Enterprise Architecture Maturity Level 1

5351 views
Enterprise Architecture

Published on 30 Nov 2018

Share | Embed | Viewer | Email

Enterprise Architecture Maturity Model

Many architects and their managers from the EA field ask themselves still these questions: What is Enterprise Architecture and what is the value of Enterprise Architecture?

This model shows the basic blocks that need to be in place in order to reach enterprise architecture maturity level #1.

Dragon1 as open method defines maturity level #1 as all key stakeholders and projects being aware of Enterprise Architecture, having access to Enterprise Architecture products, making use of some of them and providing feedback.

On this page, you can read more about the Benefits of Enterprise Architecture maturity levels.

As part of reaching maturity level #1, you need to create an Enterprise Architecture dossier filled with at least 20 to 30 products.

On Resources, you can read about the Enterprise Architecture dossier standard.

Category: EA

Next content to watch

Mars-Landers-Rovers-Locations

Mars-Landers-Rovers-Locations

4383 Views
Workflow-Diagram-Order-Processing

Workflow-Diagram-Order-Processing

6096 Views
Collaboration as a Service

Collaboration as a Service

3610 Views
Principles-of-the-Toucans-Bill

Principles-of-the-Toucans-Bill

2150 Views
Schets van Proces

Schets van Proces

1498 Views
Hello World

Hello World

1177 Views
World Map as Heat Map?

World Map as Heat Map?

2182 Views
ArchiMate Transformation Viewpoint

ArchiMate Transformation Viewpoint

7537 Views
AI Chatbot Reference Architecture

AI Chatbot Reference Architecture

28018 Views
What is Amazons Business Model - Denis Oakley

What is Amazons Business Model - Denis Oakley

8649 Views
What is Enterprise Architecture - Roger Evernden

What is Enterprise Architecture - Roger Evernden

8512 Views
Architecture Diagram - What is the Value?

Architecture Diagram - What is the Value?

17328 Views
Image Moderation Chatbot

Image Moderation Chatbot

10017 Views
IBM - Cyber Security: How it works

IBM - Cyber Security: How it works

3237 Views