{"id":1059,"date":"2012-08-09T06:59:49","date_gmt":"2012-08-09T06:59:49","guid":{"rendered":"http:\/\/www.cdicconference.com\/test\/?p=1059"},"modified":"2022-04-20T09:13:00","modified_gmt":"2022-04-20T09:13:00","slug":"isaca-is-cobit-5-%e0%b8%84%e0%b8%a7%e0%b8%b2%e0%b8%a1%e0%b8%a5%e0%b8%87%e0%b8%95%e0%b8%b1%e0%b8%a7%e0%b8%82%e0%b8%ad%e0%b8%87%e0%b8%81%e0%b8%b2%e0%b8%a3%e0%b8%a2%e0%b8%81%e0%b8%a3%e0%b8%b0%e0%b8%94","status":"publish","type":"post","link":"https:\/\/oldsite.acisonline.net\/?p=1059","title":{"rendered":"ISACA is COBIT 5: \u0e04\u0e27\u0e32\u0e21\u0e25\u0e07\u0e15\u0e31\u0e27\u0e02\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e22\u0e01\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e08\u0e32\u0e01 IT Governance \u0e40\u0e1b\u0e47\u0e19 Governance and Management of Enterprise IT \u0e21\u0e38\u0e48\u0e07\u0e2a\u0e39\u0e48 Integrated GRC"},"content":{"rendered":"<p><!--:en-->COBIT 5 Framework \u0e08\u0e32\u0e01 ISACA (\u0e02\u0e13\u0e30\u0e19\u0e35\u0e49\u0e40\u0e1b\u0e34\u0e14\u0e43\u0e2b\u0e49 download \u0e41\u0e25\u0e49\u0e27\u0e17\u0e35\u0e48<a href=\"http:\/\/www.isaca.org\/COBIT\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.isaca.org\/COBIT<\/a>\u00a0) \u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e22\u0e01\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e04\u0e23\u0e31\u0e49\u0e07\u0e43\u0e2b\u0e0d\u0e48\u0e08\u0e32\u0e01\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;<strong>IT Governance<\/strong>&#8221; \u0e21\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;<strong>Governance and Management of Enterprise IT<\/strong>&#8221; \u0e42\u0e14\u0e22\u0e44\u0e14\u0e49\u0e23\u0e31\u0e1a\u0e2d\u0e34\u0e17\u0e18\u0e34\u0e1e\u0e25\u0e21\u0e32\u0e08\u0e32\u0e01\u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19 ISO\/IEC 38500 &#8220;<strong>Corporate Governance of Information Technology<\/strong>&#8221; (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 1)<\/p>\n<div id=\"attachment_1061\" style=\"width: 448px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1061\" rel=\"attachment wp-att-1061\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1061\" class=\"size-full wp-image-1061 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 1 : ISO\/IEC 38500\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/211.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 1 : ISO\/IEC 38500\" width=\"438\" height=\"282\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/211.png 438w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/211-300x193.png 300w\" data-sizes=\"(max-width: 438px) 100vw, 438px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 438px; --smush-placeholder-aspect-ratio: 438\/282;\" \/><\/a><p id=\"caption-attachment-1061\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 1 : ISO\/IEC 38500<\/p><\/div>\n<p>\u0e41\u0e25\u0e30\u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e23\u0e27\u0e21 Framework \u0e41\u0e25\u0e30 Guidance \u0e17\u0e31\u0e49\u0e07 6 \u0e02\u0e2d\u0e07 ISACA \u0e41\u0e25\u0e30 IT Governance Institute \u0e21\u0e32\u0e40\u0e1b\u0e47\u0e19 Framework \u0e40\u0e14\u0e35\u0e22\u0e27 \u0e42\u0e14\u0e22\u0e43\u0e19 COBIT 5 Framework \u0e08\u0e30\u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e14\u0e49\u0e27\u0e22<\/p>\n<ol>\n<li>Board Briefing on IT Governance<\/li>\n<li>BMIS (The Business Model for Information Security)<\/li>\n<li>ITAF (The IT Assurance Framework)<\/li>\n<li>Risk IT Framework<\/li>\n<li>TGF (Taking Governance Forward)<\/li>\n<li>Val IT Framework<\/li>\n<\/ol>\n<p>\u0e41\u0e25\u0e30 COBIT 5 \u0e22\u0e31\u0e07\u0e16\u0e39\u0e01\u0e2d\u0e2d\u0e01\u0e41\u0e1a\u0e1a\u0e43\u0e2b\u0e49\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e40\u0e0a\u0e37\u0e48\u0e2d\u0e21\u0e42\u0e22\u0e07\u0e41\u0e25\u0e30\u0e2d\u0e49\u0e32\u0e07\u0e2d\u0e34\u0e07\u0e44\u0e1b\u0e22\u0e31\u0e07\u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19\u0e2d\u0e37\u0e48\u0e19\u0e46 \u0e40\u0e0a\u0e48\u0e19 \u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19 ISO \u0e41\u0e25\u0e30\u0e41\u0e19\u0e27\u0e1b\u0e0e\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e25\u0e34\u0e28 \u0e40\u0e0a\u0e48\u0e19 ITIL V3 \u0e2d\u0e35\u0e01\u0e14\u0e49\u0e27\u0e22 \u0e14\u0e39\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e44\u0e14\u0e49\u0e17\u0e35\u0e48 CobiT Mapping 3rd Edition (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 2) \u0e08\u0e30\u0e41\u0e2a\u0e14\u0e07\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e01\u0e32\u0e23\u0e17\u0e33 &#8220;<strong>Mapping<\/strong>&#8221; \u0e08\u0e32\u0e01 CobiT 4.1 \u0e44\u0e1b\u0e22\u0e31\u0e07 11 Standards and Best Practices \u0e23\u0e27\u0e21\u0e17\u0e31\u0e49\u0e07\u0e15\u0e31\u0e27 CobiT\u0e40\u0e2d\u0e07 (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 3)<\/p>\n<div id=\"attachment_1062\" style=\"width: 509px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1062\" rel=\"attachment wp-att-1062\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1062\" class=\"size-full wp-image-1062 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 2 : CobiT Mapping 3rd Edition\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/310.