This document is a narrative design artifact, not a SpecChat spec collection. The data it enumerates (personas, ASRs, ASDs, waivers, viewpoints, views, entities, contracts, invariants, metrics, and the rest) describes what a BTABOK-complete enterprise architecture looks like, but is not itself in a form that SpecChat validators can process.
The actual spec collection derived from this narrative lives
alongside this document in the same directory
(docs/examples/global-corp/). The spec files are
authoritative for all cross-references, counts, and IDs. This narrative
remains as human-readable context and fiction backstory. For background
on the staging plan that produced this layout, see SpecChat-BTABOK-Implementation-Plan.md
Section 7.3.
Users looking to run SpecChat validators against Global Corp should point the tooling at the spec collection, not at this document.
| Field | Value |
|---|---|
| Document ID | GC-EA-001 |
| Version | 0.2.0 |
| Created | 2026-04-16 |
| Last Reviewed | 2026-04-17 |
| State | Draft |
| Owner | PER-01 Lena Brandt, Chief Architect |
| Approver | PER-11 Anja Petersen, Chair EARB |
| Ever-green | Yes |
| Freshness SLA | 90 days |
| Dependencies | None |
| Classification | Fictional enterprise used to exercise BTABOK practices end-to-end |
| CoDL itemType | EnterpriseArchitecture |
| CoDL slug | global-corp-enterprise-architecture |
| CoDL publishStatus | Draft |
| CoDL retentionPolicy | indefinite |
This document defines a fictional global corporation, Global Corp., whose mission is to provide end-to-end visibility, traceability, compliance, and decision support for goods moving through the global supply chain.
The company is fictional. The realism is intentional. Its market pressures, standards choices, regulatory drivers, and operating constraints are derived from current public sources on global logistics, traceability, security, and BTABOK architecture practice. [R1][R2][R3][R4][R5][R6][R7][R8][R9][R10][R11][R12][R13]
The goal is to model an enterprise architecture that fully exercises the BTABOK Engagement Model, including:
Every artifact in this document carries a stable, human-readable identifier, a named owner, and a named approver. This is intentional. The document is meant to exhibit the governance discipline it prescribes, not merely describe it.
This document is designed as a BTABOK-complete exemplar. Following the April 2026 publication of the Concept Definition Language (CoDL) and Canvas Definition Language (CaDL) by IASA Global on the BTABoK 3.2 education portal, it also doubles as a seed for CoDL concept instances and CaDL canvas definitions.
A subsequent decision recorded in SpecLang-Design.md (Option X) absorbs specific infrastructure concerns into Core SpecLang. As a consequence of that decision, several conventions used throughout this document are no longer BTABOK-profile-specific; they are Core SpecLang features that apply to every spec collection regardless of profile.
The stable IDs used throughout this document (ASR-01, ASD-01, WVR-01,
STK-01, VP-01, V-01, and so on) correspond to the Core SpecLang
slug field. The first column of each artifact table
therefore maps to the Core SpecItem metadata profile field
slug (URL-safe stable identifier). Slug uniqueness and
format rules are enforced by core validators and apply to every SpecChat
collection.
The Owner and Approver fields used throughout this document
correspond to fields in the Core SpecItem metadata profile. Owner aligns
with committer (the single owning steward) and with
membership in authors. Approver aligns with membership in
reviewers, or with committer when the approver
is also the owning steward. These fields are core infrastructure, not
BTABOK-specific.
The ever-green declaration, freshness SLA, and retention policy used
throughout this document are Core SpecLang features. The
retentionPolicy enum (indefinite,
archive-on-deprecated, delete-on-superseded)
applies to every spec regardless of profile.
The BTABOK profile contributes on top of the core infrastructure: the 19 BTABOK concept types (StakeholderCard, PrincipleCard, ASRCard, DecisionRecord, GovernanceBody, GovernanceRule, WaiverRecord, ViewpointCard, CanvasDefinition, QualityAttributeScenario, StandardCard, CapabilityCard, RoadmapItem, TransitionArchitecture, RiskCard, ExperimentCard, LegacyModernizationRecord, MetricDefinition, ScorecardDefinition), the BTABoKItem metadata extensions (accessTier, bokStatus, certainty, baseVersion, and BTABoK-specific identity fields), and the 20 CaDL canvases. These remain profile-scoped and activate only when the BTABOK profile is declared.
