Back to Guides

EA Standards

Guideline for building EA standards: inventory of local and global standards, building a custom list, and compliance governance.

Introduction to EA standards

To ensure EA practice is applied optimally in entities, it is important to define a set of standards for each EA domain so that all technical solutions and processes comply with predefined standards, ensuring consistency in design and implementation and regulatory compliance. The scope of standards covers all six EA domains: business, beneficiary experience, data, applications, technology, and security. Target audience includes EA teams, engineers, project managers, and stakeholders.

Benefits of EA standards

EA standards help reduce technical complexity, lower costs, speed up decision-making, and keep information secure. They also make sure new solutions work with what you already have.

Technical solutions and processes comply with predefined standards; consistent design and implementation.

Compliance with regulatory requirements for each EA domain.

Consistency and alignment across components within each domain.

Integration and interoperability: unified interfaces, protocols, and formats improve integration between systems and applications.

Support for initiatives and technical solutions for business goals, regulatory compliance, and meeting entity, staff, and client needs.

Security standards help mitigate risks from data breaches, non-compliance, and system vulnerabilities.

Reduce duplication, complexity, operational and maintenance cost, and improve spending efficiency.

Improve EA governance and compliance verification through checklists and audits (booklets, technical offers, technical requirements, architecture designs).

Improve quality of digital products and services, user satisfaction, and secure, easy-to-use digital solutions.

Steps to build EA standards

1

Inventory and assess local and global standards

Conduct a full inventory and assessment of local and global standards, frameworks, and relevant best practices for each EA domain. At the end of this step, define a library of standards linked to one or more domains and the nature of compliance (mandatory or optional).
2

Stakeholder engagement

Engage key stakeholders (business owners, IT and cybersecurity teams, domain experts, end users) in reviewing the list for completeness. At the end of this step, stakeholders agree on adopted standards that meet business needs and address practical challenges.
3

Build a custom EA standards list

Derive a defined list of EA standards from the adopted reference standards/frameworks, documenting and coding them clearly with brief descriptions, and specifying requirements, guidance, and recommended practices per domain using unified templates or frameworks.
4

Continuous improvement

Continuous improvement with stakeholders through periodic review of the EA standards list and commitment to ongoing updates so it stays aligned with business requirements, national regulations, and technical change.

Governance of compliance with EA standards

Verify compliance against the EA standards list: measure technical project specifications against the approved lists for all domains (business, beneficiary experience, data, applications, technology, security). Compliance status: compliant, non-compliant, partially compliant, not applicable, unknown. The same approach applies to booklets, designs and architecture, technical requirements, and technical offers.

Expected outputs

Adopted local and global standards and their link to EA domains in the entity, with each standard marked mandatory or optional.

Approved EA standards list for all domains (business, beneficiary experience, data, applications, technology, security).

Sample compliance verification tables against the EA standards list.

Reference standards by EA domain

Business Architecture Standards

Standards for documenting business processes, capabilities, information models, organizational structures, and strategic objectives. Examples: BPMN, capability maturity models, business capability maps.

BPMN 2.0OMG

Business Process Model and Notation: graphical representation of business processes; common language for business and technical teams.

Business Capability ModelThe Open Group

Framework to organise and understand capabilities required to execute strategy; align business capabilities with strategic objectives.

Business Architecture Guild

International organisation for business architecture; unified framework and standards.

Event-driven Process Chain (EPC)Uni Saarland

Methodology for modelling, documenting, and improving business processes graphically.

Beneficiary Experience Standards

Standards for effective, accessible UI and smooth digital experience. Include WCAG, UI design patterns, responsive design, user-centred design, and DGA guides (accessibility, digital experience maturity, beneficiary-centric policy).

WCAGW3C

Web Content Accessibility Guidelines for people with disabilities; perceivable, operable, understandable, and technically sound (WCAG Robust principle).
Mandatory / National

DGA guide: Accessibility for government e-sitesDGA

Accessibility guidance per WCAG/W3C, verification tools, assistive tech; digital-by-default.

