Image without description
  • Jacco Meijer
  • |
  • May 15, 2026

Two Capabilities on the same back-plane

Security lives on the full back-plane of Enterprise Architecture and crosses the boundary of two perspectives of Capability

Part of the series: Getting it organized properly. Notes from a field still finding its shape.

Security architecture

Security architecture is changing what enterprise architecture has to organise. The gap between potential and reality is well known. Security makes it visible. This article is one telling, from where the security architect stands.

Security architecture is motivation and strategy. It is also the core elements on the business, the application and the technology layers. Security is a cross-cutting concern and that is the only way it can work.

When an enterprise architect talks with a security architect about capabilities, the security architect could wonder where these capabilities live in the core elements. A brief conversation with an ITIL professional clarifies that ITIL asks a different question to define Capability.

The enterprise architect asks what are we structured to do? The ITIL professional asks what is demonstrably done? Both answer with the word Capability. The answers are not of the same kind. One describes potential. The other describes reality.

This is the view from the back-plane. Most professionals work with one at a time. Security architects cross both. Because security does. A threat does not stop at the model.

A closer look

A closer look at Capability reveals a wider image. Many disciplines use the word, each has a unique perspective that changes the question.

DisciplinePerspective questionSourced from
Enterprise modellingWhat are we structured to do?TOGAF, ArchiMate, BIZBOK
Strategic planningWhat can we achieve?DoDAF
Operational performanceWhat is demonstrably done?CMMI, ITIL, COBIT
Performance measurementWhat does the practice produce?KPI/OKR frameworks

Capability travels through all four, with different meanings in each:

SourceTreatment of Capability
ArchiMateAn ability that describes what the enterprise can (is able to) do, now or in the future.
DoDAFThe ability to achieve a desired effect under specified standards and conditions, through combinations of ways and means.
CMMINot a noun. Capability levels apply to an organisation's performance and process improvement achievements in individual practice areas.
KPI/OKRNot formally defined. The question asked of any named capability is what it produces.

Same word, four meanings, four sets of evidence.

The four disciplines relate closely. Enterprise modelling describes what the organisation is structured to do. Operational performance describes how well that structure is being run. Strategic planning sits on top of the model and asks what can be achieved with it. Performance measurement sits on top of operations and asks what is actually being produced.

Two of them describe what exists. The other two ask what those descriptions are good for. Which is to say: potential and reality.

Potential and reality

Enterprise modelling describes potential. Models are layered and can express an organisation at rest and in motion. None of that makes a capability real. It says what could be done, given how the organisation is shaped.

Operational performance and performance measurement describe reality. What is being done, at what level, with what result. Maturity is reality about practice. Metrics are reality about results.

Notice the language. Enterprise modelling calls its objects capabilities. The others qualify: process capability, capability maturity, service capability. Outside its own discipline, Capability on its own usually means the enterprise-modelling kind.

The capability map describes what the organisation believes about itself. Belief is not dismissive. It is what strategy rests on and what investment decisions justify. The word names the kind of claim being made.

Potential and reality belong together. The act of modelling tends to separate them. Capabilities get drawn first as a clean noun-form layer at the top. Operational reality moves in second, or worse, gets drawn second. The model gives the impression that the two are tidily stacked when in practice they are interwoven.

The gap

The gap is well-known in the field. Hohpe describes it as the distance between the executive penthouse and the IT engine room. TOGAF ADM simply defines a method called gap analysis. Business architecture writers describe it as the gap between strategy and execution, or between ideas and reality. The vocabulary is rich. The observation is not.

Each tradition has an answer. TOGAF puts requirements management at the centre of the ADM, so every phase of the architecture cycle stays connected to operational requirements. BIZBOK links capability maps to value streams. Hohpe asks the architect to ride the elevator between floors. The OAA standard observes that Capability has multiple meanings and asks them to be held together. Each of these closes the gap from inside its own discipline.

The disciplines remain separate. Enterprise modelling produces a model. Operational performance produces a maturity assessment. Performance measurement produces a scorecard. Strategic planning produces a portfolio. The artefacts do not merge. The professionals who produce them rarely sit in the same room. The gap between potential and reality is a gap between roles, methods and outputs, and no single tradition holds all of them.

On the back-plane

Security cannot work on potential alone. A threat that arrives today does not wait for the model to be updated. The defence either runs or it does not. Whether a Detect capability is detecting is not a question that can be answered from the capability map.

Security standards reflect this. NIST CSF 2.0 names six functions: Govern, Identify, Protect, Detect, Respond, Recover. Govern is closest to enterprise modelling, with strategy, policy, risk appetite and oversight. The other five hold the operational practice that the maturity assessor will examine. The framework is one document, both halves are on the same page, and the relationship between them is the framework's structural premise.