The View Gallery in section 28 serves as a catalog of CaDL canvases defined over the document’s concepts. Following the governing CaDL principle that “a canvas is a view of a concept, not a separate stored object type,” each V-xx entry describes a rendering over concepts defined elsewhere in this document, not a new stored object.
For the full alignment between CoDL, CaDL, and the SpecLang/SpecChat vocabulary, and for the Core SpecLang absorption decision, see SpecLang-Design.md. Two architectural decisions recorded there are relevant here: Option A (CoDL syntax is canonical, with optional SpecLang-style aliases) and Option X (infrastructure concerns absorbed into Core SpecLang).
This architecture deliberately incorporates the BTABOK Engagement Model elements that are often underrepresented in delivery-centric specification systems:
That design intent reflects the main lesson from the earlier BTABOK/SpecChat alignment work: architecture description alone is not enough. A BTABOK-aligned enterprise architecture must also carry value, governance, repository discipline, stakeholder concerns, and measurable outcomes. [R14]
Global Corp. operates in a world where international supply chains are large, distributed, multi-party, and increasingly regulated. The business context is shaped by five realities.
The World Bank’s Logistics Performance Index emphasizes reliability, quality of logistics services, infrastructure, and border processes as core determinants of how effectively goods move across borders. [R7]
GS1 EPCIS 2.0 is designed to capture and share supply-chain visibility events across organizations, including the what, when, where, why, and how of tracked objects. It also supports sensor data and developer-friendly APIs. [R8]
DCSA Track & Trace standards provide common data semantics, APIs, and milestone structures for container shipping across shipment phases and carriers. [R9]
The EU Ecodesign for Sustainable Products Regulation introduces the Digital Product Passport as a digital identity for products, components, and materials. [R10] The U.S. FDA FSMA 204 final rule requires Critical Tracking Events and Key Data Elements for covered foods. The original January 20, 2026 compliance date has been subject to FDA extension proposals; current enforcement timing should be confirmed against FDA rulemaking status at time of reference. [R11]
NIST CSF 2.0 guidance now includes focused quick-start guidance for cybersecurity supply chain risk management. [R12] ISO 28000:2022 provides requirements for security management systems relevant to supply chain security and resilience. [R13]
These realities make Global Corp. credible as a business. They also make it a strong vehicle for exercising BTABOK in a realistic way.
Global Corp. is a fictional multinational business technology company that provides a Supply Chain Visibility and Trust Platform to manufacturers, retailers, logistics providers, and regulators.
Global Corp. does not move freight itself. It sells:
Global Corp.’s strategy is built on one premise:
The winning supply-chain platform is not just a data collector. It is the system that turns fragmented, partner-specific logistics signals into trusted, governed, decision-ready architecture.
The Business Case is deliverable #1 in the Minimum Durable Deliverable Set (see section 24). It is structured using the NABC framing (Need, Approach, Benefits, Competition).
| Element | Content |
|---|---|
| Need | Global manufacturers and retailers lose measurable revenue to supply-chain disruption, compliance gaps, and partner-integration rework. FSMA 204 and EU DPP raise the regulatory floor. Existing tools solve point problems but fragment across modes, regions, and data models. |
| Approach | Build a standards-first visibility and trust platform. Normalize events from all modes and partners into a canonical graph. Layer operational intelligence, compliance packs, and sustainability support on the graph. Preserve lineage to source evidence so every visible state is explainable. |
| Benefits | Customer disruption detection time drops from hours to minutes. Partner onboarding effort drops 50% over 24 months through standards mediation. Compliance evidence turnaround drops from days to hours. Platform gross margin improves as integration costs flatten against customer growth. |
| Competition and alternatives | In-house visibility teams at large shippers (high cost, low portability). Point-solution control towers (fragmented, no product-level traceability). General data platforms with logistics overlays (weak on event semantics, weak on regulatory packs). |
| Primary owner | PER-05 Sven Lindqvist, CEO |
| Sponsor | PER-06 Priya Raman, CFO |
| Review cadence | Annual |
This model intentionally covers the main BTABOK Engagement Model practice zones.
