C141-Cloud Ecosystem Reference Model
C141-Cloud Ecosystem Reference Model
Technical Standard
The Open Group Cloud Ecosystem Reference Model
ISBN: 1-937218-46-1
Document Number: C141
2 Definitions................................................................................................................. 3
2.1 Cloud Ecosystem ............................................................................................ 3
2.2 Cloud Service Auditor .................................................................................... 3
2.3 Cloud Service Broker...................................................................................... 3
2.4 Cloud Service Consumer ................................................................................ 3
2.5 Cloud Service Developer ................................................................................ 4
2.6 Cloud Service Provider ................................................................................... 4
2.7 Enterprise ........................................................................................................ 4
2.8 Infrastructure as a Service (IaaS) .................................................................... 4
2.9 Platform as a Service (PaaS) ........................................................................... 4
2.10 Software as a Service (SaaS) .......................................................................... 4
5 Using the Cloud Ecosystem Reference Model with the TOGAF Standard
(Informative) ........................................................................................................... 30
5.1 Introduction................................................................................................... 30
5.1.1 CloudEcoSource Background ....................................................... 30
5.2 Preliminary Phase ......................................................................................... 31
5.2.1 Architecture Principles .................................................................. 32
5.2.2 Define Governance Approach ....................................................... 33
5.2.3 Organizational Implications .......................................................... 34
5.3 Phase A: Architecture Vision ....................................................................... 34
5.3.1 Establish the Architecture Project ................................................. 35
5.3.2 Identify Stakeholders, Concerns, and Business
Requirements ................................................................................. 35
5.3.3 Confirm and Elaborate Business Goals, Business
Drivers, and Constraints ................................................................ 37
5.3.4 Evaluate Business Capabilities ...................................................... 38
5.3.5 Assess Readiness for Business Transformation ............................ 39
5.3.6 Define Scope ................................................................................. 41
5.3.7 Confirm and Elaborate Architecture Principles,
including Business Principles ........................................................ 41
5.3.8 Develop Architecture Vision ......................................................... 41
5.3.9 Define the Target Architecture Value Propositions and
KPIs ............................................................................................... 42
5.3.10 Develop Statement of Architecture Work; Secure
Approval ........................................................................................ 42
5.4 Phase B: Business Architecture .................................................................... 42
5.4.1 Select Reference Models, Viewpoints, and Tools ......................... 44
5.4.2 Develop Baseline Business Architecture Description ................... 44
5.4.3 Develop Target Business Architecture Description ...................... 45
5.4.4 Perform Gap Analysis ................................................................... 50
5.4.5 Define Candidate Roadmap Components ..................................... 51
The Open Group is a global consortium that enables the achievement of business objectives
through IT standards. With more than 400 member organizations, The Open Group has a diverse
membership that spans all sectors of the IT community – customers, systems and solutions
suppliers, tool vendors, integrators, and consultants, as well as academics and researchers – to:
Capture, understand, and address current and emerging requirements, and establish
policies and share best practices
Facilitate interoperability, develop consensus, and evolve and integrate specifications and
open source technologies
Offer a comprehensive set of services to enhance the operational efficiency of consortia
Operate the industry’s premier certification service
The Open Group publishes a wide range of technical documentation, most of which is focused
on development of Open Group Standards and Guides, but which also includes white papers,
technical studies, certification and testing documentation, and business titles. Full details and a
catalog are available at www.opengroup.org/bookstore.
Readers should note that updates – in the form of Corrigenda – may apply to any publication.
This information is published at www.opengroup.org/corrigenda.
This Document
This document defines The Open Group Cloud Ecosystem Reference Model and provides
guidance on how to apply it with The Open Group TOGAF® and ArchiMate® standards to
develop an Enterprise Architecture. It has been developed and approved by The Open Group.
Enterprises are under increasing pressure to deliver greater business agility. Cloud solutions are
rapidly and efficiently evolving to reach this end and at reduced overall costs. In order to deliver
the agility and cost savings envisioned, an Enterprise Architecture of an enterprise’s Cloud
Ecosystem must be developed. This will allow rapid cloud solutions development and
enhancement opportunities.
The Cloud Ecosystem of an enterprise provides critical and essential enabling capabilities to
meet the demand for greater flexibility in delivering cloud business solutions. To address any
gap in the enterprise’s capabilities, an enterprise often collaborates with the participants of a
Cloud Ecosystem (e.g., Cloud Service Providers, strategic vendors) and leverages participants’
Cloud Services. However, the use of Cloud Services provided by participating external entities
Intended Audience
This standard should be read by an Architect wishing to develop, manage, and govern an
Enterprise Architecture for the Cloud Ecosystem. The intended audience of this standard
includes but is not limited to:
TOGAF practitioners
Cloud Service Consumers and Providers
Business and technical executives of an enterprise
Business and technical architects
Business and technical solution developers
Business and technical operational team(s)
Enterprise governance team(s)
Enterprise business and management team
The information in this standard can be used stand-alone or with an encompassing Architecture
Development Method (ADM), such as the TOGAF ADM. Integration with the TOGAF standard
and extension steps are described in Chapter 5 of this standard.
All other brands, company, and product names are used for identification purposes only and may
be trademarks that are the sole property of their respective owners.
Informative References
1.1 Objective
This standard defines The Open Group Cloud Ecosystem Reference Model and provides
guidance on how to apply it with the TOGAF® and ArchiMate® standards to develop an
Enterprise Architecture.
1.2 Overview
This standard defines the Cloud Ecosystem Reference Model. It also provides guidance on
applying the Cloud Ecosystem Reference Model with the TOGAF and ArchiMate standards to
develop, maintain, and govern an Enterprise Architecture for the Cloud Ecosystem.
The approach described in the standard enables practitioners to effectively align business and
technical capabilities in creating architectural components, their inter-relationships, and to
effectively manage interactions and relationships between the participants of the Cloud
Ecosystem in order to minimize the impact of changes in Cloud Services (either developed by
the enterprise itself or by participating entities of the Cloud Ecosystem).
1.3 Conformance
At the time of publication, there are no conformance requirements defined in this section for the
purposes of this standard. Readers are advised to check The Open Group website for any
conformance and certification requirements referencing this standard.
Legacy Describes a feature or behavior that is being retained for compatibility with older
applications, but which has limitations which make it inappropriate for developing
portable applications. New applications should use alternative means of obtaining
equivalent functionality.
May Describes a feature or behavior that is optional for an implementation that conforms
to this document. An application should not rely on the existence of the feature or
behavior. An application that relies on such a feature or behavior cannot be assured
to be portable across conforming implementations. To avoid ambiguity, the
opposite of “may” is expressed as “need not”, instead of “may not”.
