FAQs

How do I make an integrated set of security and privacy functions?s

An integrated set of security and privacy controls for the enterprise is created by including these considerations security in the planning, design, implementation, and operation of all EA components and artifacts. For information-centric enterprises, including IT security and data privacy as required design elements of EA components, and having leadership support at the strategic and…
Read more

What is the EA3 Cube?

The EA³ Cube is a comprehensive enterprise architecture framework. The framework is compliant with ISO 42010. The EA³ Cube is created and maintained by Scott Bernard and John Gøtze. 

What is EA3?

EA³ is a comprehensive and open approach to enterprise architecture. The EA3 Cube framework is an architecture framework and is compliant with ISO 42010. EA3 is created by Scott Bernard and John Gøtze. [The EA³ Cube Approach](https://coe.qualiware.com/resources/ea3/) is a management and technology practice that is devoted to improving the performance of enterprises by enabling them to see…
Read more

Who is Scott Bernard?

Dr. Scott Bernard is the Federal Chief Enterprise Architect in the US. He works in the Office of Management and Budget within the Executive Office of the President of the United States. Dr. Bernard created the EA3 Cube framework and the EA3 approach.

Why are management views of EA artifacts important?

EA management views can help various types of users to both understand and share EA artifacts. For example, members of the EA team who are modeling data in several information systems can develop a management view to show how information from those systems is used between various LOBs, and in so doing gain the support…
Read more

What considerations should be made in developing an EA Tool Evaluation Matrix?

The criteria for selecting an EA tool depends on the role it will play in the EA tool set. If it is an overall EA framework modeling tool, then a wide variety of capabilities are needed including the built-in support of various frameworks and modeling techniques, usability, scalability, development of management views, report generation, web…
Read more

What is an EA repository and how does it support the EA implementation methodology?

The EA repository is intended to provide a single place for the storage and retrieval of EA artifacts that are created using EA software applications (tools). A repository works best if it is easy to access and use. \nFor this reason, an on-line, web-based EA repository is recommended. This type of web portal for EA…
Read more

How does IT security functions at each level of the EA3 framework?

An integrated set security and privacy controls for the enterprise is created by including these considerations security in the planning, design, implementation, and operation of all EA components and artifacts. For information-centric enterprises, including IT security and data privacy as required design elements of EA components, and having leadership support at the strategic and line…
Read more

What are the differences between perimeter defense and core configuration controls?

Security and privacy controls should function to reduce or eliminate external and internal threats – doing so through a combination of perimeter defense and internal configuration control. Controls should also support rapid bounce-back capabilities (called resilience) when incidents occur – from minor to major in scope. When done correctly, controls can serve to detect and…
Read more

What is the difference between a Disaster Recovery Plan and a Continuity of Operations Plan?

**Disaster Recovery**: The assessment and recovery procedures for responding to a man-made or natural event that significantly disrupts or eliminates business and technology operations, yet does not threaten the existence of the enterprise. This includes sabotage, theft or corruption of resources, successful large scale hacker/virus attacks, building damage, fire, flood, and electrical outages. Two time-related…
Read more