| BTABOK concern | How Global Corp. exercises it |
|---|---|
| Architecture as value-driven strategy | Business case in section 6, objective hierarchy in section 5, benefit metrics in Outcome Scorecard (section 32) |
| Views and viewpoints | 10 viewpoints defined in section 27, one view per viewpoint in View Gallery (section 28) |
| ASRs and decisions | ASR catalog (section 21), ASD registry (section 22), ASR-to-ASD traceability matrix (section 23) |
| Deliverables | Minimum Durable Deliverable Set (section 24), each with ID, owner, review cadence, freshness SLA |
| Repository | Curated repository with freshness rules (section 24), Repository Stewardship Group (section 25) |
| Governance | EARB, Domain Design Councils, Regional Architecture Forum, waiver process (section 25) with concrete waivers (section 26) |
| Lifecycle | Full six-stage ADLC walkthrough in section 12, innovation experiment cards in section 13 |
| Stakeholder orientation | Stakeholder catalog with named persons, concerns, influence, and engagement strategy (section 10) |
| Principles and standards | 10 enterprise principles (section 11) linked to ASRs and ASDs, Standards Catalog (section 33) |
| Experiments | Innovation Experiment Cards in section 13 |
| Legacy modernization | Decommissioning vignette for LGY-01 GlobalTrack-APAC v3 (section 29) |
| Tooling and reporting | Architecture dashboards, policy checks, traceability reports, adoption telemetry (section 32) |
Global Corp. operates six primary value streams.
| ID | Value Stream | Owner |
|---|---|---|
| VS-01 | Acquire and Onboard Customer | PER-09 Elena Vasquez, CPO |
| VS-02 | Onboard Partner Network | PER-03 Maria Oliveira, Chief Architect of Integration |
| VS-03 | Capture and Normalize Events | PER-02 Arjun Desai, Chief Architect of Data |
| VS-04 | Assess Risk and Compliance | PER-17 Isabelle Laurent, Chief Architect of Compliance |
| VS-05 | Provide Operational Decisions | PER-18 Kenji Sato, Chief Architect of Operations |
| VS-06 | Measure Value and Renew | PER-06 Priya Raman, CFO |
Each capability carries a stable ID, a baseline maturity (current state), a target maturity (36-month horizon), a strategic importance, and a named owner.
| ID | L1 Capability | L2 Capabilities | Baseline | Target | Importance | Owner |
|---|---|---|---|---|---|---|
| CAP-COM-01 | Commercial | Product management, pricing, deal governance | Medium | Medium-high | Medium | PER-09 Elena Vasquez |
| CAP-CDL-01 | Customer Delivery | Solution design, integration delivery, change management | Medium | High | High | PER-19 Emma Richardson |
| CAP-PAR-01 | Partner Interoperability | API onboarding, EDI mapping, standards mediation, certification | Low-medium | High | Critical | PER-03 Maria Oliveira |
| CAP-TRC-01 | Traceability Operations | Event ingestion, event normalization, identity resolution, lineage tracking | Medium | High | Critical | PER-02 Arjun Desai |
| CAP-CTR-01 | Control Tower | ETA, exception management, alerting, case management | Medium-low | Medium-high | High | PER-18 Kenji Sato |
| CAP-CPS-01 | Compliance and Sustainability | DPP readiness, FSMA workflows, audit export, retention policy | Low | Medium-high | High | PER-17 Isabelle Laurent |
| CAP-DAI-01 | Data and Intelligence | Analytics, forecasting, risk models, customer insights | Medium | High | High | PER-02 Arjun Desai |
| CAP-TAS-01 | Trust and Security | IAM, tenant isolation, security monitoring, evidence chain, third-party risk | Medium | High | Critical | PER-04 Daniel Park |
| CAP-ENT-01 | Enterprise Management | Finance, HR, legal, architecture governance, PMO | Medium | High | Critical | PER-01 Lena Brandt |
| CAP-REP-01 | Architecture Repository Discipline | Artifact lifecycle, ownership, freshness, decision registry | Low-medium | High | Critical | PER-16 Thomas Müller |
| CAP-GOV-01 | Governance and Waiver | ARB operations, waiver lifecycle, standards oversight | Low-medium | Medium-high | Medium | PER-11 Anja Petersen |
| CAP-OUT-01 | Outcome Measurement | KPI definition, scorecard operation, benefit tracking | Low | High | High | PER-06 Priya Raman |
Named personas referenced throughout this document. In a real
deployment these would be actual employees. Here they are consistent
fictional roles that let ownership and approval discipline be exhibited
rather than prescribed. The ID column in this table maps to the CoDL
slug field for each concept instance.
