Skip to content

6. Decision Making & Governance

Minimum ISO 42010

This section captures the decision-making context for the architecture:

  • Constraints and assumptions that shaped the design
  • Risks and dependencies that must be managed
  • Key decisions made and the rationale behind them
  • Exceptions to organisational standards
  • Compliance evidence demonstrating the design has been reviewed and approved
Sub-sectionFocusDepth
6.1 ConstraintsFixed limitations shaping the designMinimum
6.2 AssumptionsFactors believed true but not verifiedMinimum
6.3 RisksPotential events that could affect the designMinimum
6.4 DependenciesExternal factors the design relies uponMinimum
6.5 IssuesProblems that have already materialisedRecommended
6.6 Technical Debt RegisterDebt introduced or inheritedRecommended
6.7 Guardrail ExceptionsExceptions to policies and standardsRecommended
6.8 Architectural Decisions LogSummary index of ADRsRecommended
6.9 Compliance TraceabilityMapping to standards and principlesComprehensive
6.10 Approval Sign-OffGovernance approval recordMinimum

Sections 6.1 through 6.5 collectively form the RAID log (Risks, Assumptions, Issues, Dependencies) — a standard project governance tool — extended with Constraints to capture fixed limitations. Each element has its own sub-section for clarity, but they should be maintained together as a single, living governance artefact.

Minimum

Constraints are fixed limitations that the design must work within. They are non-negotiable and shape the solution boundaries.

IDConstraintCategoryImpact on DesignLast Assessed
C-001[describe the constraint]Regulatory / Technical / Commercial / Organisational / Time[how this constrains the design][date]

Guidance

Common constraints include:

  • Regulatory — Data residency, industry compliance (PCI-DSS, GDPR, FCA)
  • Technical — Must use existing platform, specific technology mandated, legacy integration
  • Commercial — Budget ceiling, existing licensing agreements, vendor contracts
  • Organisational — Team skills, organisational standards, governance processes
  • Time — Fixed delivery deadlines, regulatory compliance dates
Minimum

Assumptions are factors believed to be true but not yet verified. The assumption owner should validate each assumption and track it to closure. An assumption that proves false may become a risk or issue.

IDAssumptionImpact if FalseCertaintyStatusOwnerEvidence
A-001[describe the assumption][impact on design if wrong]High / Medium / LowOpen / Closed[person][reference]

Guidance

Capture assumptions about:

  • Technical — API availability, system capacity, technology compatibility
  • Organisational — Resource availability, team skills, process readiness
  • Third-party — Vendor timelines, SLA commitments, service availability
  • Data — Data quality, volumes, formats, migration feasibility
  • Timeline — Dependent delivery dates, approval timelines

Open assumptions should be tracked actively. The owner is responsible for validating the assumption and providing evidence of closure.

Minimum

Risks are potential events that could negatively affect the design or its delivery. Each risk should have a mitigation strategy and clear ownership.

Risk identification:

IDRisk EventCategorySeverityLikelihoodOwner
R-001[describe the risk]Technical / Security / Operational / Delivery / Commercial / ComplianceHigh / Medium / LowHigh / Medium / Low[person]

Risk response:

IDMitigation StrategyMitigation PlanResidual RiskLast Assessed
R-001Accept / Mitigate / Transfer / Avoid[details of the mitigation plan]High / Medium / Low[date]

Guidance

Consider risks related to:

  • Technical — Technology choices, complexity, integration, performance
  • Security — Vulnerabilities, access control gaps, data exposure
  • Operational — Supportability, monitoring gaps, skill availability
  • Delivery — Timeline, dependencies, resource availability
  • Commercial — Vendor risk, licensing, cost overruns
  • Compliance — Regulatory gaps, standards non-conformance

Mitigation strategies should be one of: Accept (business owner sign-off), Mitigate (reduce likelihood or impact), Transfer (insurance, contractual), or Avoid (change the design).

Minimum

Dependencies are external factors that the design relies upon or that rely upon this design. Track both inbound (this design depends on) and outbound (other designs depend on this).

IDDependencyDirectionStatusOwnerEvidenceLast Assessed
D-001[describe the dependency]Inbound / OutboundCommitted / Not Committed / Resolved[person][reference][date]

Guidance

Common dependencies include:

  • Infrastructure — Network connectivity, platform availability, shared services
  • Application — APIs, data feeds, upstream/downstream systems
  • Team — Other project deliverables, shared resources, specialist skills
  • Vendor — Third-party service readiness, contract completion
  • Governance — Approval gates, compliance sign-off, change advisory board
Recommended

Issues are problems that have already materialised and require resolution. Unlike risks (which are potential), issues are current and active.

