What Every Architect Ought To Know About IT Governance
posted by Anna Mar, February 12, 2011Every Enterprise Architect ought to be able to clearly explain IT governance at 50000 feet. It is also helpful to be able to explain the role of Enterprise Architecture in IT governance and what frameworks might be helpful to a governance program.
Governance at 50000 Feet
IT governance ensures that IT resources and data support enterprise goals and strategies.Governance also helps instil best practices for IT planning, implementation and operations.
Importance of IT Governance
IT governance helps ensure that business is conducted properly. For the past thirty years, many companies have shifted investment towards informational and digital assets. In fact, most companies are now completely dependant on IT for their profitability, operations, reputation and brand.Audience
IT governance is seen as mandatory due diligence by most boards of directors. IT governance may also be required by legislation or demanded by customers and partners.Relationship of IT Governance and Enterprise Architecture
Enterprise Architecture takes corporate goals and strategies as inputs. It defines the context for IT governance including vision, best practices, strategy, frameworks, roles, processes, standards, critical success factors, blueprints and organizational behaviours.IT Governance Frameworks
Several frameworks can serve as useful guides to IT governance implementation:- ISO27001 - information security
- Capability Maturity Model (CMM) - software engineering
- The Balanced Scorecard (BSC) - organizational performance
- Six Sigma - quality assurance
- TOGAF - enterprise architecture
- ISO/IEC 38500 - corporate governance of IT
- IT Infrastructure Library (ITIL) - a high-level framework
for IT service management, development and operations.
Recently on Simplicable
Cloud Guideposted by John SpaceyA guide to cloud computing including cheat sheets, best practices and metrics. |
Web Security: Battleships and Locustsposted by Anna MarThere are two types of web security threats: battleships and locusts. |
Web Security Illustratedposted by John SpaceyHow would you explain web security to your grandmother? |