| ID | Name | Role | Location |
|---|---|---|---|
| PER-01 | Lena Brandt | Chief Architect (enterprise) | Zurich |
| PER-02 | Arjun Desai | Chief Architect of Data, VP Data Platform | Singapore |
| PER-03 | Maria Oliveira | Chief Architect of Integration | Sao Paulo |
| PER-04 | Daniel Park | Chief Architect of Security | Singapore |
| PER-05 | Sven Lindqvist | CEO | Zurich |
| PER-06 | Priya Raman | CFO | Zurich |
| PER-07 | Hiroshi Tanaka | COO | Singapore |
| PER-08 | Chioma Okafor | CISO | Johannesburg |
| PER-09 | Elena Vasquez | Chief Product Officer | Atlanta |
| PER-10 | Yuki Nakamura | Head of Regulatory Affairs | Singapore |
| PER-11 | Anja Petersen | Chair, Enterprise Architecture Review Board | Zurich |
| PER-12 | Ravi Menon | Regional Operations Lead, APAC | Singapore |
| PER-13 | Sarah Goldberg | Regional Operations Lead, Americas | Atlanta |
| PER-14 | Fatima Al-Hassan | Regional Operations Lead, MEA | Dubai |
| PER-15 | Marcus Weber | Head of Sustainability | Rotterdam |
| PER-16 | Thomas Müller | Repository Steward Lead | Zurich |
| PER-17 | Isabelle Laurent | Chief Architect of Compliance | Rotterdam |
| PER-18 | Kenji Sato | Chief Architect of Operations | Singapore |
| PER-19 | Emma Richardson | Product Architect, Control Tower | Atlanta |
| PER-20 | Aleksandr Volkov | Platform SRE Lead | Zurich |
| PER-21 | Astrid Wilhelm | Regional Operations Lead, EU | Rotterdam |
CoDL itemType: StakeholderCard
BTABOK insists that views exist for stakeholders, not for the comfort of the architecture team alone. [R3]
Each stakeholder has a stable ID, a named occupant (from the Personas
Directory), concerns, influence classification, required viewpoints, and
an engagement strategy. The ID column in this table maps to the CoDL
slug field for each StakeholderCard concept instance.
| ID | Stakeholder (occupant) | Concerns | Influence | Required viewpoints | Engagement strategy |
|---|---|---|---|---|---|
| STK-01 | CEO (PER-05) | Growth, market expansion, resilience narrative | High | VP-01 Strategic, VP-10 Outcome | Quarterly architecture review, strategic reviews |
| STK-02 | CFO (PER-06) | Margin, implementation cost, hosting efficiency | High | VP-02 Capability, VP-10 Outcome | Monthly scorecard, annual investment review |
| STK-03 | COO (PER-07) | Onboarding speed, service reliability, regional execution | High | VP-06 Operational, VP-08 Deployment | Weekly ops sync, regional checkpoints |
| STK-04 | CPO (PER-09) | Product coherence, differentiation, roadmap reuse | High | VP-02 Capability, VP-04 Information | Biweekly product architecture sync |
| STK-05 | Chief Architect (PER-01) | Coherence, standards, reuse, technical debt, repository quality | High | All | EARB chair, standards governance lead |
| STK-06 | CISO (PER-08) | Tenant isolation, supplier cyber risk, incident response | High | VP-07 Security, VP-09 Governance | EARB member, security review gate |
| STK-07 | Regional Ops Lead APAC (PER-12) | Local partner realities, customs timing, SLA practicality | Medium-high | VP-06 Operational, VP-08 Deployment | Regional Architecture Forum |
| STK-08 | Integration Partner (external) | API stability, standards mappings, certification cost | Medium | VP-05 Integration | Partner Advisory Council |
| STK-09 | Customer Supply Chain Director (external) | Visibility, ETA confidence, exception handling | High | VP-06 Operational, VP-02 Capability | Customer Advisory Board |
| STK-10 | Regulatory Affairs Lead (PER-10) | Auditability, retention, traceability completeness | Medium-high | VP-04 Information, VP-07 Security | Compliance review board |
| STK-11 | Sustainability Lead (PER-15) | DPP readiness, product provenance, circularity data | Medium | VP-04 Information, VP-02 Capability | Sustainability working group |
| STK-12 | EARB (PER-11 chair) | Exception handling, standards use, risk posture | High | VP-09 Governance, VP-04 Information | EARB cadence and waiver process |
The Influence column maps cleanly to a CoDL enum field on the
StakeholderCard concept:
influence: enum(high, medium_high, medium, low). The
power/interest grid positioning in section 10.1 is data that would be
stored on each StakeholderCard instance (typed fields for power and
interest scores, with the quadrant derived).