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 2 : CobiT Mapping 3rd Edition\" width=\"499\" height=\"332\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/310.png 499w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/310-300x200.png 300w\" data-sizes=\"(max-width: 499px) 100vw, 499px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 499px; --smush-placeholder-aspect-ratio: 499\/332;\" \/><\/a><p id=\"caption-attachment-1062\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 2 : CobiT Mapping 3rd Edition<\/p><\/div>\n<div id=\"attachment_1065\" style=\"width: 484px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1065\" rel=\"attachment wp-att-1065\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1065\" class=\"size-full wp-image-1065 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 3 : CobiT Mapping with 11 standards and best practices\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/49.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 3 : CobiT Mapping with 11 standards and best practices\" width=\"474\" height=\"188\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/49.png 474w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/49-300x119.png 300w\" data-sizes=\"(max-width: 474px) 100vw, 474px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 474px; --smush-placeholder-aspect-ratio: 474\/188;\" \/><\/a><p id=\"caption-attachment-1065\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 3 : CobiT Mapping with 11 standards and best practices<\/p><\/div>\n<p>COBIT 5 \u0e19\u0e31\u0e49\u0e19\u0e16\u0e39\u0e01\u0e40\u0e23\u0e35\u0e22\u0e01\u0e44\u0e14\u0e49\u0e27\u0e48\u0e32\u0e40\u0e1b\u0e47\u0e19 &#8220;<strong>Process Reference Model<\/strong>&#8221; \u0e17\u0e35\u0e48\u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e14\u0e49\u0e27\u0e22 2 Processes \u0e43\u0e2b\u0e0d\u0e48 \u0e04\u0e37\u0e2d &#8220;<strong>Governance Process<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>Management Process<\/strong>&#8221; (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 4)<\/p>\n<div id=\"attachment_1067\" style=\"width: 365px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1067\" rel=\"attachment wp-att-1067\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1067\" class=\"size-full wp-image-1067 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 4 : COBIT 5 Governance and Management Process\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/59.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 4 : COBIT 5 Governance and Management Process\" width=\"355\" height=\"371\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/59.png 355w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/59-287x300.png 287w\" data-sizes=\"(max-width: 355px) 100vw, 355px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 355px; --smush-placeholder-aspect-ratio: 355\/371;\" \/><\/a><p id=\"caption-attachment-1067\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 4 : COBIT 5 Governance and Management Process<\/p><\/div>\n<p>\u0e43\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07 &#8220;<strong>Governance Process<\/strong>&#8221; \u0e44\u0e14\u0e49\u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e21\u0e32\u0e08\u0e32\u0e01\u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19 ISO\/IEC 38500 \u0e41\u0e25\u0e30\u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07 &#8220;<strong>Management Process<\/strong>&#8221; \u0e21\u0e32\u0e08\u0e32\u0e01 CobiT 4.1 \u0e44\u0e14\u0e49\u0e41\u0e01\u0e48 Plan = Plan &amp;Organise , Build = Acquire &amp; Implement , Run = Deliver &amp; Support \u0e41\u0e25\u0e30 Monitor = Monitor &amp; Evaluate<br \/>\n<strong>\u0e04\u0e27\u0e32\u0e21\u0e41\u0e15\u0e01\u0e15\u0e48\u0e32\u0e07\u0e23\u0e30\u0e2b\u0e27\u0e48\u0e32\u0e07 <\/strong><strong>CobiT 4.1 <\/strong><strong>\u0e41\u0e25\u0e30 <\/strong><strong>COBIT 5<\/strong><br \/>\n\u0e43\u0e19 CobiT 4.1 \u0e19\u0e31\u0e49\u0e19\u0e41\u0e1a\u0e48\u0e07\u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23 (process) \u0e2d\u0e2d\u0e01\u0e40\u0e1b\u0e47\u0e19 34 \u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23 \u0e08\u0e32\u0e01\u0e17\u0e31\u0e49\u0e07\u0e2b\u0e21\u0e14 4 Domains \u0e44\u0e14\u0e49\u0e41\u0e01\u0e48 PO (Plan &amp;Organise) , AI (Acquire &amp; Implement) , DS (Deliver &amp; Support) \u0e41\u0e25\u0e30 ME (Monitor &amp; Evaluate)<br \/>\n\u0e41\u0e15\u0e48\u0e43\u0e19 COBIT 5 \u0e08\u0e30\u0e41\u0e1a\u0e48\u0e07\u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23\u0e2d\u0e2d\u0e01\u0e40\u0e1b\u0e47\u0e19 37 \u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23\u0e43\u0e19 5 Domains (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 5) \u0e44\u0e14\u0e49\u0e41\u0e01\u0e48<\/p>\n<ol>\n<li>Align, Plan and Organise (APO: 13 processes)<\/li>\n<li>Build, Acquire and Implement (BAI: 10 processes)<\/li>\n<li>Deliver, Service and Support (DSS: 6 processes)<\/li>\n<li>Monitor, valuate and Assess (MEA: 3 processes)<\/li>\n<li>Evaluate, Direct and Monitor (EDM: 5 processes)<\/li>\n<\/ol>\n<div id=\"attachment_1068\" style=\"width: 512px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1068\" rel=\"attachment wp-att-1068\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1068\" class=\"size-full wp-image-1068 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 5 : COBIT 5 Process Reference Model\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/69.