For the purposes of this standard, the following terms and definitions apply. Merriam-Webster's
Collegiate Dictionary should be referenced for terms not defined in this section.
2.7 Enterprise
The highest level (typically) of description of an organization which typically covers all
missions and functions. An enterprise will often span multiple organizations. (Refer to the
TOGAF standard.)
The Cloud Ecosystem Reference Model serves as an abstract foundation for the instantiations of
architectures and business solutions of an enterprise. It defines a flexible and agile collaborative
enterprise Cloud Ecosystem. It also provides for an effective digital customer experience for
sharing business information securely regardless of its underlying data location.
The Cloud Ecosystem Reference Model ensures consistency and applicability of Cloud Services
within a wide variety of Enterprise Architecture management frameworks. Figure 1 describes the
relationships and dependencies between the various enterprise frameworks to manage the life
cycle of Cloud Services utilizing the Architecture Building Blocks (ABBs) identified in the
Cloud Ecosystem Reference Model to deliver enterprise business solutions. Please refer to the
TOGAF standard for further explanation of the concepts associated with Architecture
Development Methods (ADMs) and management of frameworks.
ABBs of the Reference Model are described in Chapter 2 and Section 3.1.
Architecture Building
Blocks (ABBs) Description
Accounting & Billing The Accounting & Billing Service generates and manages bills for the Cloud
Service Service usage data using a set of predefined billing policies. Cloud Service
Providers could allow production of one bill for multiple subscriptions of
Cloud Services for the consumer and combining usage from multiple
subscriptions to qualify for volume pricing discounts. It also manages other
accounting-related activities (process payments, track invoices, etc.).
Auditing & Reporting The Audit & Reporting Service provides a mechanism to record activities
Service (including exceptions and events) and keeps them for an agreed time period
to assist future investigations. Care must be taken to minimize the
performance degradation and the risk of disruption to business processes. It
generates reports to effectively perform client-facing business operations
activities.
Availability & Continuity The Availability & Continuity Service controls the redundancy, workload
Service mobility between different Cloud Service Providers, and ensures that Cloud
Services are built with high availability design practices and considerations.
Compliance & Policies The Compliance & Policies Service defines, integrates, and aligns activities
Service such as corporate governance and corporate compliance with applicable laws
and regulations. It maintains an organizational structure, process, tools, and
business policies to ensure adherence to applicable laws and regulations.
Contract & Agreement The Contract & Agreement Service handles contract life cycle (set-up,
Service negotiate, close, terminate, etc.) and the ways in which various aspects of
Cloud Services are offered and managed for Cloud Service Consumers. The
contract states the terms and conditions for service usage (constraints, costs,
and billing information) by the Cloud Service Consumer and includes
applicable Cloud Service policies, Service-Level Agreements (SLAs) –
availability, performance, etc. – to ensure that Cloud Service Providers
provision services that meet the defined agreement.
Metering Service The Metering Service is essential for billing/charging Cloud Services and
their underlying resource usages (i.e., Cloud Services and resources
allocation and consumption). It provides a metering capability with some
level of abstraction appropriate to the type of service (e.g., storage,
processing, bandwidth, and active user accounts).
Order Service The Order Service controls the life cycle of Cloud Service orders (from a
Cloud Service provisioning request capture to de-provisioning). It utilizes
Cloud Service configuration, service life cycle, service orchestration (if
required), and accounting and billing services.
Service Demand Service The Service Demand Service is to understand the business demand for Cloud
Services (e.g., in the case of IaaS, demand in the form of bandwidth,
memory, CPU capacity, support personnel, etc.) based on the past business
activity patterns combined with the future business growth estimate.
Subscription Service Cloud Service Providers could enable multiple subscription models for
charging Cloud Services’ usage by utilizing the Subscription Service. These
subscription models may include fixed, tier-based (e.g., Gold, Silver, and
Platinum), pay-as-you-go payment terms (monthly, quarterly, annually). The
Cloud Service Provider monitors allocation and consumption of Cloud
Services and chargeback to its subscribed consumers based on subscription
models.
Architecture Building
Blocks (ABBs) Description
Capacity & Performance The Capacity & Performance Service (aka Workload Management) allows
Service efficient allocation and optimal use of underlying Cloud Resources. It
analyzes performance of running Cloud Services in real-time and
automatically adjusts the workload. If applicable, it utilizes external Cloud
Service Providers’ computing services by using inter-cloud connection
services to meet the defined SLAs.
Incident & Problem The Incident & Problem Handler Service deals with any service-related
Handler Service incidents and associated problems and performs root cause analysis. It could
store information in a knowledge support repository for further analysis that
may include trend analysis to enable the evolution of the Cloud Services to
prevent future incidents.
Inter-Cloud Connection The Inter-Cloud Connection Service serves as a seamless connector from one
Service cloud environment to another cloud environment (e.g., private cloud
environment to external/public cloud environment) to enable Cloud Service
interoperability. A Cloud Service connection ensures secure connectivity,
traverses different network boundaries seamlessly, and enables performance
improvement capabilities (e.g., compression).
IT Asset & License The IT Asset & License Service controls licensing agreements of various
Service aspects of Cloud Services that can be purchased and sold. Some Cloud
Service Providers also allow Cloud Service Consumers to directly lease or
buy licenses from the software/solution vendors or provide licenses on-
demand.
Service Life Cycle Service Life Cycle (aka Service Delivery Management) controls the Cloud
Services (including underlying Cloud Resources) life cycle from
provisioning to de-provisioning dynamically (some Cloud Service Providers
utilize workflow to manage the process). It also provides the visibility,
control, and automation across cloud environments (e.g., private, public, and
hybrid environments) to address business-critical challenges.
Service Orchestration Service Orchestration serves as an efficient way to manage the Cloud
Services (including underlying Cloud Resources) capacity and performance
(it even instigates an external service gateway for workload management)
automatically. It seamlessly coordinates Cloud Services in multiple cloud
environments (e.g., internal/private and public cloud environments).
SLA Compliance Service In order to ensure a high-level of service standards on Cloud Services, Cloud
Service Consumers demand strict implementation of SLAs from Cloud
Service Providers. Any degradation of service performance could have
severe impact on revenue and end-user satisfaction. The SLA Compliance
Service helps define SLAs and ensure their compliance and improve
relationships with Cloud Service Providers. This service provides real-time
assessment and SLA compliance reporting on Cloud Services.
Template Service The Template Service provides re-creatable instances from service templates.