Stakeholders are positioned on a power/interest grid. Engagement intensity is calibrated to this positioning per BTABOK’s guidance on stakeholder management.
| Position | Power | Interest | Stakeholders |
|---|---|---|---|
| Manage closely | High | High | STK-01, STK-02, STK-04, STK-05, STK-06, STK-09, STK-12 |
| Keep satisfied | High | Medium | STK-03 |
| Keep informed | Medium | High | STK-07, STK-08, STK-10, STK-11 |
| Monitor | Medium | Medium | (none currently) |
CoDL itemType: PrincipleCard
Global Corp. uses the following enterprise principles. Each has a
stable ID, an owner, an approver, and explicit links to the ASRs and
ASDs that implement or depend on it. The ID column in this table maps to
the CoDL slug field for each PrincipleCard concept
instance.
| ID | Principle | Statement | Owner | Approver | Implements | Depends on |
|---|---|---|---|---|---|---|
| P-01 | Standards before custom | Prefer GS1 EPCIS, DCSA event models, and published partner APIs before inventing bespoke schemas. [R8][R9] | PER-03 | PER-11 | ASR-04 | ASD-01 |
| P-02 | Events are the source of operational truth | The platform is event-driven first, report-driven second. | PER-02 | PER-11 | ASR-01, ASR-05 | ASD-02 |
| P-03 | Canonical identity, federated evidence | Global Corp. normalizes core identifiers while preserving source evidence and lineage. | PER-02 | PER-11 | ASR-02 | ASD-04 |
| P-04 | Trust requires lineage | Every externally significant state must be explainable from retained evidence. | PER-17 | PER-11 | ASR-02, ASR-06 | ASD-04, ASD-05 |
| P-05 | Views must serve stakeholders | No architecture artifact exists without a named audience and decision purpose. [R3][R4] | PER-01 | PER-11 | ASR-09 | ASD-08 |
| P-06 | Deliverables stay lightweight | Architecture deliverables are tools for thinking, communication, and leadership, not document bulk. [R4] | PER-16 | PER-11 | ASR-09 | ASD-08 |
| P-07 | Repository is first for architects | The repository exists first to improve architectural decision-making, then to serve the wider enterprise. [R5] | PER-16 | PER-11 | ASR-09 | ASD-06 |
| P-08 | Governance should guide, not suffocate | Standards and reviews should accelerate good decisions, with waivers for justified exceptions. [R6] | PER-11 | PER-05 | ASR-08 | ASD-07 |
| P-09 | Global consistency, regional compliance | Shared platforms are global; legal controls, retention, and reporting adapt by jurisdiction. | PER-01 | PER-05 | ASR-03 | ASD-03, ASD-05 |
| P-10 | Security includes the supply chain | Cybersecurity, third-party risk, operational resilience, and physical supply-chain trust are designed together. [R12][R13] | PER-04 | PER-08 | ASR-02 | (cross-cutting) |
In CoDL terms, the Owner column corresponds to the
committer field on each PrincipleCard (the single owning
steward). The Approver column corresponds to membership in
reviewers, or to committer when the approver
is also the owning steward. The Implements and Depends on columns
correspond to CoDL relationship declarations on the PrincipleCard
concept, expressed as typed references such as
implements<ASRCard> and
uses<ASRCard>.
BTABOK’s Architecture Development Life Cycle spans innovation, strategy, planning, transformation, utilize-and-measure, and decommission. [R2]
CoDL itemType: ExperimentCard
Innovation experiments are time-bounded, budget-capped, and carry
explicit kill criteria. Cards below are active or recently concluded.
