TOGAF ADM Techniques Flashcards
What is TOGAF ADM?
TOGAF Architecture Development Method (ADM) provides a structured approach for enterprise architecture development.
What are the key focuses of ADM Techniques?
ADM Techniques focus on architecture principles, stakeholder management, gap analysis, migration planning, risk management, and interoperability.
What are architecture principles?
General rules and guidelines that guide enterprise architecture decision-making.
What are the characteristics of good architecture principles?
Understandable, robust, complete, consistent, and stable.
What are the components of an architecture principle?
Name – Clear and memorable statement.
Statement – Concise, unambiguous rule.
Rationale – Business benefits of the principle.
Implications – Impact on business and IT.
Give examples of architecture principles.
Business Principles – Primacy of Principles, Maximize Benefit to the Enterprise, Business Continuity, Compliance.
Data Principles – Data is an Asset, Data is Shared, Data Security.
Application Principles – Technology Independence, Ease of Use.
Technology Principles – Control Technical Diversity, Interoperability.
Why is stakeholder management important?
Helps identify key influencers, gain support, and align enterprise architecture initiatives with business objectives.
What are the key steps in stakeholder management?
Identify stakeholders – Who is affected, who has influence, who has a vested interest?
Classify stakeholder positions – Categorize based on interest and power.
Determine stakeholder management approach – Strategies to engage key stakeholders.
Tailor engagement deliverables – Customize reports and presentations for stakeholders.
What are the different stakeholder categories?
Keep Satisfied – High power, low interest.
Key Players – High power, high interest (most critical).
Keep Informed – Low power, high interest.
Minimal Effort – Low power, low interest.
What are architecture patterns?
Reusable solutions to common architecture challenges.
What are the key components of an architecture pattern?
Context, Problem Statement, Solution, and Consequences.
Give examples of architecture patterns.
Layered Architecture Pattern, Microservices Architecture Pattern.
What is gap analysis?
Identifies differences between current and target architectures.
What are the key steps in gap analysis?
Define baseline and target architectures.
Identify gaps (functionality, performance, security, etc.).
Develop a strategy to bridge the gaps.
What techniques support migration planning?
Implementation Factor Catalog – Lists key factors affecting implementation.
Gaps, Solutions, & Dependencies Matrix – Identifies dependencies between components.
Transition Architecture State Evolution Table – Maps out phased transitions.
Business Value Assessment – Evaluates project benefits vs. risks.
What is interoperability?
The ability of different systems to work together efficiently.
What are the key types of interoperability?
Data Interoperability – Ensuring data consistency across systems.
Business Process Interoperability – Ensuring seamless workflow integration.
Technical Interoperability – Standardizing APIs and communication protocols.
What is business transformation readiness assessment?
Evaluates an organization’s preparedness for transformation initiatives.
What are key readiness factors?
Business vision alignment, executive sponsorship, organizational culture, and risk assessment.
What are the main steps in risk management?
Risk classification: Identifies types of risks (strategic, operational, technical).
Risk identification: Documents potential threats to architecture success.
Risk mitigation strategies: Implements controls to reduce impact.
What is residual risk?
The risk that remains after mitigation strategies are applied.
Why is evaluating architecture alternatives important?
Helps select the best approach by balancing cost, scalability, security, and performance.
What are the key steps in evaluating architecture alternatives?
Define evaluation criteria.
Identify alternative architectures.
Compare trade-offs (cost, scalability, security, etc.).
Select the optimal approach.