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 5 : COBIT 5 Process Reference Model\" width=\"502\" height=\"370\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/69.png 502w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/69-300x221.png 300w\" data-sizes=\"(max-width: 502px) 100vw, 502px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 502px; --smush-placeholder-aspect-ratio: 502\/370;\" \/><\/a><p id=\"caption-attachment-1068\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 5 : COBIT 5 Process Reference Model<\/p><\/div>\n<p>\u0e41\u0e25\u0e30 COBIT 5 Framework \u0e22\u0e31\u0e07\u0e21\u0e35\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e31\u0e1a\u0e43\u0e2b\u0e0d\u0e48\u0e43\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07 &#8220;<strong>Process Capability<\/strong>&#8221; \u0e42\u0e14\u0e22\u0e40\u0e1b\u0e25\u0e35\u0e48\u0e22\u0e19\u0e08\u0e32\u0e01 &#8220;<strong>Maturity Model<\/strong>&#8221; \u0e02\u0e2d\u0e07 SEI \u0e21\u0e32\u0e40\u0e1b\u0e47\u0e19 &#8220;<strong>Capability Level<\/strong>&#8221; \u0e08\u0e32\u0e01\u0e21\u0e32\u0e15\u0e23\u0e10\u0e32\u0e19 ISO\/IEC 15504: &#8220;<strong>IT Process Assessment<\/strong>&#8221; (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 6)<\/p>\n<div id=\"attachment_1069\" style=\"width: 498px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1069\" rel=\"attachment wp-att-1069\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1069\" class=\"size-full wp-image-1069 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 6 : Process Capability Model Comparison\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/77.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 6 : Process Capability Model Comparison\" width=\"488\" height=\"326\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/77.png 488w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/77-300x200.png 300w\" data-sizes=\"(max-width: 488px) 100vw, 488px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 488px; --smush-placeholder-aspect-ratio: 488\/326;\" \/><\/a><p id=\"caption-attachment-1069\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 6 : Process Capability Model Comparison<\/p><\/div>\n<p>\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e31\u0e1a\u0e1b\u0e23\u0e38\u0e07\u0e08\u0e32\u0e01 CobiT 4.1 Framework \u0e40\u0e1b\u0e47\u0e19 COBIT 5 Framework \u0e42\u0e14\u0e22 ISACA \u0e19\u0e31\u0e49\u0e19 \u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e22\u0e01\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e04\u0e23\u0e31\u0e49\u0e07\u0e43\u0e2b\u0e0d\u0e48\u0e08\u0e32\u0e01\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;<strong>IT Governance<\/strong>&#8221; \u0e21\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;<strong>Governance and Management of Enterprise IT<\/strong>&#8221; \u0e42\u0e14\u0e22\u0e21\u0e38\u0e48\u0e07\u0e40\u0e19\u0e49\u0e19\u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07 &#8220;<strong>Value Delivery<\/strong>&#8221; \u0e2b\u0e23\u0e37\u0e2d &#8220;<strong>Create Value<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>Risk Management<\/strong>&#8221; \u0e2b\u0e23\u0e37\u0e2d &#8220;<strong>Preserve Value<\/strong>&#8221; (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 7)<\/p>\n<div id=\"attachment_1070\" style=\"width: 445px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1070\" rel=\"attachment wp-att-1070\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1070\" class=\"size-full wp-image-1070 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 7 : Value Delivery = Create Value, Risk Management = Preserve Value\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/88.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 7 : Value Delivery = Create Value, Risk Management = Preserve Value\" width=\"435\" height=\"335\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/88.png 435w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/88-300x231.png 300w\" data-sizes=\"(max-width: 435px) 100vw, 435px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 435px; --smush-placeholder-aspect-ratio: 435\/335;\" \/><\/a><p id=\"caption-attachment-1070\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 7 : Value Delivery = Create Value, Risk Management = Preserve Value<\/p><\/div>\n<p>\u0e41\u0e25\u0e30\u0e43\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07 COBIT 5 \u0e21\u0e35\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e31\u0e1a\u0e1b\u0e23\u0e38\u0e07 &#8220;<strong>Governance Objective<\/strong>&#8221; \u0e43\u0e2b\u0e49\u0e0a\u0e31\u0e14\u0e40\u0e08\u0e19\u0e02\u0e36\u0e49\u0e19\u0e43\u0e19 Concept \u0e02\u0e2d\u0e07 &#8220;<strong>Value Creation<\/strong>&#8221; \u0e2b\u0e23\u0e37\u0e2d &#8220;<strong>Stakeholder Value<\/strong>&#8221; \u0e0b\u0e36\u0e48\u0e07\u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e14\u0e49\u0e27\u0e22 3 \u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 8) \u0e44\u0e14\u0e49\u0e41\u0e01\u0e48<\/p>\n<ol>\n<li>Benefit Realization<\/li>\n<li>Resource Optimization<\/li>\n<li>Risk Optimization<\/li>\n<\/ol>\n<div id=\"attachment_1071\" style=\"width: 456px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1071\" rel=\"attachment wp-att-1071\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1071\" class=\"size-full wp-image-1071 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 8 : COBIT 5  Governance Objective\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/94.