The EXP-xx identifiers map to the CoDL slug field for each
ExperimentCard concept instance.
| Field | Value |
|---|---|
| Hypothesis | Combining IoT temperature streams with ETA models detects cold-chain excursions 15+ minutes earlier than threshold-only monitoring |
| Owner | PER-19 Emma Richardson |
| Sponsor | PER-18 Kenji Sato |
| Duration | 90 days |
| Cost cap | USD 240K |
| Kill criteria | Median detection lead time improvement under 5 minutes, or false-positive rate above 8% |
| Success measures | Detection lead time, precision, recall, customer-validated incident prevention |
| Status | Active (day 42) |
| Field | Value |
|---|---|
| Hypothesis | A DPP assembly service using canonical product graph produces audit-ready DPPs 60% faster than manual compilation for electronics |
| Owner | PER-15 Marcus Weber |
| Sponsor | PER-10 Yuki Nakamura |
| Duration | 120 days |
| Cost cap | USD 380K |
| Kill criteria | DPP assembly time savings under 25%, or auditor rejection rate above 10% |
| Success measures | Assembly time, auditor acceptance rate, reusability across categories |
| Status | Concluded (day 118), Proceed to Productization |
| Field | Value |
|---|---|
| Hypothesis | Blending multiple carrier ETA signals with platform-observed events produces more stable shipment ETAs than any single-source model |
| Owner | PER-18 Kenji Sato |
| Sponsor | PER-07 Hiroshi Tanaka |
| Duration | 60 days |
| Cost cap | USD 120K |
| Kill criteria | ETA volatility reduction under 15%, or stakeholder NPS flat |
| Success measures | ETA stability, customer trust score, exception precision |
| Status | Active (day 17) |
flowchart LR
classDef internal fill:#2E6295,stroke:#1A3D5C,color:#fff
classDef partner fill:#438DD5,stroke:#2E6295,color:#fff
classDef external fill:#999999,stroke:#6B6B6B,color:#fff
Customers["Global Customers"]:::partner
Carriers["Ocean / Air / Road Carriers"]:::partner
Suppliers["Suppliers and Manufacturers"]:::partner
Warehouses["Warehouses / 3PLs"]:::partner
Customs["Customs and Regulators"]:::external
Standards["GS1 / DCSA Standards"]:::external
GC["Global Corp. Platform"]:::internal
Customers --> GC
Carriers --> GC
Suppliers --> GC
Warehouses --> GC
GC --> Customs
GC --> Standards
Global Corp. exposes the following business services.
| ID | Service | Owner |
|---|---|---|
| BSVC-01 | Visibility API and control-tower portal | PER-19 Emma Richardson |
| BSVC-02 | Partner onboarding and certification service | PER-03 Maria Oliveira |
| BSVC-03 | Compliance evidence export service | PER-17 Isabelle Laurent |
| BSVC-04 | Product traceability graph service | PER-02 Arjun Desai |
| BSVC-05 | Sustainability and DPP readiness service | PER-15 Marcus Weber |
| BSVC-06 | Exception and incident collaboration service | PER-18 Kenji Sato |
| BSVC-07 | Analytics and executive scorecard service | PER-06 Priya Raman |
The target application landscape is modular but not fragmented.
| ID | Domain | Primary responsibility | Owner |
|---|---|---|---|
| APP-CX | Customer Experience | Portals, dashboards, case management, notifications | PER-19 |
| APP-PC | Partner Connectivity | API gateway, EDI translation, partner adapters, webhook handling | PER-03 |
| APP-EB | Event Backbone | Ingestion, validation, deduplication, sequencing, replay | PER-02 |
| APP-TC | Traceability Core | Canonical shipment/product graph, chain-of-custody, provenance | PER-02 |
| APP-OI | Operational Intelligence | ETA models, rule engine, alerting, workflow orchestration | PER-18 |
| APP-CC | Compliance Core | Recall workflows, audit packages, retention policies, jurisdiction packs | PER-17 |
| APP-SD | Sustainability and DPP | Product passport assembly, sustainability evidence, material provenance | PER-15 |
| APP-ES | Enterprise Services | Identity, billing, tenant management, contract and entitlement management | PER-01 |
| APP-DP | Data Platform | Lakehouse, reporting marts, model training data, historical archives | PER-02 |
| APP-SO | Security and Operations | SIEM integration, secrets, observability, vulnerability and posture management | PER-04 |
flowchart TB
classDef edge fill:#85BBF0,stroke:#5D99CF,color:#000
classDef core fill:#438DD5,stroke:#2E6295,color:#fff
classDef data fill:#999999,stroke:#6B6B6B,color:#fff
Channels["Portals / APIs / Notifications"]:::edge
Connect["Partner Connectivity"]:::core
Events["Event Backbone"]:::core
Trace["Traceability Core"]:::core
Ops["Operational Intelligence"]:::core
Compliance["Compliance & DPP"]:::core
Enterprise["Identity / Tenant / Billing"]:::core
Data["Lakehouse / Graph / Archive"]:::data
Channels --> Enterprise
Channels --> Ops
Channels --> Compliance
Connect --> Events
Events --> Trace
Trace --> Ops
Trace --> Compliance
Trace --> Data
Ops --> Data
Compliance --> Data
Global Corp. normalizes the following enterprise objects.
