enterprise architecture (ea) - Blog - Global Risk Community2024-03-29T06:56:09Zhttps://globalriskcommunity.com/profiles/blogs/feed/tag/enterprise+architecture+%28ea%29Collaborative Planning Methodology (CPM) of the Federal Enterprise Architecture Framework (FEAF)https://globalriskcommunity.com/profiles/blogs/collaborative-planning-methodology-cpm-of-the-federal-enterprise-2021-09-22T10:00:43.000Z2021-09-22T10:00:43.000ZMark Bridgeshttps://globalriskcommunity.com/members/MarkBridges<div><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;"><a href="{{#staticFileLink}}9595419074,original{{/staticFileLink}}"><img class="align-right" src="{{#staticFileLink}}9595419074,RESIZE_400x{{/staticFileLink}}" alt="9595419074?profile=RESIZE_400x" width="295" height="239" /></a>Business and technology resources are aligned using <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/business-toolkit/enterprise-architecture">Enterprise Architecture (EA)</a> in order to achieve strategic results, improve organizational performance, achieve <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/business-toolkit/cost-optimization">Cost Optimization</a> and Operational Excellence, and guide departments to fulfill their central missions more efficaciously.</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Federal Enterprise Architecture Framework (FEAF) does that for any U.S. federal agency and helps systems transcend interagency boundaries.</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Planning is one of the most important elements for bringing about change in an organization, if not the most important. Planning methodology for the Federal Enterprise Architecture Framework is called Collaborative Planning Methodology (CPM).</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Collaborative Planning Methodology is the next-generation successor to Federal Segment Architecture Methodology (FSAM).</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Collaborative Planning Methodology encompasses 2 phases and a total of 5 steps under these phases:</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;"><a href="https://flevy.com/browse/flevypro/feaf-collaborative-planning-methodology-5858" target="_blank"><img class="align-full" style="padding:3px;" src="https://flevy.com/blog/wp-content/uploads/2021/09/Slide-Deck-image-FEAF-Collaborative-P-M.png?profile=RESIZE_710x" alt="Slide-Deck-image-FEAF-Collaborative-P-M.png?profile=RESIZE_710x" width="600" /></a></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;"><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;">Organize and Plan</span> phase lets planners facilitate partnership between sponsors and various stakeholders in order to ascertain and prioritize requirements, explore other organizations with same needs, and devise plans to tackle the stated requirements.</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;"><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;">Implement and Measure</span> phase has the planners in assist role to other key personnel working to implement and monitor change related activities by supporting investment, procurement, implementation, and performance measurement actions and decisions.</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Each step under these 2 phases has a number of activities that need to be completed in order to obtain the outcome for that step. There are regular and essential iterations within and among the phases even though the phases have been displayed as successive. Let’s discuss the key steps of the methodology in detail.</p><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;">1. Identify and Validate</span></strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">The objective of the 1<span style="margin:0px;padding:0px;border:0px;font-size:11.25px;vertical-align:baseline;background:0px 0px;line-height:0;position:relative;top:-0.5em;">st</span> step is to ascertain what is required to be attained, comprehend the main drivers for change, and afterwards delineate and prioritize the goals with stakeholders and operational staff.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Key outcomes of the step include:</p><ul style="margin:0px 0px 15px;padding:0px 0px 0px 30px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;list-style:none;font-family:Georgia, serif;"><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Identified and validated needs.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Overarching set of performance metrics.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Determination of who (governance) will ultimately oversee and approve recommended changes to meet those needs.