IDIssueCategoryImpactOwnerResolution PlanStatusLast Assessed
I-001[describe the issue]Technical / Security / Operational / Delivery / CommercialHigh / Medium / Low[person][resolution plan]Open / In Progress / Resolved[date]

Guidance

Issues differ from risks:

  • A risk is something that might happen — it is potential
  • An issue is something that has happened — it is current and requires active resolution

Common issues include:

  • Technical — A dependency API is not performing as expected; a security vulnerability has been discovered
  • Delivery — A key resource has left the team; a vendor has missed a delivery milestone
  • Commercial — A licence cost has increased beyond budget; a contract negotiation is stalled

Issues should be escalated when they threaten the project timeline, cost, or quality. Track each issue to resolution and record the outcome.

Recommended

Document any technical debt introduced or inherited by this solution. Technical debt can arise at any stage — from initial design shortcuts to inherited legacy constraints — and requires governance tracking alongside risks and issues.

IDDescriptionCategoryImpactRemediation PlanTarget DateOwner
TD-001[describe the debt]Design / Code / Infrastructure / Security / OperationalHigh / Medium / Low[plan to resolve][date][person]

Guidance

Technical debt should be tracked when:

  • A shortcut is taken to meet a deadline (document what was deferred and when it will be addressed)
  • A legacy component is retained that does not meet current standards
  • A vendor dependency introduces a constraint that should eventually be removed
  • A security finding is accepted temporarily with a remediation plan

Each item should have clear ownership and a target date for resolution. Unresolved technical debt often becomes a risk (Section 6.3) or an issue (Section 6.5).

Recommended

Document any exceptions to organisational policies, standards, or guardrails:

QuestionResponse
Does this design create any exception to current policies and standards?Yes / No
If yes, have exceptions been logged and accepted through the exceptions process?Yes / No / N/A
QuestionResponse
Does this design conflict with organisational workflows or operating models?Yes / No
If yes, has this been acknowledged by the process owner?Yes / No / N/A
QuestionResponse
Does this architecture significantly alter the enterprise threat or risk landscape?Yes / No
If yes, has this been formally assessed by the appropriate security or risk governance authority?Yes / No / N/A
Recommended

Note

This section provides a governance summary index. The full Architecture Decision Records with context, alternatives, and consequences are documented in Section 3.6.2 — Scenarios.

ADR #TitleStatusDateImpact
ADR-001[title]Accepted / Proposed / Superseded[date][brief impact summary]
Comprehensive

Guidance

This table provides traceability between external standards/principles and the SAD content that demonstrates compliance. It enables reviewers and auditors to verify that all applicable requirements are addressed in the design.

Organisations may use this section to map to their internal design principles, industry standards (e.g., PCI-DSS, ISO 27001), or regulatory requirements.

Map design elements to the standards and principles they satisfy:

Standard / PrincipleRequirementHow the Design Satisfies ItEvidence Section
[standard ID][requirement text][design approach][section reference]

Scoring Guidance

ScoreWhat This Looks Like
1Some risks listed but no mitigation plans or ownership
3Constraints, assumptions, risks, and dependencies documented with ownership; key ADRs captured; guardrail exceptions logged
5All of the above plus all items have evidence and dates, compliance traceability complete, issues tracked to resolution
Minimum

Record who reviewed and approved the architecture:

RoleNameDateDecisionConditions
Solution Architect[name][date]Approved / Approved with Conditions / Rejected / Deferred[any conditions]
Security Architect[name][date]Approved / Approved with Conditions / Rejected / Deferred[any conditions]
ARB / Design Authority[name][date]Approved / Approved with Conditions / Rejected / Deferred[any conditions]
[additional approvers][name][date]

Guidance

The approval sign-off records who reviewed and approved the architecture. Typical approvers include:

  • Solution Architect — the author, confirming the document is complete and accurate
  • Security Architect — confirming the Security View adequately addresses the threat landscape
  • ARB / Design Authority — the governance body confirming the design meets organisational standards
  • Business Owner — confirming the solution meets business requirements (optional but recommended)

Record the approval decision and any conditions that must be met before implementation.