In case of IaaS, the Template Service describes how the instances are to be
configured (machine images, network connectivity, storage requirements,
etc.) and deployed on a dynamic infrastructure environment. The Template
Service also enables auto provisioning/re-deploying applications on a Cloud
Service platform.
Architecture Building
Blocks (ABBs) Description
Data Protection In the information age, data is an asset. However, most data remains valuable
only if it is protected. Data Protection needs to cover all data life cycle
stages, data types, and data states. Data stages include create, store, access,
roam, share, and retire. Data types include unstructured data, such as word
processing documents, structured data, such as data within databases, and
semi-structured data, such as emails. Data states include Data At Rest
(DAR), Data In Transit (DIT) (also known as “data in motion” or “data in
flight”), and Data In Use (DIU). The controls of Data Protection are data life
cycle management, data leakage prevention, intellectual property protection
with digital rights management, and cryptographic services, such as key
management and PKI/symmetric encryption. (See TCI – A Quick Guide to
the Reference Architecture.)
The Enterprise Data Management function described below consistently
applies security policies to all data types, data life cycle stages, and states.
Governance Risk & Governance Risk & Compliance encompasses, integrates, and aligns
Compliance activities such as corporate governance, enterprise risk management, and
corporate compliance with applicable laws and regulations. Components
include compliance management (which assures compliance with all internal
information security policies and standards), vendor management (to ensure
that service providers and outsourcers adhere to intended and contractual
information security policies applying concepts of ownership and custody),
audit management (to highlight areas for improvement), IT risk management
(to ensure that risks of all types are identified, understood, communicated,
and either accepted, remediated, transferred, or avoided), policy management
(to maintain an organizational structure and process that supports the
creation, implementation, exception handling, and management of policy that
represent business requirements), and technical awareness and training (to
increase the ability to select and implement effective technical security
mechanisms, products, process, and tools).
(This description is based on the definition in TC1 – A Quick Guide to the
Reference Architecture. Refer also to The Open Group White Paper: An
Architectural View of Security for Cloud.)
Infrastructure Protection Infrastructure Protection Services secure server, end-point, network, and
Services application layers. This discipline uses a traditional defense-in-depth
approach to make sure containers and pipes of data are healthy. The controls
of Infrastructure Protection Services are usually considered as preventive
technical controls such as IDS/IPS, firewall, anti-malware, white/black
listing, and more. They are relatively cost-effective in defending against the
majority of traditional or non-advanced attacks.
(This description is based on the definition in TC1 – A Quick Guide to the
Reference Architecture. Refer also to The Open Group White Paper: An
Architectural View of Security for Cloud.)
Information Security The main objective of Information Security (aka Information Security
Management) is to implement the appropriate measurements in order to
minimize or eliminate the impact that security-related threats and
vulnerabilities might have on an organization. Often Information Security
will address privacy and confidentiality concerns; especially in international
enterprises where national legislation may differ significantly and impact the
transit and storage of data/information.
Information Security is reliant on cloud-consistent security labeling (e.g.,
security classification) and compartmentalization as necessary. This is
imperative if the cloud uses information rather than network-centric security.
Other controls will dictate the security during data states including matters
such as encryption protocols when data is in use, in transit, or at rest (DIU,
DIT, DAR).
(Refer to The Open Group White Paper: An Architectural View of Security
for Cloud.)
Risk Management
Risk Management starts with the categorization and costing of information
and related technology assets. Subsequently, risks are identified and
classified along with the resultant management decisions to accept, mitigate,
transfer, or avoid them. Risks are constantly monitored and reviewed
whenever there are any changes to the cloud architecture.
Dashboards for security management and risk management are used to
measure and report the level of effectiveness of decisions and help the
organization make new decisions that will maintain and improve that
effectiveness. Analysis and plans for remediating residual risks are also part
of the overall risk management framework. (Refer to TC1 – A Quick Guide
to the Reference Architecture.)
Policy & Standards Security policies are part of a logical abstraction of enterprise security
architecture. They are derived from risk-based business requirements and
exist at a number of different levels, including information security, physical
security, business continuity, infrastructure security, application security, as
well as the overarching business operational risk management. Security
policies are statements that capture requirements specifying what type of
security and how much should be applied to protect the business. Policies
typically state what should be done, while avoiding reference to particular
technical solutions. Security standards are an abstraction at the component
level and are needed to ensure that the many different components can be
integrated into systems.
Internationally recognized standards for various aspects of security from
standard bodies include ISO, IETF, IEEE, ISACA, OASIS, and TCG.
Direction can also be provided in the form of operational security baselines,
job aid guidelines, best practices, correlation of regulatory requirements, and
role-based awareness. One way to approach security policy and its
implementation is to classify information and associate policies with the
resulting classes of data. (Refer to TC1 – A Quick Guide to the Reference
Architecture.)
Privilege Service The Privilege Service (aka Privilege Management) ensures that users have
the access and privileges required to execute their duties and responsibilities
with Identity and Access Management (IAM) functions such as identity
management, authentication services, authorization services, and privilege
usage management. This security discipline enables the right individuals to
access the right resources across increasingly heterogeneous technology
environments and meet increasingly rigorous compliance requirements.
The technical controls of the Privilege Service focus on identity
provisioning, passwords, multi-factor authentication, and policy
management. This security practice is a crucial undertaking for any
enterprise. It is also increasingly business-aligned, and it requires business
skills, not just technical expertise.
(This description is based on the definition in TC1 – A Quick Guide to the
Reference Architecture. Refer also to The Open Group White Paper: An
Architectural View of Security for Cloud.)
Threat and Vulnerability This discipline (aka Threat and Vulnerability Management) deals with core
Service security, such as vulnerability management, threat management, compliance
testing, and penetration testing. Vulnerability management is a complex
endeavor in which enterprises track their assets, monitor and scan for known
vulnerabilities, and take action by patching the software, changing
configurations, or deploying other controls in an attempt to reduce the attack
surface at the resource layer. Threat modeling and security testing are also
part of activities in order to identify the vulnerabilities effectively.
(This description is based on the definition in TC1 – A Quick Guide to the
Reference Architecture. Refer also to The Open Group White Paper: An
Architectural View of Security for Cloud.)
Architecture Building
Blocks (ABBs) Description
Resource Health Resource Health Monitoring provides an integrated view of Cloud Resources
Monitoring health to achieve better performance, accountability, and business results to
support cloud operational events and generate Cloud Resources performance
reports. It also provides instrumentation capabilities to monitor defined
SLAs.
