture Vision
❑ A set of gaps, and work to clear the gaps understood by the stakeholders.
❑ What must change to enable the Enterprise to meet the preferences of the stakeholders?
(Gaps)
❑ What work is necessary to realise the changes, that is consistent with the additional value
being created? (Work Package)
❑ How stakeholder priority and preference adjust in response to value, effort, and risk of change.
(Stakeholder Requirements)
All activities that have been initiated in these steps should be closed during the Finalise the
Architecture step.
New models characterising the needs of the business will need to be defined in detail during
Phase B.
❑ Existing business artifacts to be carried over and supported in the target environment may
already have been adequately defined in previous architectural work; but, if not, they too will
need to be defined in Phase B.
❑ Examples:
▪ Major applications systems (ERP, CRM, …) often combine technology infrastructure and
application logic
▪ Data Management
▪ Data Migration
▪ Data Governance
❑ Non-Architectural Inputs
▪ Capability Assessment
▪ Communications Plan
❑ What must change to enable the Enterprise to meet the preferences of the stakeholders?
(Gaps)
❑ What work is necessary to realise the changes, that is consistent with the additional value
being created? (Work Package)
❑ How stakeholder priority and preference adjust in response to value, effort, and risk of change.
(Stakeholder Requirements)
❑ Non-Architectural Inputs
▪ Capability Assessment
▪ Communications Plan
❑ Draft Architecture Definition Document, which may include Baseline and/or Target
Architectures of any architecture domain
❑ Draft Architecture Requirements Specification, including:
❑ Business, Data, and Application Architecture components of an Architecture Roadmap © The Knowledge Academy Ltd
❑ What must change to enable the Enterprise to meet the preferences of the stakeholders?
(Gaps)
❑ What work is necessary to realise the changes, that is consistent with the additional value
being created? (Work Package)
❑ How stakeholder priority and preference adjust in response to value, effort, and risk of change.
(Stakeholder Requirements)
❑ A set of gaps, and work to clear the gaps understood by the stakeholders.
TOGAF® Enterprise
Architecture
Practitioner
Unit 5 – Implementing the
Architecture
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
Unit 5 5.7 Why and how Business Value is assigned to each Work Package
Concepts 5.10
The outputs of Phase F necessary to Proceed with the
Architecture Implementation
Concepts
❑ The value expected to be delivered by work packages should include measures related to
security and risk value to ensure the roadmap addresses the complete set of business goals
and drivers.
❑ The security building blocks defined in the previous phases become SBBs in this phase so that
more specific implementation-oriented requirements and specifications are defined.
❑ The Security Services Catalog of the Baseline Security Architecture probably contains existing
security services or security building blocks that meet the requirements.
❑ Migration of live environments should always include regression planning so that there is a way
to reverse out a failed migration. This is an essential part of risk management.
❑ In addition, migration planning should include a security impact analysis to understand any
security impacts of the target state of the change.
and implemented processes and systems adhere to the overall Security Architecture.
❑ This ensures that deviations from Architecture Principles and implementation guidelines don’t
create any unacceptable risk.
transformation
▪ Achievable targets
Implementation Factor catalog, logically group the various activities into work packages.
❑ Fill in the "Solution" column in the Consolidated Gaps, Solutions, and Dependencies matrix to
recommend the proposed solution mechanisms.
❑ Indicate for every gap/activity whether the solution should be oriented towards a new
development, or be based on an existing product, and/or use a solution that can be purchased.
❑ Supporting top-level work packages should then in turn be decomposed into increments to
deliver the capability increments.
❑ Finally, group the work packages into portfolios and projects within a portfolio, taking into
consideration the dependencies and the strategic implementation approach.
incremental approach
❑ Identifies one or more clear targets along the roadmap to realisng the Target Architecture
❑ Determine where the difficult activities are, and unless there are compelling reasons,
implement them after other activities that most easily deliver missing capability.
❑ Estimate resource requirements, project timings, and availability/delivery vehicle Prioritise the
migration projects through the conduct of a cost/benefit assessment and risk validation
❑ Program context:
the hands of the beneficiaries (customers, end-users, support personnel, partners, etc.).
❑ At the end of this period, initiate a gap analysis between the realised architecture and the
Baseline Architecture to be used for solution delivery.
❑ Document the lessons learned, mainly the gaps in the description of the superior architecture
that were filled while delivering the Solution Architecture.
❑ Involve all stakeholders, decision-makers, and implementers to complete the assessment, and
gain the sign-off to close the effort.
❑ Establish what constitutes business value within the organisation, how value can be measured,
and then apply this to each one of the projects and project increments.
❑ Use the work packages as a basis of identifying projects that will be in the Implementation and
Migration Plan.