| ID | Object | Description |
|---|---|---|
| ENT-01 | Organization | A legal entity that participates in shipments (customer, partner, regulator) |
| ENT-02 | Site | A physical location owned or operated by an organization |
| ENT-03 | Lane | A named origin-destination corridor with carrier preferences |
| ENT-04 | Shipment | A planned movement of goods under a carrier contract |
| ENT-05 | Consignment | A cargo unit tied to a shipment from a specific shipper to a specific consignee |
| ENT-06 | Order | A commercial order that drives one or more shipments |
| ENT-07 | Container | A physical transport unit with a unique identifier |
| ENT-08 | Pallet | An aggregation unit below container |
| ENT-09 | Case | A packing unit below pallet |
| ENT-10 | Item / Serial | A serialized product instance |
| ENT-11 | Batch / Lot | A manufacturing batch spanning many items |
| ENT-12 | Product | A product specification with category and attributes |
| ENT-13 | Event | A canonical visibility event (see section 16.2) |
| ENT-14 | Document | A regulatory, commercial, or operational document attached to shipments or products |
| ENT-15 | CustodyRecord | A record of who physically or logically held an item, container, or shipment at a time |
| ENT-16 | ComplianceCase | A regulatory case (recall, audit, inspection) |
| ENT-17 | Alert | An operational exception signal raised by rules or models |
| ENT-18 | Exception | A human-confirmed deviation requiring resolution |
| ENT-19 | PartnerContract | The commercial and technical agreement with a partner organization |
ENT-13 Event
id: EventId // UUIDv7, time-ordered
subjectId: SubjectRef // points to Item, Container, Shipment, etc.
eventType: EventType // ObjectEvent, AggregationEvent, TransformationEvent, AssociationEvent
businessStep: BusinessStepCode // EPCIS CBV-aligned
timestamp: UtcInstant // event occurrence
receivedAt: UtcInstant // platform receipt
sourceSystemId: SourceSystemRef
sourceEvidenceRef: EvidenceUri // required, see INV-01
location: LocationRef // optional
businessContext: BusinessContext // optional structured context
actorId: OrganizationRef
transportUnit: TransportUnitRef // optional
parentAggregation: SubjectRef // optional
sensorMeasurements: Measurement[] // optional
confidenceScore: Confidence // 0.0 to 1.0
lineagePointer: LineageRef // chain back to source event(s)
payloadHash: Sha256Hash // required, see INV-02
| ID | Contract | Purpose | Owner |
|---|---|---|---|
| CTR-01 | EventIngestion | Accept raw partner events, return a canonical event or a rejection | PER-02 |
| CTR-02 | EvidenceRetrieval | Given an event, return the source payload and lineage chain | PER-17 |
| CTR-03 | ComplianceExport | Given a compliance case, produce a signed evidence package | PER-17 |
| CTR-04 | ETAPredict | Given a shipment, return predicted ETA with confidence | PER-18 |
| CTR-05 | PartnerOnboard | Given a partner profile, return a certification status and mapping pack | PER-03 |
CTR-01 EventIngestion (formal)
contract CTR-01 EventIngestion
preconditions:
- partner is certified (see CTR-05)
- payload is well-formed JSON or valid EPCIS XML
- payload signature is valid under partner's registered key
postconditions:
- on accept: a canonical Event (ENT-13) is persisted with payloadHash set, lineagePointer set, confidenceScore computed
- on reject: a RejectionRecord is persisted with reason code and retained payload hash
- the partner receives a synchronous ack with the canonical event ID or the rejection reason
invariants:
- INV-01 payload hash retention
- INV-02 lineage completeness
error modes:
- PARTNER_NOT_CERTIFIED, SIGNATURE_INVALID, PAYLOAD_MALFORMED, DUPLICATE_EVENT, SCHEMA_UNKNOWN
| ID | Invariant | Scope | Owner |
|---|---|---|---|
| INV-01 | Every canonical event retains the SHA-256 hash of its original partner payload | Traceability Core, Event Backbone | PER-02 |
| INV-02 | Every canonical event has a lineage pointer that resolves to at least one source evidence record | Traceability Core | PER-02 |
| INV-03 | No externally visible shipment state exists without a supporting event chain | Control Tower, Customer Experience | PER-18 |
| INV-04 | Product, asset, shipment, and facility identifiers are mastered independently and joined through graph relationships only | Traceability Core, Data Platform | PER-02 |
| INV-05 | Retention policies are applied per jurisdiction at write time, not at read time | Compliance Core, Data Platform | PER-17 |
| INV-06 | PII fields are minimized and never replicated outside the region of origin unless a regional waiver authorizes the replication | Compliance Core, Data Platform | PER-08 |
Global Corp. supports multiple partner interaction styles:
Global Corp. runs a global, multi-region cloud deployment with regional control points.