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></li></ul><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;">2. Research and Leverage</span></strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">The aim of this step is to detect organizations and service providers who have already fulfilled or presently have requirements similar to those identified in Step 1. This necessitates studying their experiences and outcomes in order to discover if they can be used and leveraged or whether an alliance can be created to fulfill the needs together.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Key outcomes of the step include:</p><ul style="margin:0px 0px 15px;padding:0px 0px 0px 30px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;list-style:none;font-family:Georgia, serif;"><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Clear grasp on the experiences and results of other organizations.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Determination by sponsors regarding applicability, usage of experiences of other organizations or formation of partnerships if the other organization is also planning to fulfill similar needs.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Detailed analysis of alternatives.</li></ul><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;">3. Define and Plan</span></strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">The purpose here is to form the integrated plan for the alterations essential to fulfill the requirements determined in Step 1.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Key outcomes of the step include:</p><ul style="margin:0px 0px 15px;padding:0px 0px 0px 30px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;list-style:none;font-family:Georgia, serif;"><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Sponsor and stakeholders hold an integrated set of plans and articles outlining what is to be done, when is it to be done, what benefits will be achieved and when, and a projected cost.</li></ul><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;">4. Invest and Execute</span></strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Point of this step is to carry out investment decision and effect the changes as delineated in the Integrated Plan produced in Step 3.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Key outcomes of this step include:</p><ul style="margin:0px 0px 15px;padding:0px 0px 0px 30px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;list-style:none;font-family:Georgia, serif;"><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Clear funding strategy and a decision to approve the investment of required funds.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Implementation of recommendations for tackling the identified needs.</li></ul><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong><span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;">5. Perform and Measure</span></strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Objective of this step is to execute operations and measure performance outcomes against established metrics. The recently applied changes are leveraged by the organization in Performance Management.<span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;"> </span></p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Key outcomes of this step include:</p><ul style="margin:0px 0px 15px;padding:0px 0px 0px 30px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;list-style:none;font-family:Georgia, serif;"><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Performance outcomes gauged against pre-determined metrics.</li><li style="margin:0px;padding:0px;border:0px;font-size:15px;vertical-align:baseline;background:0px 0px;line-height:21px;color:#333333;list-style-type:disc;">Production of significant outcomes e.g., feedback into planning with the view to making more adjustments in addition to what was implemented in Step 4.</li></ul><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">Interested in learning more Collaborative Planning Methodology, its salient features, and the key activities in each step? You can download <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/browse/flevypro/feaf-collaborative-planning-methodology-5858">an editable PowerPoint on <span style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;font-weight:bold;">Collaborative Planning Methodology </span>here</a><u style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;"> </u>on the <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/browse">Flevy documents marketplace</a>.</p><h3 style="margin:0px 0px 0.5em;padding:0px;border:0px;font-size:20px;line-height:1.5em;font-family:Arial, sans-serif;vertical-align:baseline;background-position:0px 0px;color:#222222;"><strong>Do You Find Value in This Framework?