❑ Risks should then be assigned to the projects and project increments by aggregating risks
identified in the Consolidated Gaps, Solutions, and Dependencies Matrix (from Phase E).
❑ Estimate the business value for each project using the Business Value Assessment Technique.
❑ Return-on-Investment Criteria
❑ Business Value
❑ Strategic Fit
1. Where their project fits within the roadmap, and its role in producing value.
2. What work packages and gaps they are responsible for, as well as associated gaps they are not
responsible for.
❑ The Practitioner’s job is to show that a sufficient level of scrutiny led to the deliverables of the
Architecture Project for the solution delivery architecture to succeed.
❑ Prove to the stakeholders that when the Architecture Project is consumed by the solution
delivery architecture, their requirements have been met and changes to the Enterprise will be
guided and constrained efficiently.
❑ Identify and secure approval for the resources necessary to begin allocating the budget for the
solution delivery architecture to begin.
❑ Prioritise the projects by ascertaining their business value against the cost of delivering them.
theknowledgeacademy
❑ The approach is to first determine, as clearly as possible, the net benefit of all of the SBBs
delivered by the projects, and then verify that the risks have been effectively mitigated and
factored in.
❑ Review the risks to ensure that the risks for the project deliverables have been mitigated as
theknowledgeacademy
much as possible. The project list is then updated with risk-related comments.
❑ Formally review the risk assessment and revise it as necessary ensuring that there is a full
understanding of the residual risk associated with the prioritisation and the projected funding
line.
❑ Review the work to date to assess what the time-spans between Transition Architecture should
be, taking into consideration the increments in business value and capability and other factors,
such as risk.
❑ Once the capability increments have been finalised, consolidate the deliverables by project.
❑ This may include assigning project objectives and aligning projects and their deliverables with
the Transition Architectures to create/update an Architecture Definition Increments Table.
❑ Non-Architectural Inputs
❑ Capability Assessment
development management
❑ Stakeholders often have little confidence that the project will deliver the expected value with
the expected cost and the projected time.
❑ The lack of confidence means the architecture has more uncertainty, or risk, associated with
realising the organisation’s objectives.
▪ facilitate good decision-making in the context not of project benefits realisation but of
Enterprise benefits realisation
▪ ensure the stakeholders and implementers understand the implications of their choices
regarding Enterprise benefits not driving them to make different choices
❑ The Architecture Contract is used to direct and control the implementation team to work
towards a thought-out future.
❑ The Architecture Requirements Specification is used to direct and control the creativity of the
implementation team.
architectures
❑ Compliance Assessments
❑ Change Requests
state.
❑ From these diagrams the implementers are expected to figure out the gaps they should fill, the
architecture specifications they must conform to, and the controls they must implement.
❑ Implementers are better served when they are explicitly provided context, gap, architecture
specification, and control.
❑ Scope: what work packages and gaps is the Implementation Project responsible for, as well as
what gaps associated with any architecture components associated with the project scope is
the project not responsible for?
❑ Conformance: what is the set of specific architecture specifications and controls the
Implementation Project will be assessed against?
recommended:
TOGAF® Enterprise
Architecture
Practitioner
Unit 6 – Architecture
Change Management
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
Concepts
❑ Non-Architectural Inputs
❑ Then initiate the architecture work for the next target transition state (top-down driver)
and requirements are not suitable or are not sufficient to complete the implementation of a
solution.
▪ In such cases, it is necessary for implementation projects to either deviate from the
suggested architectural approach or to request scope extensions
❑ In addition, external factors — such as market factors, changes in business strategy, and new
technology opportunities — may open up opportunities to extend and refine the architecture.
❑ Manage risks
❑ Align the EA team with the organisation’s planning, budgeting, operational, and change
processes
❑ New Request for Architecture Work to move to another cycle (for major changes)
❑ Direction to proceed and start developing a Target Architecture that addresses perceived, real,
or anticipated shortfalls in the Enterprise relative to stakeholder preferences.
TOGAF® Enterprise
Architecture
Practitioner
Unit 7 – Requirements
Management
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
Unit 7 7.1 The inputs that feed the Requirements Management Phase
Concepts
organisation’s vision, mission, business model, and strategies through the most detailed
statement of requirement.
❑ When engaging with stakeholders, Practitioners must maintain the complete set of every
stakeholder’s preference, and the implications of those preferences.
▪ Will typically form a major component of an implementation contract or contract for more
detailed Architecture Definition
Statement is generated, which identifies the phases of the ADM that need to be revisited to
address the changes.
❑ The statement goes through various iterations until the final version, which includes the full
implications of the requirements (e.g., costs, timescales, and business metrics) on the
architecture development.
