-
Key: IEFRA2-124
-
Status: open
-
Source: Advanced Systems Management Group Ltd. ( Mr. Michael Abramson)
-
Summary:
"18.3.2 Placement of ""DCS Specifically Enforces Zero-Trust"" List
This list appears after the table but is not visually separated from the table. Potential Issues:
● Readers might mistakenly assume it is part of the table rather than a separate explanatory note.
● The list summarizes a key takeaway, so it should either:
○ Be moved above the table, introduced as an explanation before the details.
○ Be set off more clearly (e.g., in a ""Key Takeaway"" box or a bolded statement before the
table).
○ Remain where it is but be explicitly referenced in the table caption or introSuggest: I recommend it be moved above the table.with a transition sentence like:
""DCS enforces Zero-Trust principles by restricting access to data assets and communications at the most granular level. The table below outlines how IEF-RA aligns with Zero-Trust principles.""" -
Reported: IEF-RA 2.0a1 — Tue, 12 Aug 2025 12:53 GMT
-
Updated: Tue, 12 Aug 2025 12:56 GMT
IEFRA2 — Placement of ""DCS Specifically Enforces Zero-Trust"" List
- Key: IEFRA2-124
- OMG Task Force: IEF Reference Architecture 2.0 FTF