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 8 : COBIT 5  Governance Objective\" width=\"446\" height=\"178\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/94.png 446w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/94-300x120.png 300w\" data-sizes=\"(max-width: 446px) 100vw, 446px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 446px; --smush-placeholder-aspect-ratio: 446\/178;\" \/><\/a><p id=\"caption-attachment-1071\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 8 : COBIT 5 Governance Objective<\/p><\/div>\n<p>\u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 \u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e15\u0e49\u0e2d\u0e07\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e41\u0e2a\u0e14\u0e07\u0e43\u0e2b\u0e49\u0e40\u0e2b\u0e47\u0e19\u0e16\u0e36\u0e07 &#8220;<strong>\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e15\u0e48\u0e2d\u0e18\u0e38\u0e23\u0e01\u0e34\u0e08<\/strong>&#8221; (Business Benefits) \u0e17\u0e35\u0e48\u0e0a\u0e31\u0e14\u0e40\u0e08\u0e19 \u0e41\u0e25\u0e30\u0e43\u0e19\u0e02\u0e13\u0e30\u0e40\u0e14\u0e35\u0e22\u0e27\u0e01\u0e31\u0e19\u0e01\u0e47\u0e15\u0e49\u0e2d\u0e07\u0e21\u0e35\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e17\u0e23\u0e31\u0e1e\u0e22\u0e32\u0e01\u0e23\u0e2d\u0e22\u0e48\u0e32\u0e07\u0e21\u0e35\u0e1b\u0e23\u0e30\u0e2a\u0e34\u0e17\u0e18\u0e34\u0e20\u0e32\u0e1e \u0e41\u0e25\u0e30\u0e21\u0e35\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e04\u0e27\u0e32\u0e21\u0e40\u0e2a\u0e35\u0e48\u0e22\u0e07\u0e17\u0e35\u0e48\u0e2d\u0e22\u0e39\u0e48\u0e43\u0e19\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e17\u0e35\u0e48\u0e22\u0e2d\u0e21\u0e23\u0e31\u0e1a\u0e44\u0e14\u0e49\u0e42\u0e14\u0e22\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07\u0e15\u0e49\u0e2d\u0e07\u0e23\u0e31\u0e1a\u0e1c\u0e34\u0e14\u0e0a\u0e2d\u0e1a\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07 Risk Appetite \u0e41\u0e25\u0e30 Risk Tolerance \u0e0b\u0e36\u0e48\u0e07\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e14\u0e49\u0e27\u0e22\u0e1c\u0e39\u0e49\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e02\u0e49\u0e2d\u0e07\u0e08\u0e32\u0e01\u0e2b\u0e25\u0e32\u0e22\u0e1d\u0e48\u0e32\u0e22 \u0e14\u0e31\u0e07\u0e19\u0e31\u0e49\u0e19 \u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e02\u0e2d\u0e07 &#8220;<strong>Governance Objective<\/strong>&#8221; \u0e40\u0e1b\u0e47\u0e19\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e02\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e2a\u0e21\u0e14\u0e38\u0e25\u0e02\u0e2d\u0e07\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e43\u0e19\u0e41\u0e15\u0e48\u0e25\u0e30\u0e1d\u0e48\u0e32\u0e22\u0e43\u0e2b\u0e49\u0e25\u0e07\u0e15\u0e31\u0e27 \u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e40\u0e01\u0e34\u0e14\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e2a\u0e39\u0e07\u0e2a\u0e38\u0e14\u0e43\u0e19\u0e20\u0e32\u0e1e\u0e23\u0e27\u0e21\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e42\u0e14\u0e22\u0e01\u0e48\u0e2d\u0e19\u0e08\u0e30\u0e21\u0e32\u0e16\u0e36\u0e07 &#8220;<strong>Governance Objective<\/strong>&#8221; \u0e19\u0e31\u0e49\u0e19\u0e15\u0e49\u0e2d\u0e07\u0e21\u0e32\u0e08\u0e32\u0e01 &#8220;<strong>Stakeholder Needs<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>Drivers<\/strong>&#8221; \u0e40\u0e2a\u0e35\u0e22\u0e01\u0e48\u0e2d\u0e19 (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 9)<\/p>\n<div id=\"attachment_1072\" style=\"width: 437px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1072\" rel=\"attachment wp-att-1072\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1072\" class=\"size-full wp-image-1072 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 9 : From Drivers and Stakeholder Needs to Governance Objective\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/104.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 9 : From Drivers and Stakeholder Needs to Governance Objective\" width=\"427\" height=\"478\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/104.png 427w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/104-268x300.png 268w\" data-sizes=\"(max-width: 427px) 100vw, 427px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 427px; --smush-placeholder-aspect-ratio: 427\/478;\" \/><\/a><p id=\"caption-attachment-1072\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 9 : From Drivers and Stakeholder Needs to Governance Objective<\/p><\/div>\n<p>\u0e08\u0e32\u0e01 &#8220;<strong>Governance Objectives<\/strong>&#8221; \u0e01\u0e47\u0e08\u0e30 Mapping \u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48 17 &#8220;<strong>Enterprise Goals<\/strong>&#8221; \u0e41\u0e25\u0e30 17 &#8220;<strong>Information and Related Technology Goals<\/strong>&#8221; \u0e15\u0e32\u0e21\u0e25\u0e33\u0e14\u0e31\u0e1a \u0e14\u0e31\u0e07\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 10, 11, 12 \u0e41\u0e25\u0e30\u0e15\u0e48\u0e2d\u0e40\u0e19\u0e37\u0e48\u0e2d\u0e07\u0e44\u0e1b\u0e22\u0e31\u0e07 &#8220;<strong>Enabler Goals<\/strong>&#8221; \u0e17\u0e31\u0e49\u0e07 7 \u0e14\u0e31\u0e07\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 13<\/p>\n<div id=\"attachment_1073\" style=\"width: 374px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1073\" rel=\"attachment wp-att-1073\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1073\" class=\"size-full wp-image-1073 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 10 : From Governance Objectives to Enabler Goals\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/117.