❑ Once requirements for the current ADM cycle have been finalised then the Architecture
Requirements Specification should be updated.
TOGAF® Enterprise
Architecture
Practitioner
Unit 8 – Supporting the ADM
Work
TOGAF Training Materials licensed from The Open Group. © 2022 The Open Group. All rights
reserved. Reproduction and redistribution prohibited.
The Open Group®, and TOGAF® are registered trademarks of The Open Group.
Unit 8 8.1 How The Open Group TOGAF Library can be used to support
the Practitioner’s Work
Concepts 8.4 How Migration Planning techniques are used to review and
consolidate the Gap Analysis results from earlier Phases
Unit 8
8.13 How Iteration can be used in Architecture Practices
❑ Document, as high-level architecture models, the business and technical environments where
the problem situation is occurring
❑ Identify and document desired objectives; the results of handling the problems successfully
(ensure the objectives are SMART)
❑ Identify human actors (participants) and their place in the business model
❑ Identify computer actors (computing elements) and their place in the technology model
Architecture Contract.
❑ This is used to document factors impacting the architecture Implementation and Migration
Plan.
❑ This is used by the architect to group the gaps identified in the domain architecture gap
analysis results and assess potential solutions and dependencies to one or more gaps.
❑ This is used by the architect to plan a series of Transition Architectures outlining the status of
the Enterprise Architecture at specified times.
❑ This is used by the architect to show the proposed state of the architectures at various levels
using the defined taxonomy (e.g., the TOGAF TRM).
❑ This is used to assess business value by drawing up a matrix based on a value index dimension
and a risk index dimension.
❑ A Practitioner requires linkage between any models and documentation, as well as a space to
perform analysis.
Sufficient Detail:
❑ A well run repository will contain sufficient detail to demonstrate that views for stakeholders
are derived from the architecture.
governance hierarchy. Broad, summary architectures set the direction for narrow and detailed
architectures.
▪ Architectures at different levels can be developed through iterations within a single cycle of
the ADM process
❑ Depth: with broader subject areas, less detail is needed to ensure that the architecture has a
manageable size and complexity. More specific subject matter areas will generally permit (and
require) more detailed architectures.
set of Target Architectures that stretch into the future. Broader and less detailed architectures
will generally be valid for longer periods of time and can provide a vision for the enterprise
that stretches further into the future
❑ Recency: finally, each architecture view will progress through a development cycle where it
increases in accuracy until finally approved. After approval, an architecture will begin to
decrease in accuracy if not actively maintained. In some cases recency may be used as an
organising factor for historic architectures.
❑ Offers a consistent way to define and understand the generic rules, representations, and
relationships in an architecture, including traceability and derivation relationships
❑ They are used to capture architecture requirements; e.g., Business, Data, Application, and
Technology requirements
❑ Those business capabilities should be mapped back to the organisational units, value streams,
information systems, and strategic plans within the scope of the Enterprise Architecture
project.
❑ This relationship mapping provides greater insight into the alignment and optimisation of each
of those domains
Strategic Business Planning (L) Market Planning (H) Partner Management (M)
Core Account Management (L) Product Management (L) Distribution Management (L)
capabilities, while business capabilities provide what the organisation needs for a particular
value stage to be successful.
❑ Start with the initial set of value stream models for the business documented in the
Architecture Vision phase. Within the scope of the specific Enterprise Architecture project, if
sufficiently larger in breadth, there may be a need for new value streams not already in the
repository.
❑ A new or existing value stream can be analysed within the scope of the project through heat
mapping (by value stream stage) or by developing use-cases around a complete definition of
the value stream
Security Mgmt.
Employee Background
and ID
Information Mgmt.
Employee Information
Mgmt.
❑ The map should depict the working relationship between those entities, as distinct from an
organisational chart that only shows hierarchical reporting relationships.
❑ The business unit is the main concept used to establish organisation maps.
❑ This map is a key element of Business Architecture because it provides the organisational
context for the whole Enterprise Architecture effort.
IT Warehouse
HR
Key
Web Services
Finance Enterprise
Central
Operations
Online Business
Store Unit
Quality
Assurance Global Retail
Enterprises, Department
Inc.
Product
Design External
Partner
Product Sales &
Suppliers Marketing Retail
Operations Collaborative
Team
Retail
Strategy US
Team Stores Japan
Stores
UK
Stores
❑ Relationships among the information domains can then be added to the map as the next level
of understanding for a good baseline information map.
❑ The most significant benefit then comes with building matrices between information and
business capabilities.
❑ These information maps and relationships to business capabilities will then apply in later
architecture phases on data characterisation, applications, and infrastructure.
