Enterprise Architecture

Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.

  • T0084: Employ secure configuration management processes
  • T0542: Translate proposed capabilities into technical requirements
  • T1010: Communicate enterprise information technology architecture
  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1027: Integrate organizational goals and objectives into security architecture
  • T1077: Assess the organization's cybersecurity architecture
  • T1096: Perform privacy impact assessments (PIAs)
  • T1100: Configure network hubs, routers, and switches
  • T1101: Optimize network hubs, routers, and switches
  • T1122: Determine essential system capabilities and business functions
  • T1123: Prioritize essential system capabilities and business functions
  • T1124: Restore essential system capabilities and business functions after catastrophic failure events
  • T1125: Define system availability levels
  • T1126: Determine disaster recovery and continuity of operations system requirements
  • T1179: Determine if systems and architecture are consistent with cybersecurity architecture guidelines
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1363: Plan system security development
  • T1364: Conduct system security development
  • T1403: Allocate cybersecurity services
  • T1404: Select cybersecurity mechanisms
  • T1410: Develop system security contexts
  • T1423: Create system security concept of operations (ConOps) documents
  • T1426: Determine cybersecurity design and architecture effectiveness
  • T1429: Prepare trend analysis reports
  • T1434: Create cybersecurity architecture functional specifications
  • T1507: Determine user requirements
  • T1508: Plan cybersecurity architecture
  • T1519: Design system security measures
  • T1520: Update system security measures
  • T1521: Develop enterprise architecture
  • T1527: Define baseline system security requirements
  • T1544: Create definition activity documentation
  • T1545: Create architecture activity documentation
  • T1563: Implement system security measures
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1591: Address security architecture gaps
  • T1597: Plan implementation strategies
  • T1598: Assess the integration and alignment capabilities of enterprise components
  • T1606: Prepare impact reports
  • T1626: Determine impact of new systems and system interfaces on current and target environments
  • K0646: Knowledge of system optimization techniques
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0685: Knowledge of access control principles and practices
  • K0686: Knowledge of authentication and authorization tools and techniques
  • K0707: Knowledge of database systems and software
  • K0710: Knowledge of enterprise cybersecurity architecture principles and practices
  • K0711: Knowledge of evaluation and validation principles and practices
  • K0714: Knowledge of electrical engineering principles and practices
  • K0720: Knowledge of Security Assessment and Authorization (SA&A) processes
  • K0727: Knowledge of analysis standards and best practices
  • K0728: Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices
  • K0729: Knowledge of non-repudiation principles and practices
  • K0730: Knowledge of cyber safety principles and practices
  • K0731: Knowledge of systems security engineering (SSE) principles and practices
  • K0739: Knowledge of mathematics principles and practices
  • K0742: Knowledge of identity and access management (IAM) principles and practices
  • K0744: Knowledge of operating system (OS) systems and software
  • K0745: Knowledge of parallel and distributed computing principles and practices
  • K0749: Knowledge of process engineering principles and practices
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0756: Knowledge of security management principles and practices
  • K0757: Knowledge of system design tools and techniques
  • K0758: Knowledge of server administration principles and practices
  • K0759: Knowledge of client and server architecture
  • K0765: Knowledge of software engineering principles and practices
  • K0772: Knowledge of systems testing and evaluation tools and techniques
  • K0773: Knowledge of telecommunications principles and practices
  • K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
  • K0779: Knowledge of systems engineering processes
  • K0791: Knowledge of defense-in-depth principles and practices
  • K0835: Knowledge of risk assessment principles and practices
  • K0836: Knowledge of threat assessment principles and practices
  • K0839: Knowledge of critical infrastructure systems and software
  • K0840: Knowledge of hardware reverse engineering tools and techniques
  • K0842: Knowledge of software reverse engineering tools and techniques
  • K0848: Knowledge of network systems management principles and practices
  • K0849: Knowledge of network systems management tools and techniques
  • K0851: Knowledge of reverse engineering principles and practices
  • K0865: Knowledge of data classification standards and best practices
  • K0866: Knowledge of data classification tools and techniques
  • K0868: Knowledge of process improvement principles and practices
  • K0869: Knowledge of process maturity models and frameworks
  • K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
  • K0871: Knowledge of enterprise architecture (EA) principles and practices
  • K0872: Knowledge of service management principles and practices
  • K0873: Knowledge of service management standards and best practices
  • K0879: Knowledge of industry cybersecurity models and frameworks
  • K0880: Knowledge of access control models and frameworks
  • K0883: Knowledge of circuit analysis tools and techniques
  • K0891: Knowledge of the Open Systems Interconnect (OSI) reference model
  • K0894: Knowledge of computer architecture principles and practices
  • K0906: Knowledge of multi-level security (MLS) systems and software
  • K0907: Knowledge of cross-domain solutions
  • K0915: Knowledge of network architecture principles and practices
  • K0921: Knowledge of program protection plan (PPP) principles and practices
  • K0927: Knowledge of configuration management tools and techniques
  • K0928: Knowledge of systems engineering principles and practices
  • K0933: Knowledge of N-tier architecture principles and practices
  • K0934: Knowledge of data classification policies and procedures
  • K0947: Knowledge of computer engineering principles and practices
  • K0948: Knowledge of embedded systems and software
  • K0949: Knowledge of fault tolerance tools and techniques
  • K0952: Knowledge of information theory principles and practices
  • K0983: Knowledge of computer networking principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1086: Knowledge of design modeling
  • K1095: Knowledge of design methods
  • K1110: Knowledge of acquisition cybersecurity requirements
  • K1111: Knowledge of application security design principles and practices
  • K1120: Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices
  • K1159: Knowledge of fail-over or alternate site requirements
  • K1169: Knowledge of material supportability requirements
  • K1191: Knowledge of organizational security posture
  • K1194: Knowledge of Personally Identifiable Information (PII) attributes
  • K1212: Knowledge of security controls
  • K1216: Knowledge of service-oriented security architecture practices and principles
  • K1223: Knowledge of system backup requirements
  • K1236: Knowledge of user requirements
  • S0383: Skill in analyzing an organization's enterprise information technology architecture
  • S0420: Skill in integrating multiple technologies
  • S0426: Skill in building architectures
  • S0427: Skill in building frameworks
  • S0465: Skill in identifying critical infrastructure systems
  • S0466: Skill in identifying systems designed without security considerations
  • S0543: Skill in scanning for vulnerabilities
  • S0544: Skill in recognizing vulnerabilities
  • S0551: Skill in applying information technologies into proposed solutions
  • S0570: Skill in designing the integration of hardware solutions
  • S0571: Skill in designing the integration of software solutions
  • S0574: Skill in developing security system controls
  • S0578: Skill in evaluating security designs
  • S0590: Skill in building use cases
  • S0597: Skill in writing code in a currently supported programming language
  • S0674: Skill in installing system and component upgrades
  • S0675: Skill in optimizing system performance
  • S0683: Skill in implementing network segregation
  • S0686: Skill in performing risk assessments
  • S0762: Skill in integrating organization objectives
  • S0813: Skill in identifying cybersecurity issues in external connections
  • S0814: Skill in identifying privacy issues in partner interconnections
  • S0822: Skill in collaborating with stakeholders
  • S0853: Skill in performing cybersecurity architecture analysis
  • S0880: Skill in performing security architecture analysis
  • S0893: Skill in performing user needs analysis