Service Health Monitoring Service Health Monitoring provides an integrated view of Cloud Services
health to achieve better performance, accountability, and business results to
support cloud operational events and generate Cloud Services performance
reports. It also provides instrumentation capabilities to monitor defined
SLAs.
SLA Enforcement SLA Enforcement ensures that SLAs defined in the service contract are
rigidly enforced in order to avoid any applicable penalties. Captured data
related to SLAs also provide opportunities to make adjustments to contracts
and agreements during the subscription renewal process.
Architecture Building
Blocks (ABBs) Description
Service Interoperability Service Interoperability is the ability of Cloud Service Consumers to use
their data and services across multiple Cloud Service Providers with a
unified management interface (refer to NIST SP 500-292). The following
highlights interoperability/portability as service model levels. Refer to The
Open Group Guide: Cloud Computing Portability and Interoperability for
detailed information.
IaaS Interoperability
IaaS Interoperability (aka System Portability – refer to NIST SP 500-292)
provides a mechanism for Cloud Service Providers to provision a workload
(e.g., compute) either an internal environment or onto an external Cloud
Provider’s environment and seamless migration of information about the
service and its underlying resources.
PaaS Interoperability
The PaaS level of interoperability focuses on the ability to provide seamless
coordination in the development and deployment of platform services and
associated licenses. Currently there is little or no portability provided at the
PaaS level.
SaaS Interoperability
Cloud Service Consumers expect to have the ability to support critical SaaS
applications’ features on a variety of channels (e.g., web, mobile, smart
phone, etc.). Interoperability on common features is usually supported
(where possible) by utilizing presentation abstraction.
Data Synchronization
Data Synchronization is the mechanism to ensure consistency across the
Cloud Ecosystem to a single set of source data for all duplicated target data
storage and vice versa. It ensures the continuous coherency of the data over
time. It is a fundamental requirement for globally distributed applications
(e.g., file synchronization between regions, and base information
synchronization between catalogs). For example, a common service catalog
data model that allows data synchronization capabilities between a Cloud
Service Provider’s service catalog and a Cloud Service Consumer’s product
catalog.
Architecture Building
Blocks (ABBs) Description
Change & Configuration The Change & Configuration Services ensure that the configuration of Cloud
Services Services remains compliant with the changes in policies and compliance. It
maintains an accurate configuration of Cloud Services offered in the catalog.
It also ensures that the Configuration Management Database (CMDB)
information is highly available, secured, and in compliance with applicable
licensing terms and conditions.
Service Catalog The Service Catalog provides flexible and easily configurable catalog
information (description, type, associated base SLAs, etc.) and enables a
mechanism for Cloud Service Consumers to subscribe to listed services. The
information is generally collected through a self-service Cloud Service
provisioning portal and allows cloud consumers to describe and manage
Cloud Services easily. The service catalog includes information about the
Cloud Service (pricing, payment terms and conditions, etc.), could support
multiple pricing models (pay-as-you-go, tiered models, etc.), and includes
technical, business, and compliance constraints.
The cloud service catalog integrates with the CMDB to define and manage
information about instances of catalog services and their relationship with
physical and virtual infrastructure resources. The service catalog seamlessly
integrates with the cloud security service and Cloud Services management
tools (business and operational management tools).
The service catalog could also describe the Cloud Service Provider’s ability
to meet a cloud performance rating (a common way to evaluate and
determine competitive advantage).
Architecture Building
Blocks (ABBs) Description
Change & Configuration The Change & Configuration Service for resources ensures that the
Service configuration of Cloud Services remains compliant with the changes in
policies and compliance. It maintains an accurate configuration of the Cloud
Services offered in the catalog. It also ensures that CMDB information is
highly available, secured, and in compliance with applicable licensing terms
and conditions.
Resource Catalog The resource catalog manages information about the resources required to
support Cloud Services provisioning requests captured through the self-
service Cloud Service management provisioning channel. The resource
catalog also includes technical, business, and compliance constraints.
Description The underlying computing resources of IaaS (e.g., storage, compute, and network)
are shared and auto-provisioned to support an efficient system infrastructure.
Rationale In order to meet business objectives to maximize profit, the IaaS Cloud Service
Provider’s underlying computing resources serve using a multi-tenant environment.
IaaS can seamlessly move workloads around to lower overhead and meet defined
SLAs.
Implications IaaS should have a built-in capability of automated provisioning and dynamically
move workload to meet defined SLAs.
Business and service performance impact due to shared IaaS infrastructure should be
well understood to avoid any undesired outcome.
Cloud Service Providers should enable mechanisms to protect one tenant from other
tenants.
Auto-provisioning must prepare for peaks in load (e.g., higher volume of order and
usage of computing resources due to advertised sale) with the use of cloud bursting.
Cloud bursting is a way to address peak load by augmenting computing resources
with an external IaaS provider’s computing environment.
Description Cloud solutions that use common and public networks, using the Internet Protocol
(IP), should expect unreliable service due to performance variance, variable latency,
and network failure.
Rationale One of the essential characteristics of cloud computing is to have cloud capabilities
accessed through the standard and public Internet. Cloud solutions should be
designed to address unreliable IP service and variance in latency.
Implications Cloud solutions should be designed to seamlessly handle network failure and address
how to meet performance-related SLAs.
Data should be well protected in all stages of data (DIU, DAR, and DIT).
Built-in capabilities need to be provided to deal with communications latency
variance.
Description Cloud Services solutions should enable automated ways to measure allocation and
consumption of Cloud Services and optimize the service usage by leveraging
metering capability.
Rationale In order to minimize investment on Cloud Services, Cloud Services solutions should
provide real-time transparency on Cloud Services utilization to both Cloud Service
Provider and Cloud Service Consumer.
Implications Cloud Services solutions should be designed with built-in mechanisms to capture
resources allocation, consumption, and produce measurements data.
Provide real-time (or near real-time) assessment reports to efficiently respond to
demand/usage of Cloud Services solutions.
Although profiling resource usage by any cloud solution in a multi-tenant cloud
environment will be challenging, it would be required to optimize the usage to
ensure accurate metering.
Evaluate measurements data and make any changes to optimize Cloud Services
solutions.
Principle Name Automatic provisioning to enable horizontal scaling for distributed workload.
Description Cloud Service Providers seek horizontal scaling (simultaneous process of data across
multiple machines) to take advantage of larger virtual machine capabilities that could
be rapidly and automatically provisioned to meet the requirements of parallel
processing.
Rationale Where possible, Cloud Service Providers are looking to utilize their larger virtual
machines. Comparatively, horizontal scaling allows Cloud Service Consumers to
process large amounts of data efficiently with minimum investment (e.g., the use of
Hadoop and MapReduce types of applications).