</strong></h3><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-size:15px;line-height:21px;font-family:Georgia, serif;vertical-align:baseline;background-position:0px 0px;color:#333333;">You can download in-depth presentations on this and hundreds of similar business frameworks from the <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/pro/library">FlevyPro Library</a>. <a style="margin:0px;padding:0px;border:0px;vertical-align:baseline;background:0px 0px;color:#001a66;" href="https://flevy.com/pro">FlevyPro</a> is trusted and utilized by 1000s of management consultants and corporate executives. Here’s what some have to say:</p><blockquote style="margin:0px;padding:10px 20px 10px 50px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;position:relative;color:#444444;font-family:Georgia, serif;"><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">“My FlevyPro subscription provides me with the most popular frameworks and decks in demand in today’s market. They not only augment my existing consulting and coaching offerings and delivery, but also keep me abreast of the latest trends, inspire new products and service offerings for my practice, and educate me in a fraction of the time and money of other solutions. I strongly recommend FlevyPro to any consultant serious about success.”</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">– Bill Branson, Founder at Strategic Business Architects</p></blockquote><blockquote style="margin:0px;padding:10px 20px 10px 50px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;position:relative;color:#444444;font-family:Georgia, serif;"><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">“As a niche strategic consulting firm, Flevy and FlevyPro frameworks and documents are an on-going reference to help us structure our findings and recommendations to our clients as well as improve their clarity, strength, and visual power. For us, it is an invaluable resource to increase our impact and value.”</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">– David Coloma, Consulting Area Manager at Cynertia Consulting</p></blockquote><blockquote style="margin:0px;padding:10px 20px 10px 50px;border:0px;font-size:13px;vertical-align:baseline;background-position:0px 0px;position:relative;color:#444444;font-family:Georgia, serif;"><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">“FlevyPro has been a brilliant resource for me, as an independent growth consultant, to access a vast knowledge bank of presentations to support my work with clients. In terms of RoI, the value I received from the very first presentation I downloaded paid for my subscription many times over! The quality of the decks available allows me to punch way above my weight – it’s like having the resources of a Big 4 consultancy at your fingertips at a microscopic fraction of the overhead.”</p><p style="margin:0px 0px 1.2em;padding:0px;border:0px;font-style:italic;font-size:15px;line-height:21px;vertical-align:baseline;background:0px 0px;color:#333333;">– Roderick Cameron, Founding Partner at SGFE Ltd</p></blockquote></div>Infrastructure Reference Model (IRM) of the Federal Enterprise Architecture Framework (FEAF)https://globalriskcommunity.com/profiles/blogs/infrastructure-reference-model-irm-of-the-federal-enterprise-arch2021-09-15T16:40:49.000Z2021-09-15T16:40:49.000ZMark Bridgeshttps://globalriskcommunity.com/members/MarkBridges<div><p><span style="font-size:12pt;"><a href="{{#staticFileLink}}9570440077,original{{/staticFileLink}}"><img class="align-right" src="{{#staticFileLink}}9570440077,RESIZE_400x{{/staticFileLink}}" alt="9570440077?profile=RESIZE_400x" width="334" height="223" /></a>Business and technology elements are aligned by means of <a href="https://flevy.com/business-toolkit/enterprise-architecture">Enterprise Architecture (EA)</a> so as to attain strategic results, augment organizational performance, and drive departments to deliver their central missions more efficaciously.</span></p><p><span style="font-size:12pt;">Federal Enterprise Architecture Framework (FEAF) achieves this for any U.S. federal agency and assists systems go beyond interagency boundaries.</span></p><p><span style="font-size:12pt;">We discuss here 1 of the 6 interconnected reference models of the Federal Enterprise Architecture Framework—the Infrastructure Reference Model (IRM).</span></p><p><span style="font-size:12pt;">IRM takes care of definition of infrastructure technology elements, as well as provides direction for promoting favorable results across technology implementations.</span></p><p><span style="font-size:12pt;">IRM implementation aids in:</span></p><ul><li><span style="font-size:10pt;">Reduction of lifecycle costs through sharing and reuse, also helps in exploiting economies of scale.</span></li><li><span style="font-size:10pt;">Increased interoperability throughout the government including its partners by identification and endorsement of demonstrated industry standards and associated platforms and products.</span></li><li><span style="font-size:10pt;">Detection of pragmatic design-patterns as clusters of technology packets or blends of technologies that work well collectively to sustain efficient acquisition and deployment.