User Interface Design Patterns

Reusable solutions for common design problems; consistent, intuitive interfaces.
Mandatory / National

Digital experience maturity indexDGA

Definition, objectives, strategic alignment with DGA directions, perspectives, axes, assessment mechanisms, maturity levels.
Mandatory / National

Beneficiary-centric policyDGA

Support entities to ensure easy use of digital services, information provision, engagement, smooth experience, and trust.

Data Architecture Standards

Standards for data modelling, governance, quality, metadata, integration, and security. Include modelling techniques, classification and encoding (e.g. NCA DCC-1:2022), data lifecycle per DAMA, NDMO regulations.

DAMA-DMBoKDAMA

Full data management body of knowledge; common vocabulary, practices, and standards.
Mandatory / National

NDMO data governance and personal data protectionNDMO

National data governance framework; data management, governance, and personal data protection controls.
Mandatory / National

NCA DCC-1:2022NCA

Minimum cybersecurity requirements for data protection across the data lifecycle.

Application Architecture Standards

Standards for development, deployment, integration, and management: languages, frameworks, design patterns, API specs, deployment (microservices, SOA, serverless), APM.

CMMICMMI Institute

Framework for assessing and improving process maturity; quality, efficiency, software development, project management.

SAFeScaled Agile

Framework for scaling agile to the enterprise; coordination, unified processes, faster delivery.

ISO/IEC 9126ISO/IEC

International standard for software quality: functionality, performance, reliability, maintainability.

DevSecOps

Approach combining development, security, and operations; continuous security in dev and deployment.

SOAThe Open Group

Architectural approach for reusable services and system integration; flexibility and scalability.

W3C web standards

Web technology standards (HTML, CSS, XML); interoperability and growth.

Technology Architecture Standards

Standards for data centres, infrastructure, cloud, networks, emerging tech, IT services. Include ANSI/TIA-942, ISO/IEC 20000 (ITSM), hardware specs, cloud guidance, DGA cloud adoption guide.

ISO/IEC 20000ISO/IEC

International standard for IT Service Management (ITSM): plan, deliver, maintain to meet business objectives.

ANSI/TIA-942TIA

Data centre design and operations: physical structure, power, cooling, fire protection, physical and logistical security.

Uptime Institute Tier Standards

Global standard for data centre availability and performance; Tier I–IV levels and certification.

NIST SP 500-292NIST

Cloud computing reference architecture; components, offerings, vendor-neutral architecture.

ITILAXELOS

Best practices for efficient IT service delivery; align services with business needs.
Mandatory / National

DGA guide: Cloud adoption for governmentDGA

Guidance for government entities adopting cloud; secure, effective adoption aligned with national strategy.

Security Architecture Standards

Standards for protecting digital assets, cyber threats, regulatory compliance. Include NIST, ISO 27001, NCA controls (ECC, CSCC, CCC, TCC, OTCC, OSMACC, DCC), network/data/application security, identity and access.

ISO/IEC 27001ISO/IEC

International standard for Information Security Management Systems (ISMS); manage sensitive information.
Mandatory / National

NCA ECC-1:2018NCA

Essential Cybersecurity Controls: minimum requirements based on best practices to reduce cyber risk.
Mandatory / National

NCA CSCC-1:2019NCA

Cybersecurity requirements for critical systems; protect sensitive systems and unauthorised access.
Mandatory / National

NCA CCC-1:2020NCA

Cloud cybersecurity controls for providers and subscribers.
Mandatory / National

NCA TCC-1:2021NCA

Cybersecurity controls for remote work; secure remote operations.
Mandatory / National

NCA DCC-1:2022NCA

Cybersecurity controls for data; protection across the data lifecycle.
Mandatory / National

NCA OTCC-1:2022NCA

Cybersecurity controls for operational technology in critical industrial facilities.
Mandatory / National

NCA OSMACC-1:2021NCA

Cybersecurity controls for entity social media accounts; protect official accounts.

OWASP Top Ten

Top ten web application security risks; guidance on common vulnerabilities and security priorities.