Implications Cloud solutions will have to be designed specifically for loosely-coupled distributed
computing with fine-grained processing which could also promote easier workload
movement.
Larger data sources might require partitioning into smaller sets of data sources.
Description Ensure that SaaS, PaaS, and IaaS are loosely-coupled. For example, a Cloud Service
Consumer of PaaS does not control the underlying cloud infrastructure resources
(e.g., compute, storage, and network).
Rationale Cloud Services are designed to support dynamic and scalable cloud environments.
Description Ensure that Cloud Services are securely exposed with the appropriate level of
abstraction and hide implementation details of a Cloud Service.
Rationale Cloud Service abstraction provides the right separation and hides the implementation
details to ensure service agility.
Implications Ensure there is a level of abstraction that separates the concept/interface and
implementation details of Cloud Services.
Ensure that all essential characteristics of Cloud Services (e.g., resource pooling,
broad network access, measured service, rapid provisioning, etc.) are maintained
without exposing implementation details. For example, in the case of IaaS, resource
abstraction components include software elements, such as hypervisors, virtual
machines, virtual data storage, and other computing resource abstractions.
Ensure there are appropriate controls in place to provide secure and reliable usage of
underlying service resources.
Description A cloud computing model must support tenant and solution isolation among multiple
tenants of the cloud.
Rationale Cloud computing stores clients’ assets (information and operational processes
applications) in servers distributed “who knows where”, so it is critical that each
client’s assets are kept securely separated from the assets of other clients,
irrespective of the storage media and processing resources that each client may also
use in the cloud.
Implications Cloud Service Providers offer assurances that they provide secure isolation between
the assets of each of their clients. While this is difficult for them to evidence, their
isolation control mechanisms seem to demonstrate success over this capability.
SLAs may be required that guarantee separation of concerns with appropriate
penalties.
This section provides considerations that are significant in the development of an Enterprise
Architecture for the Cloud Ecosystem using the Cloud Ecosystem Reference Model.
Public Cloud “A public cloud is one in which the cloud infrastructure and computing
resources are made available to the general public over a public network. A
public cloud is owned by an organization selling Cloud Services, and serves a
diverse pool of clients.” (Refer to NIST SP 500-292.)
Private Cloud “A private cloud gives a single Cloud Service Consumer’s organization the
exclusive access to and usage of the infrastructure and computational
resources. It may be managed either by the Cloud Service Consumer
organization or by a third party, and may be hosted on the organization’s
premises (i.e., on-site private clouds) or outsourced to a hosting company (i.e.,
outsourced private clouds).” (Refer to NIST SP 500-292.)
Community Cloud “A community cloud serves a group of Cloud Service Consumers which have
shared concerns, such as mission objectives, security, privacy and compliance
policy, rather than serving a single organization as does a private cloud.
Similar to private clouds, a community cloud may be managed by the
organizations or by a third party, and may be implemented on customer
premises (i.e., on-site community cloud) or outsourced to a hosting company
(i.e., outsourced community cloud).” (Refer to NIST SP 500-292.)
Hybrid Cloud “A hybrid cloud is a composition of two or more clouds (on-site private, on-
site community, off-site private, off-site community, or public) that remain as
distinct entities but are bound together by standardized or proprietary
technology that enables data and application portability.” (Refer to NIST SP
500-292.)
Gain higher cash flow since capital expenditures on Cloud Services are typically lower as they
are based on the pay-as-you-go pricing model. At the same time, there are
challenges/considerations that need to be resolved to achieve target business agility. Some of
those challenges are:
How business capabilities, both existing and new, are to be assembled quickly
Cloud Services change management
The following are some of the technical considerations to ensure that an enterprise is prepared to
take advantage of the cloud.
5.1 Introduction
This chapter describes how to develop, manage, and govern an Enterprise Architecture of a
fictitious organization named “CloudEcoSource” with use of the Cloud Ecosystem Reference
Model and the TOGAF standard. It describes an approach for each phase of the TOGAF
Architecture Development Method (ADM) and what the architect should consider when looking
to apply the TOGAF ADM to an enterprise Cloud Ecosystem. This informative case study
describes a generic approach to develop an Enterprise Architecture by utilizing Architecture
Building Blocks (ABBs) identified in the Cloud Ecosystem Reference Model. The standard
defines an approach to identify Solution Building Blocks (SBBs) to address the architectural
capabilities of ABBs. For example, the following describes the relation of ABBs and SBBs for
rapid provisioning and data protection in an enterprise Cloud Ecosystem:
An SBB for rapid provisioning can be provided by any of the participants of an enterprise
Cloud Ecosystem delivering the Cloud Service (e.g., Cloud Service Provider, Cloud
Service Broker, etc.). An ABB for these capabilities is, however, also part of the
architecture of the consuming enterprise, because the architecture requirement for rapid
provisioning will remain even if another participating entity in the enterprise Cloud
Ecosystem provides the SBB.
A data protection ABB should also appear in every applicable participant’s architecture.
From the perspective of the customer enterprise, each instantiation (SBB) of that building
block is another participant with which there is a relevant relationship as part of the
customer’s Cloud Ecosystem. This is because security policies applicable to the
customer’s data need to be carried out consistently across all parties handling that data,
regardless of how the building block is actually implemented.
Besides having a strong IT function in the organization, CloudEcoSource has engaged multiple
external Cloud Service Providers for its heterogeneous cloud infrastructure platform and
software services to support its business needs. The organization intends to use the TOGAF
standard for Enterprise Architecture practices to manage its Cloud Services as well.
CloudEcoSource has currently three distinct cloud-specific initiatives that have the
characteristics of IaaS, PaaS, and SaaS for cloud. This section will describe how
CloudEcoSource plans to use the TOGAF standard to create and evolve an Enterprise
The Preliminary Phase does what is needed before the cycles can start. It is usually carried out
when the TOGAF framework is first adopted by a particular architecture team for a particular
enterprise. Its activities may be revisited as needed for subsequent architecture engagements.
The Preliminary Phase is where the architect adopts the principles of the Cloud Ecosystem, and
organizational change flexibility. This affects two other outputs of the phase: the governance and
support strategy, and the content of the initial Architecture Repository. It focuses on the
following aspects to ensure that the organization’s architectural model has the support of
necessary business and IT capabilities for the use of the organization’s Cloud Ecosystem:
Describe the business mission, goals, and objectives to ensure that Architecture Principles
are in alignment with them.
Describe and ensure that there is a process to document business requirements and
constraints (both internal and external) that will impact the Cloud Ecosystem.
