Image without description
  • Jacco Meijer
  • |
  • May 19, 2026

A security architect's map of capability

Seven SABSA viewpoints, translated for a TOGAF audience

Part of the series: Getting it organized properly. Notes from a field still finding its shape.

The view from one stack

The word capability shifts meaning depending on who is using it. Across disciplines this is well known. Inside a single architecture stack it is less obvious and easier to miss.

The SABSA framework organises an enterprise into five layered views, from the Business View at the Contextual Layer down to the Tradesman's View at the Component Layer (figure 2). A sixth view, the Service Manager's, sits vertically across the other five. Each view answers a different question. When a security architect uses the word capability in conversation with a TOGAF colleague, the question being asked depends on which view the conversation is in.

Image without description
Figure 1. SABSA layers and views

The Open Agile Architecture standard acknowledges a related confusion. Its Operations Architecture chapter notes that operations management uses the capability concept without a commonly agreed definition, and lists clearer terminology as one of its design goals. The same pattern shows up inside the SABSA stack.

This piece reads the SABSA views from a security architect's vantage and notes the question each one is asking when it uses the word capability. Seven viewpoints, seven questions, one word.

Seven viewpoints

Each SABSA view names a different concern about the enterprise. The Service Manager's view is structurally different from the other five. It holds no concern of its own and asks an operational question of each.

Figure 2 shows the TOGAF role for each SABSA layer. The Enterprise Architect does not map directly because it has a cross-cutting concern. It's work spans the stack as a whole.

Image without description
Figure 2. Left: SABSA layers, Right TOGAF roles

Each layer asks a recognisable question to the TOGAF role about capability. The table below pairs each SABSA layer with the TOGAF role and the question that the layer asks about capability.

The Service Management capability question is a capability question about another view's concern. The view asks whether each of the others is real.

SABSA LayerTOGAF RoleCapability QuestionNamed Capability
(cross-cutting)Enterprise ArchitectWhat are we structured to do?Structural Capability
ContextualArchitecture SponsorWhat can we achieve?Strategic Capability
ConceptualBusiness ArchitectWhat does our business do, and how is it organised to do it?Business Capability
LogicalApplication ArchitectWhat can this solution do as a whole?Solution Capability
PhysicalTechnology ArchitectWhat can we run, and on what?Platform Capability
ComponentIT DesignerWhat can this component do on its own?Component Capability
Service ManagementArchitecture Governance / Service OwnerWhat is demonstrably operating, and to what standard?Operational Capability

Read across, each row holds one viewpoint and the working vocabulary that goes with it. Read down the Named Capability column, the word capability takes seven shapes inside a single stack.

A closer look at one row

The Conceptual layer question is wider than the others, and the width is worth examining because the choice of phrasing changes what the row appears to cover.

One candidate phrasing is what value do we deliver, and to whom. That phrasing is recognisable. It draws on value stream work, service design, and the business model canvas. It is also narrower than what the row actually holds.

The Business Architect, in ADM Phase B, owns more than the value proposition. Phase B covers business strategy, governance, organisation, key business processes, capability mapping, value streams, and organisational structure. The SABSA Conceptual Layer is similarly broad. It is where the abstract model of the enterprise is expressed in business terms, before any solution shape is chosen. Asking only about value delivery answers part of the question and leaves the rest of the row unrepresented.

Widening the question to what does our business do, and how is it organised to do it matches the role and the layer. It is a design choice rather than a correction. Value delivery sits inside the wider frame.

The other rows do not need this treatment. Each names a concern at its own layer cleanly. The Conceptual layer is the one row where the question has a real width to it, and where the choice of phrasing changes what the row appears to cover.

What this gives the reader

The table is not a proposal. It is a working vocabulary that a security architect can carry into a meeting where the word capability is doing several jobs at once. The translation work is the point. The vocabulary is what makes the translation possible.

The questions matter more than the labels. A capability question identifies the view the speaker is standing in. Once the view is known, the rest of the row follows. The role becomes clear. The artefact becomes clear. The kind of evidence that would answer the question becomes clear.