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 10 : From Governance Objectives to Enabler Goals\" width=\"364\" height=\"416\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/117.png 364w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/117-263x300.png 263w\" data-sizes=\"(max-width: 364px) 100vw, 364px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 364px; --smush-placeholder-aspect-ratio: 364\/416;\" \/><\/a><p id=\"caption-attachment-1073\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 10 : From Governance Objectives to Enabler Goals<\/p><\/div>\n<div id=\"attachment_1074\" style=\"width: 486px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1074\" rel=\"attachment wp-att-1074\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1074\" class=\"size-full wp-image-1074 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 11 : 17 Enterprise Goals mapped to Governance Objectives\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/124.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 11 : 17 Enterprise Goals mapped to Governance Objectives\" width=\"476\" height=\"342\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/124.png 476w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/124-300x216.png 300w\" data-sizes=\"(max-width: 476px) 100vw, 476px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 476px; --smush-placeholder-aspect-ratio: 476\/342;\" \/><\/a><p id=\"caption-attachment-1074\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 11 : 17 Enterprise Goals mapped to Governance Objectives<\/p><\/div>\n<div id=\"attachment_1075\" style=\"width: 513px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1075\" rel=\"attachment wp-att-1075\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1075\" class=\"size-full wp-image-1075 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 12 : 17 Information and Related Technology Goals\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/134.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 12 : 17 Information and Related Technology Goals\" width=\"503\" height=\"315\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/134.png 503w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/134-300x188.png 300w\" data-sizes=\"(max-width: 503px) 100vw, 503px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 503px; --smush-placeholder-aspect-ratio: 503\/315;\" \/><\/a><p id=\"caption-attachment-1075\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 12 : 17 Information and Related Technology Goals<\/p><\/div>\n<div id=\"attachment_1076\" style=\"width: 442px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1076\" rel=\"attachment wp-att-1076\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1076\" class=\"size-full wp-image-1076 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 13 : COBIT 5 Enabler Goals\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/145.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 13 : COBIT 5 Enabler Goals\" width=\"432\" height=\"353\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/145.png 432w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/145-300x245.png 300w\" data-sizes=\"(max-width: 432px) 100vw, 432px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 432px; --smush-placeholder-aspect-ratio: 432\/353;\" \/><\/a><p id=\"caption-attachment-1076\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 13 : COBIT 5 Enabler Goals<\/p><\/div>\n<p>\u0e0b\u0e36\u0e48\u0e07\u0e43\u0e19 COBIT 4.1 Framework, Appendix I &#8220;<strong>Enterprise Goals<\/strong>&#8221; \u0e16\u0e39\u0e01\u0e40\u0e23\u0e35\u0e22\u0e01\u0e27\u0e48\u0e32 &#8220;<strong>Business Goal<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>IT Related Goals<\/strong>&#8221; \u0e16\u0e39\u0e01\u0e40\u0e23\u0e35\u0e22\u0e01\u0e27\u0e48\u0e32 &#8220;<strong>IT Goals<\/strong>&#8221; \u0e43\u0e19 COBIT 5 Framework \u0e21\u0e35\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e31\u0e1a\u0e40\u0e1b\u0e47\u0e19 17 Business Goals \u0e0b\u0e36\u0e48\u0e07 MAP \u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48 Balanced Scorecard \u0e40\u0e1b\u0e47\u0e19 &#8220;<strong>Enterprise Goal<\/strong>&#8221; \u0e41\u0e25\u0e30\u0e1b\u0e23\u0e31\u0e1a 28 IT Goal MAP \u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48 Balanced Scorecard \u0e40\u0e1b\u0e47\u0e19 17 IT Related Goal<br \/>\n\u0e19\u0e2d\u0e01\u0e08\u0e32\u0e01\u0e19\u0e35\u0e49\u0e22\u0e31\u0e07\u0e40\u0e1e\u0e34\u0e48\u0e21\u0e40\u0e15\u0e34\u0e21\u0e01\u0e32\u0e23 MAP \u0e15\u0e31\u0e27 17 Enterprise Goal \u0e41\u0e25\u0e30 17 IT Related Goal \u0e40\u0e02\u0e49\u0e32\u0e14\u0e49\u0e27\u0e22\u0e01\u0e31\u0e19 \u0e14\u0e31\u0e07\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 14<\/p>\n<div id=\"attachment_1077\" style=\"width: 517px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1077\" rel=\"attachment wp-att-1077\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1077\" class=\"size-full wp-image-1077 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 14 : 17 Enterprise Goal Mapped to 17 IT Related Goal\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/151.