Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.