The Named Capability column is the practical part. The seven labels can be reached for when precision is needed. A speaker who names one is identifying a different concern than a speaker who names another. Naming which shape is in use is a small habit that saves a larger conversation.

Organising this is harder than naming it. The work is collective and slow. The field gets organised by many people writing carefully about what they can see clearly. This article is one small contribution to that work.

Image without description
  • Jacco Meijer
  • |
  • May 11, 2026

Reading the security architect three ways

CISSP, TOGAF, SABSA and what each one is for

Sources cited

  • The SABSA Institute. SABSA White Paper (W101, 2009 revision).
  • The Open Group. TOGAF Standard, 10th Edition. Architecture Roles and Skills Series Guide. 2024.
  • The Open Group. TOGAF Series Guide: Business Capabilities.
  • The Open Group. Open Agile Architecture (O-AA) Standard. 2020.

Other posts

Image without description
  • Jacco Meijer
  • |
  • May 11, 2026

Reading the security architect three ways

CISSP, TOGAF, SABSA and what each one is for

Image without description
  • Jacco Meijer
  • |
  • Apr 13, 2026

The human factor on the capability staircase

Can Amartya Sen's capability approach travel into Enterprise Architecture?

Image without description
  • Jacco Meijer
  • |
  • Mar 16, 2026

Two Capabilities on the same back-plane

Security lives on the full back-plane of Enterprise Architecture and crosses the boundary of two perspectives of Capability

Image without description
  • Jacco Meijer
  • |
  • Feb 2, 2026

Four architects and the limits of personality

Why legal, empirical and behavioural limits keep personality tools and role frameworks apart

Image without description
  • Jacco Meijer
  • |
  • Jan 5, 2026

Four architects and why we need all of them

What sounds like a casual observation is actually a structural truth: architecture isn’t about personalities, but about competing stances your organisation cannot afford to miss.

Image without description
  • Jacco Meijer
  • |
  • Oct 22, 2025

What cyber security mistakes do organizations still make?

A brief check on how the AI response for this question compares to real life experience.

Image without description
  • Jacco Meijer
  • |
  • Oct 19, 2025

Risk analysis for software development

By systematically identifying and assessing potential risks, teams can reduce uncertainty and prevent costly issues.

Image without description
  • Jacco Meijer
  • |
  • Oct 18, 2025

Security controls for software development

Exploring how security controls protect and improve every stage of the DevSecOps workflow.

Image without description
  • Jacco Meijer
  • |
  • Oct 17, 2025

Software development security

On risk assessments, security controls and the complexity of securing the Software Development Lifecycle (SDLC)

Image without description
  • Jacco Meijer
  • |
  • Oct 14, 2025

Canonical controls with Enterprise Risk and Security Management

How to use the SCF canonical control objectives with ERSM in Archimate

Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Image without description
  • Jacco Meijer
  • |
  • Aug 15, 2025

Asset security

Information asset identification and classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Aug 8, 2025

Data security

Data identification, data roles and data classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Jul 25, 2025

Threat modeling, security frameworks and Enterprise Architecture

Combining ISO 27001, NIST CSF and threat modeling with Enterprise Architecture strengthens all elements

Image without description
  • Jacco Meijer
  • |
  • Jul 18, 2025

Threat modeling as part of a risk framework

Threat modeling in the context of ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jul 11, 2025

Cyber security risk frameworks

Managing cyber security risk with ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jun 27, 2025

NIST CSF Tiers for cyber security risk governance and management

NIST CSF 2.0 contains useful tiers for Capability Maturity Modeling in Enterprise Architecture

Image without description
  • Jacco Meijer
  • |
  • Jun 20, 2025

Archimate risk assessment elements

A few simple specializations for working with risk assessments in Archimate

Image without description
  • Jacco Meijer
  • |
  • Jun 13, 2025

Security principles in Enterprise Architecture

Adding security principles to Enterprise Architecture for NIST CSF and ISO 27001

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

Image without description
  • Jacco Meijer
  • |
  • May 1, 2025

CISSP certification and Enterprise Architecture

How do the CISSP certification domains relate to Enterprise Architecture and the ArchiMate layers?