Ensure that the organization model for Enterprise Architecture and the ADM are in
alignment with the business goals and objectives of the Cloud Ecosystem.
The Preliminary Phase defines the Architecture Principles that will form part of the constraints
on any architecture work undertaken in the enterprise. They are typically developed by the lead
Enterprise Architect, in conjunction with key stakeholders, and are approved by the Architecture
Board. They are included in the tailored architecture framework, which is an output of the
Preliminary Phase.
An enterprise participating in the Cloud Ecosystem will in general have an established set of
Architecture Principles. These should be examined in the context of the Cloud Ecosystem for
completeness and applicability. It is possible to identify several scenarios that could apply:
Existing principles, which fit poorly, if at all, with cloud. This can happen when a
principle dates from an earlier period, when cloud in its current form did not exist. Should
we keep the principle as-is and accept the consequences, even if it means little or no
cloud? Can it be amended? In this case we need to look at the underlying Business
Principle and evaluate whether the Architecture Principle can be phrased differently. It is
possible that we may come to the conclusion that the principle is no longer valid.
Principles which are clearly still relevant but need to be expressed differently. This too
may require revisiting the underlying Business Principle.
Existing principles whose implications need to be given particular attention in the cloud
context.
New principles which are needed to address the specific challenges of the Cloud
Ecosystem.
The Enterprise Architecture Principles of the Cloud Ecosystem defined in Section 3.2 can be
listed with the Motivation Extension viewpoint of the ArchiMate standard. Figure 4 illustrates
the viewpoint of an enterprise’s Cloud Ecosystem.
The rest of this section describes the additional steps taken in the Preliminary Phase to achieve
the overall goals of the architectural effort outlined for CloudEcoSource.
The rest of this section describes the steps taken in Phase A to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
Architectural Viewpoint/Output
Stakeholder Key Concerns Class (Catalogs, Matrices, and Diagrams)
Different stakeholders, playing different roles, also have different concerns (stakeholder
viewpoints) which are the key drivers for the acceptance of the architecture program. Concerns
are key drivers of the stakeholders, which, from their perspective, are decisive for the acceptance
of the architecture program. There must be an inventory of all stakeholders and their concerns in
the Architecture Vision phase.
Then these concerns must be related to the goals of the future architecture. This can be achieved
using the Goal Refinement viewpoint (as proposed in the Motivation Extension) and instantiated
for a subset of CloudEcoSource.
5.3.3 Confirm and Elaborate Business Goals, Business Drivers, and Constraints
Once the business goals and strategic drivers of the organization are to be confirmed by key
stakeholders, we should capture the applicable business, technical, and operational constraints of
CloudEcoSource. These are essential items to ensure management endorsement for the cloud
initiatives. For example, constraints pertaining to security, privacy, and confidentiality of
information have to be clearly understood especially in the context of the CloudEcoSource
Cloud Ecosystem where national security and privacy legislation differ. Addressing these
constraints may well have a major architectural impact.
In order to highlight the capability evalation process, let’s consider that stakeholders of
CloudEcoSource expect to improve existing Customer Relations Management (CRM)
capabilities to reduce the number of complaints filed by its customers.
Once the capabilities are defined, the possible implications for the CRM capability, for example,
can be assessed and visualized with the stakeholder view. The results of the assessment are
documented in a Capability Assessment (refer to the TOGAF 9.1 Specification, Part IV, Section
36.2.10).
Transformation
Readiness Status Assessment
Assessment Priority (Low/Fair/Acceptable (Difficulty Level:
ID Readiness Factor (Low/Med/High) /Good/High) Low/Med/High)
It has now been approved by the sponsor and all applicable signing authorities to proceed with
the architecture work.
The Business Architecture describes relationships between different instances of Cloud Service
models to ensure that organizations have consistent and coherent cloud-enabled business
capabilities. Cloud Services provided by external service providers are transforming business
processes and require new approaches to manage the impact on the organization’s functions and
its IT environment. The life cycle management of Cloud Services requires constant check to
ensure that business objectives are met with efficient and effective business risk management.
Organizations might have to transform and evolve existing business processes and practices for
efficient IT management. To achieve business agility, the organizations need to formulate
strategy and address Cloud Services-related business objectives to enable efficient IT
management by:
Adopting Cloud Services as part of the enterprise strategy to transform business and IT
functions
Figure 13 outlines the expected input and output of the Business Architecture phase from a
Cloud Ecosystem perspective:
Organizations have to build consistent and integrated business capabilities portfolios that are
internally developed or procured from external Cloud Service Providers. The key aspects of the
Business Architecture for the Cloud Ecosystem are to not only describe business processes,
actors, roles, and collaborations, but also to depict the coherent relationships between Cloud
Services in respect to their deployment models. The business-focused approach of the TOGAF
ADM will be used to ensure that the organization’s business objectives of the Cloud Ecosystem
support all stakeholders. A comprehensive Business Architecture not only provides and supports
the recommended deliverables for the Business Architecture, but also specifies the extended
business boundaries, roles, products, and services for the Cloud Ecosystem. The following
recommended deliverables are to capture all relevant aspects of the Cloud Ecosystem:
Organization/Role/Location catalog: Describes a definitive listing of all
actors/participants that interact with the Cloud Ecosystem.
Organization Structure diagram: Highlights the extended organizational boundaries.
Functional Decomposition diagram: Describes business processes, Cloud Services
functions, and their inter-relationships.
Business Footprint diagram: Captures the relationships between business goals,
functions, and how these functions map to services provided by the Cloud Ecosystem.
The Business Architecture for CloudEcoSource describes the Cloud Services strategy with
functional, information, and services deployment aspects to achieve the organization’s required
business agility. This will enable CloudEcoSource to execute evolving business needs at an
acceptable cost, time, and quality with minimum risks. To sustain the business strategic
objectives described above, initiatives need to be placed in the appropriate architectural context
to develop a business portfolio that gets translated into concrete projects and criteria to measure
success in executing those initiatives. One of the key deliverables in the Business Architecture is
to ensure that business requirements effectively translate into the Target Business Architecture
of CloudEcoSource.
In order to develop relevant architectural viewpoints to describe how stakeholder concerns are
addressed, we will use value stream mapping and describe the relationships between the key
business participants of CloudEcoSource. In addition, we should identify key business metrics to
ensure the viability of cloud solutions. Once key participants for the Cloud Ecosystem are
identified, a Functional Decomposition diagram and a Business Footprint diagram will be used
to describe and capture their inter-relationships.
