Framework for the Governance of Enterprise IT is the subject of the first domain of the ISACA’s Certified in the Governance of Enterprise IT (CGEIT) exam and constitutes 25% of the overall objectives of the exam. The main objective of this domain is to define, establish, and manage an IT governance framework in alignment with the vision, values, and mission of the enterprise. The following sections will take a deep dive into this first domain. The candidates should grasp these concepts thoroughly to pass their CGEIT exam and secure an elite score.
What Topics are Covered in This Domain?
This domain covers eleven (11) task statements and fourteen (14) knowledge statements. All of these topics are listed along with their short description below:
Domain 1: Task Statements
- Ensure that a framework for the governance of enterprise IT is established and allows the achievement of enterprise goals and objectives to create stakeholder value, taking into account benefits realization, risk optimization, and resource optimization.
- Identify the requirements and objectives for the framework for the governance of enterprise IT, incorporating input from enablers such as principles, policies and frameworks; processes; organizational structures; culture, ethics, and behavior; information; services, infrastructure, and applications; people, skills, and
- Ensure that the framework for the governance of enterprise IT addresses applicable internal and external requirements (for example, principles, policies and standards, laws, regulations, service capabilities and contracts).
- Ensure that strategic planning processes are incorporated into the framework for the governance of enterprise IT.
- Ensure the incorporation of enterprise architecture (EA) into the framework for the governance of enterprise IT in order to optimize IT-enabled business solutions.
- Ensure that the framework for the governance of enterprise IT incorporates comprehensive and repeatable processes and activities.
- Ensure that the roles, responsibilities, and accountabilities for information systems and IT processes are (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Fakhar Imam. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/lEr1uhPxQJ8/