Image without description
  • Jacco Meijer
  • |
  • Apr 23, 2025

Architect roles in the ArchiMate context

An ArchiMate model that maps architect roles to the ArchiMate framework layers.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2025

Visualizing IT Architecture in three languages, UML, C4 and ArchiMate

What are the differences and what are these languages most used for?

Image without description
  • Jacco Meijer
  • |
  • Feb 18, 2025

OAuth 2.0 and OpenID Connect Sequence Diagrams

Technical specs can be hard to read. While still highly technical, the UML Sequence Diagrams provided in this blog are a lot easier to understand.

Image without description
  • Jacco Meijer
  • |
  • Jan 9, 2025

OWASP and CISSP

OWASP recommendations from the independent information security certification CISSP.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2024

UI Library with MDX documentation

Using the simple Render JSX plugin for Esbuild this post shows how to setup a simple UI library.

Image without description
  • Jacco Meijer
  • |
  • Mar 20, 2024

Render JSX plugin for Esbuild

Transform Esbuild generated JSX bundles to HTML pages.

Image without description
  • Jacco Meijer
  • |
  • Mar 19, 2024

Esbuild as a static site generator for MDX

Static site generators gain popularity. This blog is about using Esbuild as a static site generator for MDX.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2024

11ty and Github pages

Simplifying the Contentful-Gatsby-Netlfy trio.

Image without description
  • Jacco Meijer
  • |
  • Jun 30, 2022

NPM7 and @npmcli/arborist

@npmcli/arborist is a powerful library that handles the new NPM 7 workspaces. This blog is about a simple make tool that uses the library.

Image without description
  • Jacco Meijer
  • |
  • May 12, 2022

Comparing React app, Nextjs and Gatsby

A new React project starts with a React toolchain. Main tools in the chains are SSR, React server components and GraphQL.

Image without description
  • Jacco Meijer
  • |
  • May 10, 2022

Versioning strategy for NPM modules

It is important to be able to bump the version of a NPM package without side effects.

Image without description
  • Jacco Meijer
  • |
  • Apr 12, 2022

React component themes and CSS variables

Creating React components with flexible themes by using CSS variables.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2022

Content modeling with variants

The efficiency of a variant field in a content model.

Image without description
  • Jacco Meijer
  • |
  • Mar 12, 2022

Documentation

Documenting a software project is challenging. Here's a few simple guidelines that help a team writing clear documentation.

Image without description
  • Jacco Meijer
  • |
  • Mar 11, 2022

Javascript history

In 1986 David Ungar and Randall B. Smith developed Self at Xerox PARC. Inspired by Java, Scheme and Self Brendan Eich created Javascript in 1995.

Image without description
  • Jacco Meijer
  • |
  • Mar 10, 2022

On Javascript transpilers, bundlers and modules

There's Javascript transpilers, modules, bundles and bundlers. This is a brief overview of all of these.

Image without description
  • Jacco Meijer
  • |
  • Feb 11, 2022

Agile Scrum

The Agile Scrum framework is flexible enough to be used in many different ways. Here's one way of working.

Image without description
  • Jacco Meijer
  • |
  • Jan 20, 2022

What happened to Wheelroom?

Founded in 2018. Started to fly in 2020 and abandoned in 2021. What happened?

Image without description
  • Jacco Meijer
  • |
  • Jan 19, 2022

Contentful, Netlify and Gatsby four years later

What did we learn from using Contentful for four years?

Image without description
  • Jacco Meijer
  • |
  • Jan 18, 2022

Typescript interface for React UI components

How to define an interface for React UI components that prevents breaking changes.

Image without description
  • Jacco Meijer
  • |
  • Jan 17, 2022

Naming React components

What's in a name? A clear naming strategy helps developers communicate. Most devs rather spend time writing component code than wasting time on a good component name.