❑ Activity Models (also called Business Process Models) describe the enterprise's business
activities, the data and/or information exchanged between activities (internal exchanges), and
the data and/or information exchanged with other activities that are outside the scope of the
model (external exchanges)
❑ Use-Case Models describe the business process of an enterprise in terms of use-cases and
actors corresponding to business processes and organisational participants (people,
organisations, etc.)
❑ Logical Data Model (or Class Model)Logical data models describe the entities, their attributes,
and the acceptable values for these attributes as well as the relationships between the various
entities.
❑ Business Models Business models provide a powerful construct to help focus and align an
organisation around its strategic vision and execution
© The Knowledge Academy Ltd
❑ The Gap Analysis technique is used to consider what may have been forgotten or missed, as
well as what is needed.
❑ Add to the Baseline Architecture axis a final row labelled "New", and to the Target
Architecture axis a final column labelled "Eliminated”
❑ Where an ABB is available in both the Baseline and Target Architectures, record this with
"Included" at the intersecting cell
❑ Where an ABB from the Baseline Architecture is missing in the Target Architecture, each must
be reviewed
❑ Where an ABB from the Target Architecture cannot be found in the Baseline Architecture,
mark it at the intersection with the "New" row as a gap that needs to filled, either by
developing or procuring the building block
© The Knowledge Academy Ltd
❑ If the current state is accepted, the only reason to describe the baseline is to develop gaps.
❑ Description using the same technique at the same level of detail enables identification of
gaps: a gap is everything that changes.
2. Iteration to describe the integrated process of developing an architecture where the activities
described in different ADM phases interact to produce an integrated architecture
❑ Projects may:
Copyright ©© The
TheKnowledge
Open Group 2022
Academy Ltd.
3. Iteration to manage the Architecture Capability
(Architecture Capability Iteration)
theknowledgeacademy
▪ Definition of Change
▪ Implementation of Change
❑ Iteration can also be done in terms of information flow, where iteration is driven by the
information needs of the project.
❑ If the information required is not available then it is produced by exercising a TOGAF ADM
phase.
of Transition Architectures
outlining the status of the
Enterprise Architecture at
specified times.
▪ An understanding of the types of entities within the enterprise and the relationships between
them that need to be captured, stored, and analysed in order to create the Architecture
Description; this Enterprise Metamodel depicts this information as a formal model
▪ Completeness
▪ Traceability
These examples are provided as a starting point for a Practitioner who needs to consistently
describe some part of an Enterprise.
❑ The approaches may have a formal or informal metamodel, notation, or supporting method.
❑ The Content Framework provides an underlying structure for the ADM that defines inputs and
outputs in more detail and puts each deliverable into the context of the holistic architecture
view of the enterprise.
capture the surrounding context of formal architecture models, including general Architecture
Principles, strategic context that forms input for architecture modeling, and requirements
generated from the architectureThe relevant aspects of the business context that have given
rise to the Request for Architecture work are typically investigated, refined, validated, and
recorded in the Preliminary and Architecture Vision phases.
❑ Technology Architecture models capture technology assets that are used to implement and
realise information system solutions
majority of enterprises.
❑ It defines a list of common components and common possible relationships the enterprise
may want to keep track of (motivation, role, event, activity, location, resource, platform
services) and a set of relationships.
❑ Asset Protection
❑ Risk Assessment
❑ Access Control
❑ Audit
❑ Availability
and then accepting, mitigating, or transferring the risk according to the organisation’s risk
appetite
❑ Source: TOGAF Series Guide: Integrating Risk and Security within a TOGAF® Enterprise
Architecture, §3.2.1
▪ Effect
▪ Frequency
▪ Classification scheme
E= Extremely High Risk, H = High Risk,
M = Moderate Risk, L = Low Risk
objective
❑ A qualitative risk assessment delivers a listing of relevant risk scenarios with a high-level
prioritisation (high-medium-low), whereas a quantitative approach seeks for numeric
determination of the risk.
❑ Source: TOGAF Series Guide: Integrating Risk and Security within a TOGAF® Enterprise
Architecture, §5.3.4
risk mitigation strategy, which could aim to increase the level of control, transfer the risk to
another party, avoid the risk by changing the business activity, delay the risk, compensate for
the risk, etc.
❑ The broader sense of risk is addressed by the Enterprise Risk Management (ERM) process in
phase E.
❑ The scope includes the latest information security risks as identified during the risk
assessments that are done earlier in Phase B.
❑ The migration strategy should include a risk assessment and a Risk Mitigation Plan.
❑ In addition, migration planning should include a security impact analysis to understand any
security impacts of the target state of the change.
www.theknowledgeacademy.com/tickets
https://uk.trustpilot.com/review/theknowledgeacademy.com
theknowledgeacademy