ISO 27001 and ISO 27002 do the same in a different shape. ISO 27001 defines the management system. ISO 27002 expands its controls into operational guidance. Same series, both meanings.

Hohpe's elevator carries the architect across disciplines. Riding it is necessary and hard. Disciplines are home for the people who work in them: where the vocabulary fits, where colleagues understand each other without explaining. Leaving home is uncomfortable by design.

A security standard does travel the elevator. The difficulty is apparent. The standard binds both disciplines into the same document.

Many large organisations see their IT engine separated by many floors from the executive penthouse, which also separates business and digital strategy from the vital work of carrying it out.

Gregor Hohpe, The Software Architect Elevator

Security architects work on the back-plane because that is where security has to work. Most of the time, the rest of the architecture community can keep the two meanings of Capability apart. Each profession does its own work, with its own vocabulary, and the working arrangement holds. From the back-plane, the arrangement looks slightly different. The two meanings are sitting in the same document, in every security standard worth using. The connection between them is not a problem to be solved. It is the subject matter.

Organising this is harder than naming it. The work is collective and slow. The field gets organised by many people writing carefully about what they can see clearly. This article is one small contribution to that work.

Image without description
  • Jacco Meijer
  • |
  • May 16, 2026

The human factor on the capability staircase

Can Amartya Sen's capability approach travel into Enterprise Architecture?

Sources cited

  • The Open Group. ArchiMate 3.2 Specification. 2023.
  • The Open Group. TOGAF Standard, 10th Edition. 2022.
  • Business Architecture Guild. A Guide to the Business Architecture Body of Knowledge (BIZBOK Guide), v14. 2025.
  • US Department of Defense. DoDAF 2.02 Architecture Framework. 2010.
  • ISACA. CMMI Model V3.0. April 2023.
  • Axelos. ITIL 4 Foundation. 2019.
  • ISACA. COBIT 2019 Framework. 2018.
  • National Institute of Standards and Technology. Cybersecurity Framework 2.0. February 2024.
  • International Organization for Standardization. ISO/IEC 27001:2022 Information Security Management Systems. 2022.
  • Gregor Hohpe. The Software Architect Elevator: Redefining the Architect's Role in the Digital Enterprise. O'Reilly, 2020.
  • The Open Group. Open Agile Architecture (O-AA) Standard. 2020.

Other posts

Image without description
  • Jacco Meijer
  • |
  • May 18, 2026

Reading the security architect three ways

CISSP, TOGAF, SABSA and what each one is for

Image without description
  • Jacco Meijer
  • |
  • May 16, 2026

The human factor on the capability staircase

Can Amartya Sen's capability approach travel into Enterprise Architecture?

Image without description
  • Jacco Meijer
  • |
  • Feb 2, 2026

Four architects and the limits of personality

Why legal, empirical and behavioural limits keep personality tools and role frameworks apart

Image without description
  • Jacco Meijer
  • |
  • Jan 5, 2026

Four architects and why we need all of them

What sounds like a casual observation is actually a structural truth: architecture isn’t about personalities, but about competing stances your organisation cannot afford to miss.

Image without description
  • Jacco Meijer
  • |
  • Oct 22, 2025

What cyber security mistakes do organizations still make?

A brief check on how the AI response for this question compares to real life experience.

Image without description
  • Jacco Meijer
  • |
  • Oct 19, 2025

Risk analysis for software development

By systematically identifying and assessing potential risks, teams can reduce uncertainty and prevent costly issues.

Image without description
  • Jacco Meijer
  • |
  • Oct 18, 2025

Security controls for software development

Exploring how security controls protect and improve every stage of the DevSecOps workflow.

Image without description
  • Jacco Meijer
  • |
  • Oct 17, 2025

Software development security

On risk assessments, security controls and the complexity of securing the Software Development Lifecycle (SDLC)

Image without description
  • Jacco Meijer
  • |
  • Oct 14, 2025

Canonical controls with Enterprise Risk and Security Management

How to use the SCF canonical control objectives with ERSM in Archimate

Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Image without description
  • Jacco Meijer
  • |
  • Aug 15, 2025

Asset security

Information asset identification and classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Aug 8, 2025

Data security

Data identification, data roles and data classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Jul 25, 2025

Threat modeling, security frameworks and Enterprise Architecture

Combining ISO 27001, NIST CSF and threat modeling with Enterprise Architecture strengthens all elements

Image without description
  • Jacco Meijer
  • |
  • Jul 18, 2025

Threat modeling as part of a risk framework

Threat modeling in the context of ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jul 11, 2025

