ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide by Shobhit Mehta

ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide by Shobhit Mehta

Author:Shobhit Mehta
Language: eng
Format: epub
Publisher: Packt
Published: 2023-11-15T00:00:00+00:00


The following diagram shows EA in a nutshell:

Figure 14.1 – Enterprise architecture

Technology architecture shows the current state of IT, establishes a vision for a future state, and assists the organization in moving from the current to a future state. The goal of a risk manager is to ensure that this move happens with minimal disruption to IT and hence the business. Since the underlying IT systems are dependent on each other, a security issue in one system can affect others; therefore, a thorough assessment of all system components is important to maintain the security of the system.

The Open Group Architecture Framework (TOGAF), the Zachman Framework, the Department of Defense Architecture Framework (DODAF), the Federal Enterprise Architecture Framework (FEAF), and Sherwood Applied Business Security Architecture (SABSA) are a few examples of commonly used EA.

In the next section, we will learn about the related concept of the CMM.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.