The rest of this section describes the steps taken in Phase B to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
The Functional Decomposition diagram will capture various business functional capabilities and
their relationships. Also capturing reference models from external Cloud Service Providers will
help to describe the impact on the organizational roles and responsibilities. Focus will not only
identify and describe functional boundaries, but associated metrics for measurement.
CloudEcoSource has not performed Business Architecture work related to the Cloud Ecosystem
earlier by engaging external Cloud Service Providers. Any new business processes or impact on
existing business processes need to have the approval of key stakeholders. This includes training
IT personnel to effectively manage Cloud Service Providers, and establishing a mechanism to
Also, in order to effectively engage external Cloud Service Providers, CloudEcoSource must
negotiate SLAs (e.g., price, liability, and service support and termination agreements) to ensure
that its business and technical requirements and risks are fairly balanced with Cloud Service
Providers.
The enterprise information model for a Cloud Ecosystem will facilitate a common understanding
of the corporate structured and unstructured data and will serve as a basis for the Target Data
Architecture. The model facilitates unified access across all types of enterprise data, consistently
applies applicable business rules, and accelerates Cloud Services development. Data quality
should be well defined and captured in the metadata for all data assets of an enterprise (refer to
The Open Group White Paper: An Information Architecture Vision). These metadata attributes
will dictate what technology constraints (e.g., caching, partitioning, and failover), service
qualities (e.g., availability, performance, scalability), and service delivery concepts (e.g., DaaS)
will be used within an enterprise Cloud Ecosystem. Data quality also drives the service levels
requirements of Cloud Services.
The information security service ABB defines and manages the requisite security classifications,
compartments, and legislative constraints on the use of the information within an enterprise
Cloud Ecosystem. It is also critical to use the metadata to define access policies to support
granular data access for individual, role-based, and governance-based security access controls.
Where applicable, architecture practitioners should consider including the following in order to
complete the Data Architecture for an enterprise Cloud Ecosystem:
Practitioners should identify data migration to cloud requirements, with governance for
data quality, and to ensure that an enterprise-wide common data definition is established
by defining a system of records for enterprise data.
Architecting data for cloud also utilizes various data caching techniques aimed at
improving data availability, performance, and scalability. The Cloud Ecosystem requires
that cloud solutions are tolerant of network failures and data consistency. The Data
Architecture might need to accommodate new assumptions that data consistency is
generally sacrificed over data availability and requires an enabling mechanism (e.g., data
partitioning) to relay/expose consistent data via cloud solutions.
The Data Architecture for CloudEcoSource describes the Cloud Services strategy to
address the distributed nature of CloudEcoSource data resources. The architecture
provides a flexible data integration mechanism and ensures that data in the cloud is
appropriately shared and maintained.
The rest of this section describes the steps taken in Phase C to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
Determine appropriate tools, techniques, and modeling processes to create and manage data
views to address all stakeholder concerns. Leveraging Cloud Services from heterogeneous Cloud
Service Providers requires a consolidated view of the semantically consistent data inventory to
reduce any possible overlaps and identify gaps in data relationships. Elaborated views to address
all stakeholder concerns help achieve business objectives. The data used within and across the
business processes of CloudEcoSource must be cataloged as the basis for further documentation.
This catalog includes both structured data and unstructured content. Using conceptual data
models to document data taxonomies will create consistent views and describe how data is
created, distributed, migrated, secured, and archived in the CloudEcoSource Cloud Ecosystem.
Develop a target description for the Data Architecture, to the extent necessary to support the
Architecture Vision and Target Business Architecture. Ensure that non-functional data
requirements are incorporated in the Target Data Architecture and translated into SLAs. For
example, some critical non-functional requirements in the cloud are:
Data security measuring criteria (e.g., privacy, confidentiality, data obfuscation, etc.)
Where new architecture models need to be developed to satisfy stakeholder concerns, use the
models identified within Section 5.5.1 as a guideline for creating new architecture content to
describe the Target Architecture.
An additional challenge is the need to integrate data with various cloud deployment scenarios of
the CloudEcoSource Cloud Ecosystem. Some capabilities to address these are provided at SaaS
and PaaS level and will have impact not only on the Data Architecture but on the entire
architecture landscape of CloudEcoSource.
The Technology Architecture of the Cloud Ecosystem describes the technology services strategy
to address the Cloud Ecosystem’s technical services requirements. The architecture realizes both
The Technology Architecture for the Cloud Ecosystem will enable comprehensive technical
services for the Cloud Ecosystem where each tenant has mechanisms to effectively control
demand and manage the life cycle of services.
The rest of this section describes the steps taken in Phase D to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
Identify requirements for appropriate tools and techniques to be used to support the
infrastructure, platform, and software services of the Cloud Ecosystem. These technical
requirements will set the foundations for viewpoints required for the Cloud Ecosystem and to
demonstrate how the stakeholder concerns are being addressed in the Technology Architecture.
For example, the Technology Architecture will have to support viewpoints to demonstrate
essential cloud capabilities for:
Real-time allocation of computing resources to Cloud Services in order to provide
required elasticity and scalability capabilities
Automatically adjust computing resources between various Cloud Services instances and
processing requirements in order to achieve targeted performance measurements
Tenant-based resources usage tracking and billing based on Cloud Services consumption
Technical capabilities to securely interoperate and port workloads of the Cloud Ecosystem
The Target Technology Architecture of CloudEcoSource describes how software, platform, and
infrastructure services are used to support cloud business solution requirements, their usage, and
relationships. This provides an overall perspective on technical dependencies to enable an
effective Cloud Ecosystem. The architecture describes SLAs that measure the effectiveness of
the overall Cloud Ecosystem architecture, evaluates compliance with business policies, and
enables practitioners to select the right ABBs by conducting a quick trade-off/fit-for-purpose
analysis. The CloudEcoSource architects decided to use all available Cloud Service models to
deliver their Cloud Services. The following view of the Target Technology Architecture
highlights the seamless use of Cloud Services provided by Cloud Service Providers (depicted
with CSP-*) and their use to deploy cloud solutions on the CloudEcoSource Cloud Ecosystem:
The project life cycle in the Cloud Ecosystem is drastically reduced due to the cloud computing
capability of services that can be rapidly assembled through IaaS, PaaS, and SaaS. Phase E
identifies the process to deliver the Target Architecture through projects, programs, or portfolios.
The traditional gap analysis between the current ABB and target ABB is not directly relevant
since it is an infrastructure replacement. In the Cloud Ecosystem the Target Architecture consists
of services of ABBs.