Cyber security risk frameworks

Managing cyber security risk with ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jun 27, 2025

NIST CSF Tiers for cyber security risk governance and management

NIST CSF 2.0 contains useful tiers for Capability Maturity Modeling in Enterprise Architecture

Image without description
  • Jacco Meijer
  • |
  • Jun 20, 2025

Archimate risk assessment elements

A few simple specializations for working with risk assessments in Archimate

Image without description
  • Jacco Meijer
  • |
  • Jun 13, 2025

Security principles in Enterprise Architecture

Adding security principles to Enterprise Architecture for NIST CSF and ISO 27001

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

Image without description
  • Jacco Meijer
  • |
  • May 1, 2025

CISSP certification and Enterprise Architecture

How do the CISSP certification domains relate to Enterprise Architecture and the ArchiMate layers?

Image without description
  • Jacco Meijer
  • |
  • Apr 23, 2025

Architect roles in the ArchiMate context

An ArchiMate model that maps architect roles to the ArchiMate framework layers.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2025

Visualizing IT Architecture in three languages, UML, C4 and ArchiMate

What are the differences and what are these languages most used for?

Image without description
  • Jacco Meijer
  • |
  • Feb 18, 2025

OAuth 2.0 and OpenID Connect Sequence Diagrams

Technical specs can be hard to read. While still highly technical, the UML Sequence Diagrams provided in this blog are a lot easier to understand.

Image without description
  • Jacco Meijer
  • |
  • Jan 9, 2025

OWASP and CISSP

OWASP recommendations from the independent information security certification CISSP.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2024

UI Library with MDX documentation

Using the simple Render JSX plugin for Esbuild this post shows how to setup a simple UI library.

Image without description
  • Jacco Meijer
  • |
  • Mar 20, 2024

Render JSX plugin for Esbuild

Transform Esbuild generated JSX bundles to HTML pages.

Image without description
  • Jacco Meijer
  • |
  • Mar 19, 2024

Esbuild as a static site generator for MDX

Static site generators gain popularity. This blog is about using Esbuild as a static site generator for MDX.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2024

11ty and Github pages

Simplifying the Contentful-Gatsby-Netlfy trio.

Image without description
  • Jacco Meijer
  • |
  • Jun 30, 2022

NPM7 and @npmcli/arborist

@npmcli/arborist is a powerful library that handles the new NPM 7 workspaces. This blog is about a simple make tool that uses the library.

Image without description
  • Jacco Meijer
  • |
  • May 12, 2022

Comparing React app, Nextjs and Gatsby

A new React project starts with a React toolchain. Main tools in the chains are SSR, React server components and GraphQL.

Image without description
  • Jacco Meijer
  • |
  • May 10, 2022

Versioning strategy for NPM modules

It is important to be able to bump the version of a NPM package without side effects.

Image without description
  • Jacco Meijer
  • |
  • Apr 12, 2022

React component themes and CSS variables

Creating React components with flexible themes by using CSS variables.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2022

Content modeling with variants

The efficiency of a variant field in a content model.

Image without description
  • Jacco Meijer
  • |
  • Mar 12, 2022

Documentation

Documenting a software project is challenging. Here's a few simple guidelines that help a team writing clear documentation.

Image without description
  • Jacco Meijer
  • |
  • Mar 11, 2022

Javascript history

In 1986 David Ungar and Randall B. Smith developed Self at Xerox PARC. Inspired by Java, Scheme and Self Brendan Eich created Javascript in 1995.

Image without description
  • Jacco Meijer
  • |
  • Mar 10, 2022

On Javascript transpilers, bundlers and modules

There's Javascript transpilers, modules, bundles and bundlers. This is a brief overview of all of these.

Image without description
  • Jacco Meijer
  • |
  • Feb 11, 2022

Agile Scrum

The Agile Scrum framework is flexible enough to be used in many different ways. Here's one way of working.

Image without description
  • Jacco Meijer
  • |
  • Jan 20, 2022

What happened to Wheelroom?

Founded in 2018. Started to fly in 2020 and abandoned in 2021. What happened?

Image without description
  • Jacco Meijer
  • |
  • Jan 19, 2022

Contentful, Netlify and Gatsby four years later

What did we learn from using Contentful for four years?

Image without description
  • Jacco Meijer
  • |
  • Jan 18, 2022

Typescript interface for React UI components

How to define an interface for React UI components that prevents breaking changes.

Image without description
  • Jacco Meijer
  • |
  • Jan 17, 2022

Naming React components

What's in a name? A clear naming strategy helps developers communicate. Most devs rather spend time writing component code than wasting time on a good component name.