Definition

COBIT 5

Contributor(s): Aislyn Fredsall

COBIT 5 is a framework from the Information Systems Audit and Control Association (ISACA) for the management and governance of information technology (IT)

The goal of the COBIT frameworks is to provide a common language for business executives to communicate with each other about IT-related goals, objectives and results. COBIT is also designed to help enterprises to:

  • Assure information is accurate to support business decisions
  • Achieve strategic goals by using IT assistance
  • Maintain operational excellence by using technology effectively
  • Keep IT-related risk at an acceptable level
  • Optimize IT services and technology costs
  • Maintain compliance with relevant laws and regulations

The COBIT frameworks have become an industry standard for IT management and governance. COBIT was initially an acronym for "Control Objectives for Information and Related Technology," but with COBIT 5 the spelled-out version was dropped. The changes between COBIT 4.1 and COBIT 5 include more emphasis on creating business value. The COBIT 5 framework, which was released in 2012, is based on five key principles:

  1. Meeting stakeholder needs
  2. Covering the enterprise end-to-end
  3. Applying a single integrated framework
  4. Enabling a holistic approach
  5. Separating governance from management

COBIT 5 also combines the COBIT frameworks with others developed by ISACA, such as Val IT and Risk IT as well as resources from the Information Technology Infrastructure Library and related standards from the International Organization for Standardization.

This was last updated in March 2015

Continue Reading About COBIT 5

Dig Deeper on Managing governance and compliance

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

SearchSecurity

Close