For Master of Science Information Technology and Communication
For Master of Science Information Technology and Communication
Master of Science
Abhijeet Babar
Table of Contents
Introduction...................................................................................................................................1
Summary........................................................................................................................................19
References……………………………………………………………………………………………………………………………....21
Introduction
The TOGAF standard is an architecture framework for enterprise architecture. Architecture
framework is a set of methods, tools and a common language for assisting the creation, adoption
and maintenance of an enterprise architecture. An architecture framework often contains an
iterative process for creating architecture and with the TOGAF standard that is embodied in the
architecture development method or ADM. There are a couple of definitions for enterprise
architecture or for architecture. There is an international standards organization called
ISO/ICE/IEEE and they put together a joint standard called 42010:2011 version, they update this
standard from time to time. That standard says, ‘The fundamental concepts or properties of a
system in its environment embodied in its elements, relationships and in the principles of its
design and evolution’. This is a very generic definition of architecture having to do with properties
and elements and relationships etc. TOGAF 9.2 does contain that standard for architecture but it
also adds a sentence to it as well, the TOGAF 9.2 definition of architecture is the ISO definition
plus the structure of its components, their interrelationships and the principles and guidelines
governing their design and evolution over time. Now if you put those two statements together
side by side, you'll see that they're essentially saying around the same thing. So, an architecture is
both the components of a system and the relationship to each other so, the boxes and lines of a
system, plus the principles rules and guidelines governing their design and evolution over time.
TOGAF is helps in developing a proper architecture capability in the organization. TOGAF
has architecture governance, a standard meta model for storing, organizing your information
principles for the design of those documents and a standard process for evolving that architecture
in the months and years ahead. Architecture is not a static thing. It's actually how we do things.
this demonstrate the process with the example of Archi-insurance case study in this document.
TOGAF & ArchiMate
ArchiMate: the ArchiMate is a language used for modeling and it used in TOGAF
framework to design enterprise architecture by the Architects. TOGAF: The TOGAF is a modeling
framework which used by many organizations for the development of enterprise architecture.
TOGAF and ArchiMate: By using ArchiMate modeling language with TOGAF architects can create
different views of different architecture viewpoints provided in TOGAF framework. ArchiMate
language was created and developed for providing compatibility with TOGAF framework so that
following TOGAF standard and guidelines would be easy for an architect while designing modeling
tasks.
The ArchiMate language and the TOGAF framework share many features and even
overlaps while using their concepts and viewpoints as they have very firm and common
foundation. These two complementing each other with development process of an enterprise
architecture definition and defining the modeling language for EA modeling. The Modeling of the
EA is supported by ArchiMate 3.0 standard in all phases of TOGAF development (ADM method).
Following diagram illustrate the mapping of ArchiMate and TOGAF ADM:
Figure 1.
As shown in diagram there are Five layers to the mapping Strategy and Motivation,
Business layer, Application layer, Technology layer and Implementation and migration layer. Out
of which Business layer Application layer and Technology layer are the core layers of the TOGAF
framework. We will learn about every layer by studying merger of three independent companies
who formed the ArchiSurance insurance. The ArchiSurance Case Study talks about the Baseline
Architecture of the ArchiSurance company and the change scenarios occur during merger. We
could apply this case study to different scenarios in our career in future.
ArchiSurance Case Study using ArchiMate and TOGAF ADM
Each phase of the ADM after the preliminary phase takes inputs from the previous phase
and produces outputs to be used in the subsequent phase. Artifacts and documentation
accumulate in the center in requirements management. The preliminary phase identifies who will
do the work? It also defines essential architectural principals and scope, TOGAF is designed to be
adapted so the first step is to adapt it. Architects will decide exactly how to apply TOGAF in this
phase, tweaking it for best fit. The artifacts represent a piece of data that is used/produced in a
software development process and operation of an IT system. In ArchiSurance there are many
artifacts like user data, information technology capabilities, CEO-CTO level considerations,
business activities, software and hardware systems, databases environments, etc.
Phase A, architecture vision starts when the business formally requests architecture work,
in this case the point-of-sale system. The business expresses the request in terms of business
goals, in our example the new point-of-sale system should save the company money over time,
and perhaps be more accurate and efficient than the previous one. EA formally documents the
architectural principals and scope of the architectural effort, explicitly both what is and what is
out of scope. For example, our point-of-sale system is going to connect to a lot of other systems
so it would be easy to get pulled into discussions about upgrades and changes to those integrated
systems. To keep the focus on the point-of-sale system, the statement of work could state
explicitly that all changes to any other integrated system is out of scope, the output of phase A is
an architectural statement of work and final approval from executive management.
The ArchiSurance Case Study talks about merging of three companies into one greater
organization. The company now consists of three divisions with the same names and
headquarters as their independent predecessors.