From the Architecture Vision phase it is essential to define the Target Architecture in terms of
services components. Overall Phase E output will be candidate work packages, which would
become Architecture Roadmap components and incremental delivery though the Transition
Architecture through Phase F.
Phase E considers architecture reference materials of the Cloud Ecosystem. The Cloud
Ecosystem needs to be monitored as it evolves with new standards and new capabilities of Cloud
Services that are offered by the vendors on a regular basis.
At this juncture the implementation issues such as financial, technical, and contractual need to be
considered.
The implementation model and type depends on some of the following considerations:
Time to market
Legacy applications dependency and phasing out
Cost versus risk
Capability of the organization
Cloud readiness
The objectives of Phase E are to review the target business objectives and capabilities,
consolidate the gaps from Phases B to D, and then organize groups of building blocks to address
these capabilities. Additional tasks may include:
Confirm the enterprise’s capability for undergoing change
Derive a series of Transition Architectures that deliver continuous business value through
the exploitation of opportunities to realize the building blocks
Generate and gain consensus on an outline Implementation and Migration Strategy
The rest of this section describes the steps taken in Phase E to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
The challenges are to build confidence about the new deployment model that is not located on
the premises.
Scalability and elasticity Applications able to scale and Skills to design applications to take
shrink as per the demand advantage of scalability on-demand
Business functions and Traditional business functions Establish a mechanism to determine the
data and data reside locally on business functions and data that can be
premises hosted in public/private/hybrid
IT systems in large enterprises may have evolved over the last two or three decades. A revisit of
Phases B to D may be required, as there may be other services and the need to convert manual
processes to automated processes.
Educating the business users to use business process management tools gives more control to the
business users to manage the business with less dependency on IT. There may be also constraints
such as time-to-market, cost, skills, etc.
The Enterprise Architecture maturity assessment is reviewed, to identify whether they are able to
meet the targeted maturity.
Consideration must be given to the dependencies of applications in the Cloud Ecosystem as they
span across the on-premises deployment model and cloud deployment model. Also there may be
inter-dependencies with Cloud Services consumed from different Cloud Service Providers.
Table 12: Consolidated Gaps, Solutions, and Dependencies Matrix of CloudEcoSource – An
Illustration
To identify the shared services that can be utilized across the enterprise through provision of
shared resources.
Based on the solution, the services can be consumed either from an information system deployed
on a PaaS or business services from a SaaS. The interoperability between PaaS and SaaS needs
to be considered. See The Open Group Guide: Cloud Computing Portability and Interoperability
for detailed information.
In addition to interoperability, the APIs provided by the cloud vendors need consideration as
potential factors accounting for services consumption and future extension.
Dependencies assist in sequencing the efforts required, grouping the related projects, identifying
milestones and logical/actual delivery points, and in planning the project duration.
Determining the dependencies becomes a critical key factor for migration planning in the Cloud
Ecosystem, especially as more vendors are involved.
The Architecture Roadmap, focused on the cloud deployment model, has the capability of rapid
provisioning of the services. The solutions are to be thoroughly analyzed to find the
dependencies between the services.
In the Cloud Ecosystem the information system will be moved from on-premises to the cloud
based on the Migration Strategy as Greenfield, Revolutionary, or Evolutionary. Group the work
packages to suit the Migration Strategy.
In the Cloud Ecosystem the type of services based on IaaS, PaaS, or SaaS will determine the
number, type, and duration of Transition Architectures. Also the Migration Strategy as
Greenfield, Revolutionary, or Evolutionary becomes a determining factor.
5.7.11 Create the Architecture Roadmap & Implementation and Migration Plan
The Architecture Roadmap is consolidated from the work packages and Transition Architecture
that describes the timeline of the progression from the Baseline Architecture to the Target
Architecture. The identified Transition Architectures and work packages should have a clear set
of outcomes.
The Implementation and Migration Plan demonstrates the activity necessary to realize the
Architecture Roadmap based on the Cloud Ecosystem. The projects and resource requirements
consider the Cloud Ecosystem in addition to the on-premises application. The application
implementation needs to consider the priority of the services based on the business requirement
identified earlier.
Finally, update the Architecture Vision, Architecture Definition Document, and Architecture
Requirements Specification with any additional relevant outcomes from this phase.
The Cloud Vision of the organization should be analyzed and the drivers for the projects to move
to the cloud should be understood. The key business drivers could be:
Providing agility
Making the organization future-ready
Cost optimization by bringing elasticity in the solution
Exposing a re-usable solution to a wider audience
The rest of this section describes the steps taken in Phase F to achieve the overall goals of the
architectural effort outlined for CloudEcoSource. Each of the steps below is taken in cooperation
with the appropriate project/program office.
The rest of this section describes the steps taken in Phase G to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
In order to ensure that the architecture continuously achieves its target business objectives and to
avoid any business disruption, the Architecture Change Management process evaluates and
evolves the Enterprise Architecture to appropriately address both internal and external factors to
improve overall business performance. The following is a list of factors that need to be
frequently assessed and appropriately addressed during the life cycle of the Enterprise
Architecture:
Incremental improvements to architectural capabilities that are critical to the enterprise’s
business processes transformation through automation
New performance improvement opportunities that enable efficient operational decision-
making activities to enhance customers’ (both internal and external) experience
Business requirements to create/change how customers, partners, and suppliers interact
with the Enterprise Architecture capabilities to enhance Enterprise Architecture value
proposition and business operations
Ensure that service contracts with Cloud Service Providers have adequate provisions that
allow enterprises to enable a change/exit/migration strategy without negatively impacting
the Cloud Service delivery
Perform routine risk assessments for the enterprise on Cloud Service Providers and the
utilization of Cloud Services; the assessments must reflect the changing landscape with
possible timely adjustments to enable efficient use of the enterprise’s Cloud Ecosystem
The rest of this section describes the steps taken in Phase H to achieve the overall goals of the
architectural effort outlined for CloudEcoSource.
The effectiveness of the governance process must be assessed periodically and applicable
refinements made to the process.
Route the document for review by relevant stakeholders, incorporate received feedback, and
determine whether review of the document is once again required. Once architecture change is
approved and finalized, upload the documents in the Architecture Repository.
When a new architectural problem is assigned to the architecture team, the first task is to analyze
the problem based on goals and requirements. This can be done with the Motivation Extension
of the ArchiMate standard. The goals and requirements help to identify which combination of
products, services, processes, and applications are needed to solve the problem and translate
them into Enterprise Architecture models. If there are still unclear issues, the architecture team
must repeat this process in order to refine and realize the elements of the architecture (refer to
Iacob et al.: Delivering EA with TOGAF and ArchiMate).