Skip to content

Conformance and Usage

Before working with the standard, familiarise yourself with the terminology used throughout and how to approach completing a document.

The key words “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “MAY”, and “OPTIONAL” in this standard are to be interpreted as described in RFC 2119 and RFC 8174. These RFCs define the meaning of requirement keywords used in technical standards.

KeywordMeaning
SHALLAn absolute requirement of the standard
SHALL NOTAn absolute prohibition
SHOULDRecommended; there may be valid reasons to deviate, but the architect must understand the implications
SHOULD NOTNot recommended; there may be valid reasons to include but the implications must be understood
MAY / OPTIONALTruly optional; include at the author’s discretion

These keywords map to the standard’s documentation depths as follows:

Documentation DepthKeywordGovernance Gate
MinimumSHALLDevelopment / Test review
RecommendedSHOULDProduction approval
ComprehensiveMAYEnterprise review

Use the workflow below to complete a Solution Architecture Document. Each step builds on the previous one.

Step 1 — Choose your depth. Pick the documentation depth for your project:

  • Minimum — Early-stage designs, proofs of concept, dev/test reviews
  • Recommended — Production-bound designs requiring governance approval
  • Comprehensive — Critical, regulated, or enterprise-scale systems

Step 2 — Set the context (Sections 0–2). Start with document control, the executive summary, and stakeholders. This frames everything that follows.

Step 3 — Describe the architecture (Section 3). Work through each architectural view. A common starting order is the Logical View (what the solution does), then Physical View (where it runs), then the remaining views.

Step 4 — Assess quality (Section 4). Evaluate the design against each quality attribute. Document any tradeoffs between them.

Step 5 — Plan the lifecycle (Section 5). Document how the solution is built, deployed, operated, and eventually retired.

Step 6 — Capture decisions and risks (Section 6). Document constraints, assumptions, risks, dependencies, and issues. Record key architecture decisions.

Step 7 — Complete appendices and submit (Section 7). Add glossary, references, and approval sign-off. Complete the compliance scoring table and submit for governance review.

  • Omit sections that require a higher documentation depth than your target. For example, if your target is Recommended, omit sections marked Comprehensive. Do not include higher-depth sections with empty or “N/A” content.
  • Omit sections at or below your target depth that are genuinely not relevant to the solution (e.g., IoT Devices for a cloud-only API).
  • Only include sections that add value to the reader.

A Solution Architecture Document produced to this standard is a living artefact:

  • It SHALL describe the current state of the solution architecture
  • The SAD SHALL be updated when architecturally significant changes are made
  • It MAY be updated by multiple teams or change activities, either sequentially or in parallel
  • It SHALL NOT be owned by a single project team; ownership rests with the accountable architect for the solution
  • Changes to the design SHOULD be approved through the organisation’s architecture governance process

This standard is designed to be adopted without modification. However, organisations MAY extend it in the following ways:

  1. Organisation Profile — Map generic sections to specific internal tools, standards, and governance processes using the organisationProfile field in the JSON Schema (a machine-readable definition of the document structure)
  2. Custom Sections — Add organisation-specific sections using the customSections extension point (a way to add organisation-specific sections without modifying the core standard)
  3. Standards Traceability — Reference internal design principles, patterns, and standards within the compliance traceability section (Section 6.8)
  4. Governance Gate Mapping — Map the three documentation depths to your organisation’s architecture governance stages (e.g., ARB, design authority)

Organisations SHALL NOT renumber core sections of the standard. Sections that are not applicable to the solution SHOULD be omitted entirely to keep documents focused and readable.

The standard’s JSON Schema enables generation and validation in multiple formats:

FormatUse Case
WebInteractive documentation site (this site)
MarkdownInclusion in git repositories alongside code
YAMLHuman-readable structured data, ideal for version control and configuration
JSONMachine-readable for tooling integration and validation
Word / DOCXFormal governance submissions and offline review (generated from Markdown)

See Templates for downloadable blank templates in each format.

Each major section of a Solution Architecture Document MAY be assessed using a 0–5 compliance score. This provides governance boards with a quick, quantitative view of architecture maturity and completeness — both for individual SADs and across a portfolio.

ScoreLevelDescription
0Not AddressedNo evidence or content provided for this area
1AcknowledgedThe concern is recognised but no design or evidence exists
2PartialSome requirements addressed; significant gaps remain
3Mostly AddressedMost requirements met; minor gaps or risks requiring mitigation
4Fully AddressedAll requirements met with supporting evidence
5ExemplaryBest-practice implementation; could serve as a reference example

Scoring is applied at the section level, not at individual field level. The following sections are scored:

SectionScoring AreaWhat 4/5 Looks Like
1. Executive SummaryCompleteness & clarityClear business context, strategic alignment demonstrated, scope well-defined
3.1 Logical ViewDesign qualityComponents well-decomposed, patterns justified, vendor lock-in assessed
3.2 Integration & Data FlowIntegration maturityAll interfaces documented, protocols specified, authentication defined
3.3 Physical ViewInfrastructure rigourDeployment architecture complete, environments specified, connectivity documented
3.4 Data ViewData governanceData stores classified, retention defined, sovereignty addressed, encryption specified
3.5 Security ViewSecurity postureThreat model complete, all controls documented, monitoring in place
3.6 ScenariosDesign validationKey use cases documented, ADRs capture significant decisions with rationale
4.1 Operational ExcellenceOperational readinessCentralised logging, monitoring, alerting, and runbooks all in place
4.2 ReliabilityResilience maturityDR strategy defined, RTO/RPO met, backup tested, fault tolerance designed
4.3 PerformancePerformance assuranceTargets defined, growth projected, testing approach documented
4.4 Cost OptimisationCost awarenessCost analysis performed, monitoring enabled, right-sizing evidenced
4.5 SustainabilityEnvironmental considerationCarbon-aware hosting, auto-shutdown, right-sizing
5. LifecycleOperational maturityCI/CD documented, migration planned, skills assessed, exit plan in place
6. Decision MakingGovernance rigourRAID log complete, ADRs captured, compliance traceability demonstrated

Each SAD SHOULD include a compliance summary in the appendices (Section 7) or document control (Section 0):

SectionScore (0–5)AssessorDateNotes
1. Executive Summary
3.1 Logical View
3.2 Integration & Data Flow
3.3 Physical View
3.4 Data View
3.5 Security View
3.6 Scenarios
4.1 Operational Excellence
4.2 Reliability
4.3 Performance
4.4 Cost Optimisation
4.5 Sustainability
5. Lifecycle
6. Decision Making
Overall

Guidance

  • The overall score is typically the lowest individual section score (weakest-link principle), not an average. A solution with a 5 in performance but a 1 in security is not a “3” — it has a critical security gap.
  • Scoring is collaborative, not adversarial. The solution architect and reviewing authority should score jointly (e.g., ARB or design authority).
  • Scores below 3 on any section SHOULD trigger a remediation plan with clear ownership and timelines.
  • Organisations MAY define minimum acceptable scores per section for different governance gates (e.g., “all sections must score ≥ 3 for production approval”).

See the full normative references table on the Framework Alignment page.