Home & Away, specializing in homeowners’ insurance and travel insurance
PRO-FIT, specializing in auto insurance
Legally Yours, specializing in legal expense insurance
Figure 1. Merging Diagram
The Open Group (2018) state that “security concerns are pervasive throughout the
architecture domains and in all phases of the architecture development. Security is called out
separately because it is infrastructure that is rarely visible to the business function”. The
enterprise security architecture is an enterprise architecture applied to security domain which
mainly deals with information technology security, encryptions of sensitive data, security of
physical access, etc. Security architecture provides similar architecture views to stakeholders in
order to understand gaps and risks in every level.
Figure 11. Essential Security and Risk Concepts and their Position in the TOGAF ADM
The Phase B: The Security elements of Business layer include Security Policy Architecture,
Security Domain Model, Trust Framework, Risk Assessment, Risk Model Applicable Law and
Regulation. The Security Policy Architecture deals with security strategy policies which assigns
sense of accountability and ownership for risk management. A security domain model provides
assets to business attributes meaning, it combines the assets with similar security level which fall
under the jurisdiction of that security policy. Trust framework is nothing but the trust bonds
between many entities in the architecture domain, it also describes on what grounds that trust is
based. A risk assessment is the process of identifying the risks that are related to assets and or
processes.
The Phase C: The security element in Information Systems Architectures consists of
classification of functional security services and functional security services itself. The artifacts are
as follows:
o The Security Services Catalog is a list of services that provide security-specific functionality
as part of the overall architecture. Example of these services are training & awareness
programs, continuity, security analytics, audit, security intelligence, identity & access
management, digital forensics, network monitoring, etc.
o Security classification is a label attached to an asset, according to a classification scheme.
In most cases, this scheme is defined and described in the corporate information security
policy and the classification is based on one or more characteristics of the asset.
o Data quality is a key factor in operational risk management. Some of the key attributes
that contribute to data quality are accuracy, relevance, timeliness, currency,
completeness, consistency, availability, and accessibility.
Phase D: Technology Architecture artifacts, in most of the scenarios these artifacts are not
that important if in the development stage all relevant security concerns and functionalities are
defined. Security manager may add specific Architecture security view for particular technology
and how they affect each other in a bigger picture. This view provides how that technology
mitigate the business risk with justification.
Following are the recommendations to address issues or risks that the current plans
present.
o Contracts with Archisurance’s data processing providers i.e. outsourcing company based in
Australia and cloud service provider company should reflect respective CCPA and GDPR
responsibilities.
o The GDPR Article 30 compliance: Every data related to customer which company uses for
processing should be accurate and up to date, and we should have a legal right to retain it.
There should be a process in place which would make sure that data that Archisurance
using is compliant with GDPR article 30.
o We should ensure the Archisurance has a legal purpose for retention policy also ensure
that organization and the outsourcing partners are respecting these laws on data retention
in all measures.
o The Privacy regulations introduces new rights around data portability and data erasure.
Personal data erasure is not an absolute right should the insurance company have a legal
requirement to retain the data it would be retained. This means merging all three
companies will share a machine-readable data between themselves which is beneficial as
Archisurance will handle all data processing centrally.
o Organization level training require in area of data security and data breaches, also
employees should be trained in reporting such crimes to authorities.
o Data minimization and privacy by default and design must be a core principle of any data
processing.
o General training and awareness around data protection is critical for organizations as
incorrect data disclosure is the greatest reason for data protection breaches.
o Leadership should ensure that the company’s privacy policy is updated and communicated
to data subjects.
o Stakeholders of the organization are legally entitled to process personal data, that it has an
applicable legal basis be that contract, legal obligation or where consent based that any
required consent is in place. Where processing is based on consent ensure that there are
proper records of that consent. Consent is not likely to be the core legal basis in the
insurance industry.
o Demonstrating compliance is a key area under the accountability requirement of these
regulation, organizations must be able to demonstrate compliance with the regulation by
means of a paper trail.
o Appoint a DPO (Data Protection officer), The European Data protection working group
WP29 has identified the Insurance industry as an industry which should consider
appointing a DPO.
Archisurance should conduct a risk assessment and based on results it should create and
maintain a cybersecurity program which will deal with the risks identified in assessment. The
Archisurance should also create and maintain disaster recovery and response plan, organization
should provide these guidelines to cloud service providers and outsourcing company based in
Australia. Certify compliance with the respective law/model regulation. Archisurance need a strict
policy execution plan for staying on top of new regulations. These laws should be obeyed without
fail while operating in states like California, New York or other eight states and EU. I think having
cyber security and cyber law department dedicated to focused on these new regulations would be
the crucial during merging of three insurance companies.
Figure 14. Heat map of the maximum impact on revenue and cost for each technology
o Infrastructure and productivity: A modern IT architecture are critical for digital innovation.