</span></li><li><span style="font-size:10pt;">Efficient control and sustainment of IT assets/resources through contribution to the delivery of consolidated and measurable infrastructure services and service levels as envisaged in Enterprise Architecture Management Maturity Framework (EAMMF).</span></li><li><span style="font-size:10pt;">Supplying of realistic use cases and methods corresponding to IT capabilities to facilitate business initiatives and better access to information across enterprises.</span></li></ul><p><span style="font-size:12pt;">Common Approach to Federal EA as well as Purpose and Outcome of IRM are, respectively, the root of IRM Guiding Principles. IRM guiding principles are:</span></p><ul><li><span style="font-size:10pt;">IRM ought to be a robust-enough taxonomy and approach to fulfill future requirements and adjust new technologies.</span></li><li><span style="font-size:10pt;">IRM must be defined with regard to technology infrastructure services put forward.</span></li><li><span style="font-size:10pt;">IRM has to be expounded as a hierarchy of IT infrastructure components.</span></li><li><span style="font-size:10pt;">IRM should be developed in such a way to promote usability, convenience, and reporting.</span></li><li><span style="font-size:10pt;">IRM should simplify interoperability and shared services.</span></li><li><span style="font-size:10pt;">IRM ought to be criteria-based, both international and national, concurrence-driven standards organizations, with numerous levels of abstraction.</span></li><li><span style="font-size:10pt;">IRM has to be accommodating of the Application Reference Model (ARM) and Data Reference Model (DRM) by touch points.</span></li></ul><p><span style="font-size:12pt;">Enabled by the Common Approach to Federal Enterprise Architecture and supported by the IRM, 4 primary outcomes of IRM include the following:</span></p><ol><li><span style="font-size:10pt;">Service Delivery</span></li><li><span style="font-size:10pt;">Functional Integration</span></li><li><span style="font-size:10pt;">Authoritative Reference</span></li><li><span style="font-size:10pt;">Resource Optimization</span></li></ol><p><span style="font-size:12pt;">IRM scope encompasses hardware, platforms, networks, and the facilities that house the infrastructure. The 3 levels of the model include:</span></p><p><span style="font-size:12pt;"><strong>Level 1</strong>—<strong>Domain</strong> comprises of Platform, Network, and Facility.</span></p><p><span style="font-size:12pt;"><strong>Level 2—Area</strong> covers 13 areas, each belonging to 1 of 3 domain elements.</span></p><p><span style="font-size:12pt;"><strong>Level 3—Category</strong> consists of 90 total categories and each linked to 1 of 13 areas.</span></p><p><span style="font-size:12pt;"><a href="https://flevy.com/browse/flevypro/feaf-infrastructure-reference-model-irm-5850"><img class="aligncenter size-full wp-image-9655" src="https://flevy.com/blog/wp-content/uploads/2021/09/Slide-Deck-image-FEAF-IRM.png" alt="" width="727" height="546" /></a></span></p><p><span style="font-size:12pt;">The interconnectedness of the IRM domains allows analysis of IT assets throughout the 3 dimensions.</span></p><p><span style="font-size:12pt;">For an implementation of an IRM-based categorization of assets to be useful, additional data points should be captured. These data points include:</span></p><ul><li><span style="font-size:10pt;">Manufacturer of the asset.</span></li><li><span style="font-size:10pt;">Cost</span></li><li><span style="font-size:10pt;">End-of-life/end-of-support date</span></li><li><span style="font-size:10pt;">Mapping to the Security Reference Model (SRM)<strong> </strong></span></li></ul><p><span style="font-size:12pt;">Data points classified by IRM are relevant to detecting prospects of sharing services, decreasing redundancy, and stimulating consolidation.</span></p><p><span style="font-size:12pt;">IRM classification can be embraced, as part of implementation, by the ensuing extensively recognized best practices, guidance, and standards, both in the public and private sectors.</span></p><p><span style="font-size:12pt;">Interested in learning more about the FEAF: Infrastructure Reference Model (IRM)? You can download <a href="https://flevy.com/browse/flevypro/feaf-infrastructure-reference-model-irm-5850">an editable PowerPoint on the<strong> Infrastructure Reference Model (IRM)</strong> here</a> on the <a href="https://flevy.com/browse">Flevy documents marketplace</a>.</span></p><h3><span style="font-size:12pt;"><strong>Do You Find Value in This Framework?