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 14 : 17 Enterprise Goal Mapped to 17 IT Related Goal\" width=\"507\" height=\"357\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/151.png 507w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/151-300x211.png 300w\" data-sizes=\"(max-width: 507px) 100vw, 507px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 507px; --smush-placeholder-aspect-ratio: 507\/357;\" \/><\/a><p id=\"caption-attachment-1077\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 14 : 17 Enterprise Goal Mapped to 17 IT Related Goal<\/p><\/div>\n<p>\u0e41\u0e25\u0e30 MAP &#8220;<strong>17 IT Related Goals<\/strong>&#8221; \u0e44\u0e1b\u0e22\u0e31\u0e07 &#8220;<strong>COBIT 5 Processes<\/strong>&#8221; \u0e14\u0e31\u0e07\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 15<\/p>\n<div id=\"attachment_1078\" style=\"width: 502px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1078\" rel=\"attachment wp-att-1078\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1078\" class=\"size-full wp-image-1078 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 15 : 17 IT Related Goal mapped to COBIT 5 Processes\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/161.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 15 : 17 IT Related Goal mapped to COBIT 5 Processes\" width=\"492\" height=\"344\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/161.png 492w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/161-300x210.png 300w\" data-sizes=\"(max-width: 492px) 100vw, 492px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 492px; --smush-placeholder-aspect-ratio: 492\/344;\" \/><\/a><p id=\"caption-attachment-1078\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 15 : 17 IT Related Goal mapped to COBIT 5 Processes<\/p><\/div>\n<p>\u0e2b\u0e31\u0e27\u0e43\u0e08\u0e02\u0e2d\u0e07 &#8220;<strong>IT Governance Focus Area<\/strong>&#8221; \u0e17\u0e31\u0e49\u0e07 5 (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 16) \u0e44\u0e14\u0e49\u0e16\u0e39\u0e01\u0e22\u0e01\u0e40\u0e25\u0e34\u0e01\u0e43\u0e19 COBIT 5 \u0e41\u0e15\u0e48\u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e08\u0e30\u0e16\u0e39\u0e01\u0e1b\u0e23\u0e31\u0e1a\u0e43\u0e2b\u0e49\u0e40\u0e1b\u0e47\u0e19\u0e44\u0e1b\u0e15\u0e32\u0e21 &#8220;<strong>Governance Processes<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>Management Processes<\/strong>&#8221; \u0e02\u0e2d\u0e07\u0e15\u0e31\u0e27 COBIT 5 \u0e40\u0e2d\u0e07<\/p>\n<div id=\"attachment_1079\" style=\"width: 365px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1079\" rel=\"attachment wp-att-1079\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1079\" class=\"size-full wp-image-1079 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 16 : IT Governance 5 Focus Areas had been removed from COBIT 5\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/171.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 16 : IT Governance 5 Focus Areas had been removed from COBIT 5\" width=\"355\" height=\"316\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/171.png 355w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/171-300x267.png 300w\" data-sizes=\"(max-width: 355px) 100vw, 355px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 355px; --smush-placeholder-aspect-ratio: 355\/316;\" \/><\/a><p id=\"caption-attachment-1079\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 16 : IT Governance 5 Focus Areas had been removed from COBIT 5<\/p><\/div>\n<p><strong>COBIT 5 : &#8220;7 Enablers&#8221;<\/strong><br \/>\n\u0e43\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07 &#8220;<strong>Enablers<\/strong>&#8221; \u0e17\u0e31\u0e49\u0e07 7 (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 13) \u0e21\u0e35\u0e23\u0e32\u0e22\u0e25\u0e30\u0e40\u0e2d\u0e35\u0e22\u0e14\u0e14\u0e31\u0e07\u0e19\u0e35\u0e49<\/p>\n<ol>\n<li>&#8220;<strong>Process<\/strong>&#8221; \u0e40\u0e19\u0e49\u0e19\u0e44\u0e1b\u0e17\u0e35\u0e48\u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23\u0e17\u0e35\u0e48\u0e40\u0e1b\u0e47\u0e19\u0e23\u0e30\u0e1a\u0e1a\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e23\u0e25\u0e38\u0e27\u0e31\u0e15\u0e16\u0e38\u0e1b\u0e23\u0e30\u0e2a\u0e07\u0e04\u0e4c\u0e17\u0e35\u0e48 MAP process \u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48 &#8220;<strong>IT Related Goals<\/strong>&#8220;<\/li>\n<li><strong>Culture, Ethics, Behaviors<\/strong>\u00a0\u0e40\u0e19\u0e49\u0e19\u0e44\u0e1b\u0e17\u0e35\u0e48\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23 \u0e41\u0e25\u0e30\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e43\u0e19\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e02\u0e2d\u0e07\u0e27\u0e31\u0e12\u0e19\u0e18\u0e23\u0e23\u0e21\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e17\u0e31\u0e28\u0e19\u0e04\u0e15\u0e34\u0e02\u0e2d\u0e07\u0e1e\u0e19\u0e31\u0e01\u0e07\u0e32\u0e19 \u0e41\u0e25\u0e30\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07<\/li>\n<li>&#8220;<strong>Organizational Structure<\/strong>&#8221; \u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 \u0e2a\u0e48\u0e27\u0e19\u0e02\u0e2d\u0e07\u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e43\u0e19\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23\u0e01\u0e47\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e17\u0e35\u0e48\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07 (C-level) \u0e23\u0e27\u0e21\u0e16\u0e36\u0e07 Board of Director \u0e15\u0e49\u0e2d\u0e07\u0e43\u0e2a\u0e48\u0e43\u0e08\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07 IT Governance \u0e41\u0e25\u0e30 Enterprise Governance<\/li>\n<li>&#8220;<strong>Information<\/strong>&#8221; \u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 &#8220;<strong>\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28<\/strong>&#8221; \u0e2b\u0e23\u0e37\u0e2d &#8220;<strong>\u0e02\u0e49\u0e2d\u0e21\u0e39\u0e25<\/strong>&#8221; \u0e17\u0e35\u0e48\u0e40\u0e23\u0e32\u0e15\u0e49\u0e2d\u0e07\u0e08\u0e31\u0e14\u0e40\u0e01\u0e47\u0e1a\u0e14\u0e39\u0e41\u0e25\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e19\u0e33\u0e21\u0e32\u0e43\u0e0a\u0e49\u0e1b\u0e23\u0e30\u0e42\u0e22\u0e0a\u0e19\u0e4c\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23<\/li>\n<li>&#8220;<strong>Principles and Policies<\/strong>&#8221; \u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 \u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e2b\u0e25\u0e31\u0e01 \u0e41\u0e25\u0e30\u0e19\u0e42\u0e22\u0e1a\u0e32\u0e22\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e40\u0e1b\u0e47\u0e19\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e21\u0e37\u0e2d\u0e17\u0e35\u0e48\u0e16\u0e39\u0e01\u0e19\u0e33\u0e21\u0e32\u0e43\u0e0a\u0e49\u0e04\u0e27\u0e1a\u0e04\u0e38\u0e21\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e43\u0e19\u0e20\u0e32\u0e1e\u0e23\u0e27\u0e21 \u0e0b\u0e36\u0e48\u0e07\u0e40\u0e1b\u0e47\u0e19\u0e2b\u0e19\u0e49\u0e32\u0e17\u0e35\u0e48\u0e02\u0e2d\u0e07\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e19\u0e42\u0e22\u0e1a\u0e32\u0e22\u0e43\u0e2b\u0e49\u0e0a\u0e31\u0e14\u0e40\u0e08\u0e19<\/li>\n<li>&#8220;<strong>Skills and Competencies<\/strong>&#8221; \u0e21\u0e38\u0e48\u0e07\u0e40\u0e19\u0e49\u0e19\u0e44\u0e1b\u0e17\u0e35\u0e48\u0e2a\u0e21\u0e23\u0e23\u0e16\u0e19\u0e30\u0e02\u0e2d\u0e07\u0e1a\u0e38\u0e04\u0e25\u0e32\u0e01\u0e23\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23 \u0e2b\u0e32\u0e01\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e21\u0e35\u0e1e\u0e19\u0e31\u0e01\u0e07\u0e32\u0e19\u0e17\u0e35\u0e48\u0e21\u0e35\u0e04\u0e38\u0e13\u0e20\u0e32\u0e1e\u0e01\u0e47\u0e08\u0e30\u0e0a\u0e48\u0e27\u0e22\u0e40\u0e2a\u0e23\u0e34\u0e21\u0e43\u0e2b\u0e49\u0e1a\u0e23\u0e23\u0e25\u0e38\u0e40\u0e1b\u0e49\u0e32\u0e2b\u0e21\u0e32\u0e22\u0e43\u0e19\u0e20\u0e32\u0e1e\u0e23\u0e27\u0e21\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e44\u0e14\u0e49\u0e07\u0e48\u0e32\u0e22\u0e22\u0e34\u0e48\u0e07\u0e02\u0e36\u0e49\u0e19 \u0e21\u0e38\u0e48\u0e07\u0e40\u0e19\u0e49\u0e19\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07 &#8220;<strong>Soft Skills<\/strong>&#8220;<\/li>\n<li>&#8220;<strong>Service Capabilities<\/strong>&#8221; \u0e2b\u0e21\u0e32\u0e22\u0e16\u0e36\u0e07 \u0e42\u0e04\u0e23\u0e07\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e1e\u0e37\u0e49\u0e19\u0e10\u0e32\u0e19 (Infrastructure), \u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35 (Technology) \u0e41\u0e25\u0e30\u0e42\u0e1b\u0e23\u0e41\u0e01\u0e23\u0e21\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c (Applications) \u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e01\u0e31\u0e19\u0e40\u0e1b\u0e47\u0e19\u0e23\u0e30\u0e1a\u0e1a\u0e2a\u0e32\u0e23\u0e2a\u0e19\u0e40\u0e17\u0e28 (Information System) \u0e17\u0e35\u0e48\u0e16\u0e39\u0e01\u0e19\u0e33\u0e21\u0e32\u0e43\u0e0a\u0e49\u0e43\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e19\u0e31\u0e1a\u0e2a\u0e19\u0e38\u0e19\u0e01\u0e32\u0e23\u0e1b\u0e0e\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e07\u0e32\u0e19\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e1b\u0e23\u0e30\u0e01\u0e2d\u0e1a\u0e18\u0e38\u0e23\u0e01\u0e34\u0e08\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e0b\u0e36\u0e48\u0e07 &#8220;<strong>IT<\/strong>&#8221; \u0e40\u0e1b\u0e47\u0e19\u0e2b\u0e31\u0e27\u0e43\u0e08\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e43\u0e19\u0e01\u0e32\u0e23\u0e02\u0e31\u0e1a\u0e40\u0e04\u0e25\u0e37\u0e48\u0e2d\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e27\u0e31\u0e19\u0e19\u0e35\u0e49\u0e41\u0e25\u0e30\u0e43\u0e19\u0e2d\u0e19\u0e32\u0e04\u0e15<\/li>\n<\/ol>\n<p>\u0e01\u0e25\u0e48\u0e32\u0e27\u0e42\u0e14\u0e22\u0e2a\u0e23\u0e38\u0e1b COBIT 5 Framework \u0e44\u0e14\u0e49\u0e43\u0e2b\u0e49\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e01\u0e31\u0e1a 7 Enablers \u0e43\u0e19\u0e20\u0e32\u0e1e\u0e43\u0e2b\u0e0d\u0e48\u0e40\u0e1e\u0e35\u0e22\u0e07\u0e20\u0e32\u0e1e\u0e40\u0e14\u0e35\u0e22\u0e27 \u0e17\u0e33\u0e43\u0e2b\u0e49\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e2a\u0e32\u0e21\u0e32\u0e23\u0e16\u0e21\u0e2d\u0e07\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e23\u0e27\u0e21 (Holistic Approach) \u0e41\u0e1a\u0e1a 360 \u0e2d\u0e07\u0e28\u0e32\u0e44\u0e14\u0e49\u0e0a\u0e31\u0e14\u0e40\u0e08\u0e19\u0e22\u0e34\u0e48\u0e07\u0e02\u0e36\u0e49\u0e19 \u0e42\u0e14\u0e22\u0e44\u0e21\u0e48\u0e15\u0e01\u0e2b\u0e25\u0e48\u0e19 \u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07\u0e1a\u0e32\u0e07\u0e14\u0e49\u0e32\u0e19\u0e17\u0e35\u0e48\u0e21\u0e35\u0e04\u0e27\u0e32\u0e21\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e44\u0e1b \u0e42\u0e14\u0e22\u0e40\u0e09\u0e1e\u0e32\u0e30\u0e40\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23 &#8220;<strong>\u0e04\u0e19 (<\/strong><strong>people)<\/strong>&#8221; \u0e0b\u0e36\u0e48\u0e07\u0e43\u0e19 