Many insurers consider the cloud the best option for processing, computation and storage.
They can also use productivity tools such as coauthoring and video calling, and they can
connect with their customers through a seamless, omnichannel approach.
o Online sales technologies: Insurers can use cutting-edge techniques for targeting
customers, identifying user groups and analyzing consumption patterns.
o Advanced analytics (AA): With AA, insurers can gain extensive insights into customer needs
and preferences. Insurers can also draw on it to help fight fraud.
o Machine learning: With machine learning, insurers’ information systems can quickly adapt
to new data, without the need for reprogramming. Insurers can use machine learning to
shape underwriting, price products and manage claims.
o The Internet of Things: Networked devices in cars and buildings can protect people and
property and facilitate proactive, preventive maintenance, thus reducing accidents—and
claims. By analyzing data from sensors embedded in vehicles and other equipment,
insurers can gain insights into customer behavior.
o Distributed ledger technology: By arranging and documenting claims on distributed
ledgers, insurers can greatly reduce processing time. A whole new field is opening up for
smart contracts—that is, policies that are fully automated and updated based on a
blockchain’s entire database.
o Virtual reality (VR): The global fascination with the smartphone game Pokémon Go shows
VR’s popularity, but this technology also has the potential to transform the way
information for underwriting is gathered, as well as the way claims are settled. For
example, an insurer could use VR to create a three-dimensional image of a room or to
reconstruct an accident in minute detail.
Summary
Case Study:
Enterprise architecture is a practice and a collection of skills that is used to align
technology strategy with business strategy. Business leaders rely on enterprise architects as
trusted technology advisors. An entity comprised of people working collectively toward a goal is
an enterprise. The technical definition of the term architecture in this context, the manner in
which the components of a computer or computer system are organized and integrated. So, EA
deals with the complex relationships between an enterprise organization, its people, the business
processes they support, and systems that automate those process.
An enterprise architect is an individual that works with senior executives to move an
organization through change. Their job is to focus on ensuring business goals and objectives are
met. Risk and liability vulnerabilities are reduced. Projects are aligned and the organize it is the
organization's ability to respond to change is increased. The high level the goal is to identify
components that must be achieved in order to tie everything together and make sure that those
critical success factors are met.
The ArchiMate and the TOGAF ADM provide enterprise architectures the tools and
framework/guidelines for defining and designing the formation steps for enterprise in order to
increase profitability and streamlining all the business processes. After studying Archisurance we
can reliably say that TOGAF is a proven method for creating and developing enterprise
architecture as per the business requirements. It helps stakeholders to understand and visualize
organization change in order to achieve organization goals.
.
References
Henk Jonkers, Iver Band, Dick Quartel. 2012. “Case Study: Using ArchiMate with TOGAF", The Open Group,
https://www.ucipfg.com/Repositorio/MATI/MATI-04/BLOQUE-INICIAL/Caso_de_Estudio.pdf
Visual Paradigm. 2020. “Case Study: Using ArchiMate with TOGAF", Visual paradigm, Accessed October 20,
2020. https://www.visual-paradigm.com/guide/togaf/togaf-case-study-using-archimate-with-
togaf/
Visual Paradigm. 2020. “Chapter 31. TOGAF ADM Guide-Through", Visual Paradigm Community Circle, Last
paradigm.com/docs/togaf-adm-guide-through/
The Open Group. 2016. “Integrating Risk and Security within a TOGAF® Enterprise Architecture", The Open
Group, Published January 2016, Revised March 2019, Accessed October 30, 2020.
https://publications.opengroup.org/g152
The Open Group. 2018. "THE TOGAF® STANDARD, VERSION 9.2", The Open Group, Published April 2018,
www.iso.org/iso/home/standards/management-standards/iso27001.html
www.iso.org/iso/home/standards/iso31000.htm.
Laura Jehl, Jaime Petenko. 2020. “Privacy and Data Security: 2020 Considerations for The Insurance
Industry", McDermott Will & Emery, Published February 7, Accessed November 12, 2020.
https://www.ofdigitalinterest.com/2020/02/privacy-and-data-security-2020-considerations-for-
the-insurance-industry/?
utm_source=Mondaq&utm_medium=syndication&utm_campaign=LinkedIn-integration
Laura Jehl, Jaime Petenko. 2017. “GDPR and Cloud Computing – Challenges and Opportunities",
Henrik Naujoks, Florian Mueller and Nikos Kotalakidis, 2017. "Digitalization in Insurance: The Multibillion
Dollar Opportunity", Bain & Company, Inc., Published March 20, Accessed November 18, 2020.
https://www.bain.com/insights/digitalization-in-insurance
Lambert, Daniel. 2018. "Tackling artificial intelligence using architecture", IDG Media Private Ltd., Published
artificial-intelligence-using-architecture.html