</strong></span></h3><p><span style="font-size:12pt;">You can download in-depth presentations on this and hundreds of similar business frameworks from the <a href="https://flevy.com/pro/library">FlevyPro Library</a>. <a href="https://flevy.com/pro">FlevyPro</a> is trusted and utilized by 1000s of management consultants and corporate executives. Here’s what some have to say:</span></p><blockquote><p><span style="font-size:12pt;">“My FlevyPro subscription provides me with the most popular frameworks and decks in demand in today’s market. They not only augment my existing consulting and coaching offerings and delivery, but also keep me abreast of the latest trends, inspire new products and service offerings for my practice, and educate me in a fraction of the time and money of other solutions. I strongly recommend FlevyPro to any consultant serious about success.”</span></p><p><span style="font-size:12pt;">– Bill Branson, Founder at Strategic Business Architects</span></p></blockquote><blockquote><p><span style="font-size:12pt;">“As a niche strategic consulting firm, Flevy and FlevyPro frameworks and documents are an on-going reference to help us structure our findings and recommendations to our clients as well as improve their clarity, strength, and visual power. For us, it is an invaluable resource to increase our impact and value.”</span></p><p><span style="font-size:12pt;">– David Coloma, Consulting Area Manager at Cynertia Consulting</span></p></blockquote><blockquote><p><span style="font-size:12pt;">“FlevyPro has been a brilliant resource for me, as an independent growth consultant, to access a vast knowledge bank of presentations to support my work with clients. In terms of RoI, the value I received from the very first presentation I downloaded paid for my subscription many times over! The quality of the decks available allows me to punch way above my weight – it’s like having the resources of a Big 4 consultancy at your fingertips at a microscopic fraction of the overhead.”</span></p><p><span style="font-size:12pt;">– Roderick Cameron, Founding Partner at SGFE Ltd</span></p></blockquote></div>Security Reference Model (SRM) of the Federal Enterprise Architecture Framework (FEAF)https://globalriskcommunity.com/profiles/blogs/security-reference-model-srm-of-the-federal-enterprise-architectu2021-09-07T11:39:11.000Z2021-09-07T11:39:11.000ZMark Bridgeshttps://globalriskcommunity.com/members/MarkBridges<div><p><span style="font-size:12pt;"><a href="{{#staticFileLink}}9542439669,original{{/staticFileLink}}"><img class="align-right" src="{{#staticFileLink}}9542439669,RESIZE_400x{{/staticFileLink}}" alt="9542439669?profile=RESIZE_400x" width="250" /></a><a href="https://flevy.com/business-toolkit/enterprise-architecture">Enterprise Architecture (EA)</a> denotes management best practice for lining up business and technology resources to realize strategic results, expand upon Organizational Performance and steer departments to achieve their core missions more successfully and achieve Operational Excellence.</span></p><p><span style="font-size:12pt;">Federal Enterprise Architecture Framework (FEAF) assists any agency of the Federal government achieve this through documentation and information that conveys a summarized outlook of an enterprise at various tiers of scope and detail.</span></p><p><span style="font-size:12pt;">The FEAF comprises of 6 interconnected Reference Models including Security Reference Model (SRM), linked through Consolidated Reference Model (CRM), each relating to a sub-architectural domain of the FEA framework.</span></p><p><span style="font-size:12pt;">Security is a worldwide concern pervading through all layers of the organization. Effect on security at any level has an impact on each successive level, both ascending and descending. Appropriate place for developing and charting Security standards, policies, and norms is the Enterprise Architecture Governance since it is the enforcement point for IT investments.</span></p><p><span style="font-size:12pt;">Security Reference Model (SRM) is a framework for maturing a security architecture created on Information Security and privacy standards. SRM is omnipresent, entwining itself through all of the sub-architectures of the all-encompassing EA across all the other reference models.</span></p><p><span style="font-size:12pt;">Enterprise and solution architects have to remain aware of entire technology, business, performance, and security drivers so as to suitably steer IT Strategy and design Information Technology systems and choose apposite technology that fits their needs. SRM offers all levels of architects a direction to understanding when and where those needs can be consolidated.</span></p><p><span style="font-size:12pt;">SRM facilitates in forming an even security architecture in 3 key areas:</span></p><ol><li><span style="font-size:12pt;"><strong>Purpose</strong></span></li><li><span style="font-size:12pt;"><strong>Risk</strong></span></li><li><span style="font-size:12pt;"><strong>Controls</strong></span></li></ol><p><span style="font-size:12pt;"><a href="https://flevy.com/browse/flevypro/feaf-security-reference-model-srm-5837"><img class="aligncenter size-full wp-image-9613" src="https://flevy.com/blog/wp-content/uploads/2021/09/Slide-Deck-image-FEAF-SRM.png" alt="" width="693" height="520" /></a></span></p><p><span style="font-size:12pt;">All the layers of SRM are vital for the security posture and wellbeing of an entire agency and/or system. Highest levels of Federal architecture transform federal laws, regulations, and publications into specific policies.