III.B.1.a: Consistency
Question and closely examine justifications for deviations from the agency’s inventory of approved security and privacy-related
technologies and services as described in the to-be architecture.
Other Information:
Security and privacy controls that lay outside the current enterprise architecture are likely to be less effective, more expensive,
and less interoperable. Consider whether the goals of such investments may be accomplished differently, within the context
of the current enterprise architecture. Carefully weigh the implications of approving any deviation.
Indicator(s):
|