COBIT 4.1 \u0e40\u0e19\u0e49\u0e19\u0e44\u0e1b\u0e17\u0e35\u0e48\u0e01\u0e32\u0e23\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e08\u0e31\u0e14\u0e01\u0e32\u0e23 &#8220;<strong>\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>\u0e01\u0e23\u0e30\u0e1a\u0e27\u0e19\u0e01\u0e32\u0e23<\/strong>&#8221; \u0e40\u0e1b\u0e47\u0e19\u0e2a\u0e48\u0e27\u0e19\u0e43\u0e2b\u0e0d\u0e48 \u0e41\u0e15\u0e48\u0e43\u0e19 COBIT 5 \u0e08\u0e30\u0e40\u0e19\u0e49\u0e19\u0e17\u0e35\u0e48 &#8220;<strong>\u0e04\u0e19<\/strong>&#8221; \u0e41\u0e25\u0e30 &#8220;<strong>\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23<\/strong>&#8221; (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 17) \u0e15\u0e32\u0e21 Concept \u0e02\u0e2d\u0e07 BMIS<\/p>\n<div id=\"attachment_1082\" style=\"width: 488px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1082\" rel=\"attachment wp-att-1082\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1082\" class=\"size-full wp-image-1082 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 17 : Business Model for Information Security (BMIS)\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/183.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 17 : Business Model for Information Security (BMIS)\" width=\"478\" height=\"343\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/183.png 478w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/183-300x215.png 300w\" data-sizes=\"(max-width: 478px) 100vw, 478px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 478px; --smush-placeholder-aspect-ratio: 478\/343;\" \/><\/a><p id=\"caption-attachment-1082\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 17 : Business Model for Information Security (BMIS)<\/p><\/div>\n<div id=\"attachment_1083\" style=\"width: 354px\" class=\"wp-caption aligncenter\"><a href=\"\/\/www.acisonline.net\/?attachment_id=1083\" rel=\"attachment wp-att-1083\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1083\" class=\"size-full wp-image-1083 lazyload\" title=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 18 : COBIT 5 Principles\" data-src=\"\/\/www.acisonline.net\/wp-content\/uploads\/2013\/08\/191.png\" alt=\"\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 18 : COBIT 5 Principles\" width=\"344\" height=\"361\" data-srcset=\"https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/191.png 344w, https:\/\/oldsite.acisonline.net\/wp-content\/uploads\/2013\/08\/191-286x300.png 286w\" data-sizes=\"(max-width: 344px) 100vw, 344px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 344px; --smush-placeholder-aspect-ratio: 344\/361;\" \/><\/a><p id=\"caption-attachment-1083\" class=\"wp-caption-text\">\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 18 : COBIT 5 Principles<\/p><\/div>\n<p>\u0e14\u0e31\u0e07\u0e19\u0e31\u0e49\u0e19\u0e1c\u0e39\u0e49\u0e1a\u0e23\u0e34\u0e2b\u0e32\u0e23\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e2a\u0e39\u0e07\u0e02\u0e2d\u0e07\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e08\u0e36\u0e07\u0e04\u0e27\u0e23\u0e19\u0e33 COBIT 5 \u0e21\u0e32\u0e27\u0e34\u0e40\u0e04\u0e23\u0e32\u0e30\u0e2b\u0e4c \u0e41\u0e25\u0e30\u0e40\u0e08\u0e32\u0e30\u0e25\u0e36\u0e01\u0e43\u0e19\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07\u0e02\u0e2d\u0e07\u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e40\u0e0a\u0e34\u0e07\u0e1b\u0e23\u0e31\u0e0a\u0e0d\u0e32\u0e08\u0e32\u0e01 COBIT 5 Principles (\u0e14\u0e39\u0e23\u0e39\u0e1b\u0e17\u0e35\u0e48 18) \u0e41\u0e25\u0e30 \u0e19\u0e33\u0e41\u0e19\u0e27\u0e04\u0e34\u0e14\u0e02\u0e2d\u0e07 COBIT 5 Framework \u0e21\u0e32\u0e1b\u0e23\u0e30\u0e22\u0e38\u0e01\u0e15\u0e4c\u0e43\u0e0a\u0e49\u0e43\u0e19\u0e2d\u0e07\u0e04\u0e4c\u0e01\u0e23\u0e15\u0e48\u0e2d\u0e44\u0e1b\u0e43\u0e19\u0e2d\u0e19\u0e32\u0e04\u0e15\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e2a\u0e2d\u0e14\u0e04\u0e25\u0e49\u0e2d\u0e07\u0e01\u0e31\u0e1a\u0e22\u0e38\u0e04 &#8220;<strong>Integrated GRC<\/strong>&#8220;<!--:--><!--:th--><!--:--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>COBIT 5 Framework \u0e08\u0e32\u0e01 ISACA \u0e40\u0e1b\u0e47\u0e19\u0e01\u0e32\u0e23\u0e22\u0e01\u0e40\u0e04\u0e23\u0e37\u0e48\u0e2d\u0e07\u0e04\u0e23\u0e31\u0e49\u0e07\u0e43\u0e2b\u0e0d\u0e48\u0e08\u0e32\u0e01\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;IT Governance&#8221; \u0e21\u0e32\u0e40\u0e1b\u0e47\u0e19\u0e21\u0e38\u0e21\u0e21\u0e2d\u0e07 &#8220;Governance and Management of Enterprise IT&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,151],"tags":[668,76,484],"table_tags":[],"class_list":["post-1059","post","type-post","status-publish","format-standard","hentry","category-acis-articles","category-cybersecurity","tag-cobit-5","tag-grc","tag-it-governance"],"_links":{"self":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/1059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1059"}],"version-history":[{"count":1,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/1059\/revisions"}],"predecessor-version":[{"id":9252,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=\/wp\/v2\/posts\/1059\/revisions\/9252"}],"wp:attachment":[{"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1059"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/oldsite.acisonline.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftable_tags&post=1059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}