</span></p><p><span style="font-size:12pt;">Main principle of the SRM, at the enterprise layer, is to utilize the standards in place throughout the Federal or national IT security expanse to classify policy for a particular enterprise or agency.<strong> </strong></span></p><p><span style="font-size:12pt;">Segment level transforms department specific policies into security controls and measurements. Policies set in place from the enterprise layer are utilized by SRM to categorize controls for a certain agency or segment.<strong> </strong></span></p><p><span style="font-size:12pt;">SRM utilizes controls set at the segment layer to enable system-specific designs and/or requirements of the individual system. SRM employs controls chosen by the agency or segment to truly embed security into a system or application.</span></p><p><span style="font-size:12pt;">Proper security procedures ensure both risk reduction and regulatory compliance. Regulatory compliance is not an aim in itself, but a constituent of the course by which risks and controls, applicable to the circumstance at hand, are chosen. Risk mitigation is the eventual motive for the application of security controls.</span></p><p><span style="font-size:12pt;">In the same vein, chief goal of security is not to apply controls rather it is to diminish risks by means of layered security measures of which implementation of controls is a part. Attaining decreased risk profile means that controls ought to be integrated throughout the organization, vertically and horizontally, across system and solution deployments, layered progressively.</span></p><p><span style="font-size:12pt;">Consequences of security are far more challenging to measure, and differ based on the organization’s business. Metrics are signs of an organization’s advancement in security maturity and part of the overall IT Capability Maturity. Undeveloped organizations have diminished capability of defining or collecting metrics.</span></p><p><span style="font-size:12pt;">Interested in learning more about FEAF: Security Reference Model? You can download <a href="https://flevy.com/browse/flevypro/feaf-security-reference-model-srm-5837">an editable PowerPoint on <strong>FEAF: Security Reference Model (SRM)</strong> here </a>on the <a href="https://flevy.com/browse">Flevy documents marketplace</a>.</span></p><h3><span style="font-size:12pt;"><strong>Do You Find Value in This Framework?</strong></span></h3><p><span style="font-size:12pt;">You can download in-depth presentations on this and hundreds of similar business frameworks from the <a href="https://flevy.com/pro/library">FlevyPro Library</a>. <a href="https://flevy.com/pro">FlevyPro</a> is trusted and utilized by 1000s of management consultants and corporate executives. Here’s what some have to say:</span></p><blockquote><p><span style="font-size:12pt;">“My FlevyPro subscription provides me with the most popular frameworks and decks in demand in today’s market. They not only augment my existing consulting and coaching offerings and delivery, but also keep me abreast of the latest trends, inspire new products and service offerings for my practice, and educate me in a fraction of the time and money of other solutions. I strongly recommend FlevyPro to any consultant serious about success.”</span></p><p><span style="font-size:12pt;">– Bill Branson, Founder at Strategic Business Architects</span></p></blockquote><blockquote><p><span style="font-size:12pt;">“As a niche strategic consulting firm, Flevy and FlevyPro frameworks and documents are an on-going reference to help us structure our findings and recommendations to our clients as well as improve their clarity, strength, and visual power. For us, it is an invaluable resource to increase our impact and value.”</span></p><p><span style="font-size:12pt;">– David Coloma, Consulting Area Manager at Cynertia Consulting</span></p></blockquote><blockquote><p><span style="font-size:12pt;">“FlevyPro has been a brilliant resource for me, as an independent growth consultant, to access a vast knowledge bank of presentations to support my work with clients. In terms of RoI, the value I received from the very first presentation I downloaded paid for my subscription many times over! The quality of the decks available allows me to punch way above my weight – it’s like having the resources of a Big 4 consultancy at your fingertips at a microscopic fraction of the overhead.”</span></p><p><span style="font-size:12pt;">– Roderick Cameron, Founding Partner at SGFE Ltd</span></p></blockquote></div>