flowchart LR
classDef control fill:#2E6295,stroke:#1A3D5C,color:#fff
classDef region fill:#438DD5,stroke:#2E6295,color:#fff
classDef edge fill:#999999,stroke:#6B6B6B,color:#fff
CP["Global Control Plane"]:::control
EU["EU Data Plane"]:::region
US["US Data Plane"]:::region
APAC["APAC Data Plane"]:::region
Partners["Partners / Customers"]:::edge
Partners --> CP
CP --> EU
CP --> US
CP --> APAC
| Component | Global Control Plane | EU Plane | US Plane | APAC Plane |
|---|---|---|---|---|
| APP-ES Identity | Primary | Read replica | Read replica | Read replica |
| APP-ES Billing | Primary | N/A | N/A | N/A |
| APP-PC Partner Gateway | Routing | Regional instance | Regional instance | Regional instance |
| APP-EB Event Backbone | N/A | Regional primary | Regional primary | Regional primary |
| APP-TC Traceability Core | Metadata only | Regional primary | Regional primary | Regional primary |
| APP-OI Operational Intelligence | Aggregation | Regional instance | Regional instance | Regional instance |
| APP-CC Compliance Core | Policy engine | Regional primary | Regional primary | Regional primary |
| APP-DP Data Platform | Cross-region aggregation | Regional warehouse | Regional warehouse | Regional warehouse |
| APP-SO Security Ops | SIEM, policy | Collectors | Collectors | Collectors |
This architecture aligns with the practical need to treat cyber supply chain risk management as a first-class operating capability, not as an afterthought. [R12] It also reflects the broader supply-chain security posture described by ISO 28000. [R13] The security viewpoint (VP-07) in section 28.7 gives the view that visualizes these controls.
Selected runtime sequences that exercise the canonical model.
sequenceDiagram
participant P as Partner
participant G as APP-PC Gateway
participant A as PartnerAuth
participant E as APP-EB Backbone
participant T as APP-TC Traceability
participant D as APP-DP Data Platform
P->>G: POST /events (signed batch)
G->>A: verify partner certificate (CTR-05)
A-->>G: OK, partner profile
G->>E: enqueue raw batch (with hash)
E->>E: validate and deduplicate
E->>T: emit canonical events (CTR-01)
T->>T: resolve identity, compute lineage
T->>D: stream to warehouse
T-->>G: return canonical event IDs
G-->>P: 202 Accepted with ID map
sequenceDiagram
participant C as Customer Portal
participant O as APP-OI Operational Intelligence
participant T as APP-TC Traceability
participant M as ETA Model
C->>O: GET /shipments/{id}/eta
O->>T: read shipment graph and recent events
T-->>O: graph slice and event window
O->>M: predict(shipment_slice)
M-->>O: eta, confidence, contributing signals
O-->>C: ETA response (CTR-04)
sequenceDiagram
participant R as Regulator Portal
participant C as APP-CC Compliance Core
participant T as APP-TC Traceability
participant S as Signing Service
R->>C: POST /compliance-cases/{id}/export
C->>T: resolve case scope (products, shipments, events)
T-->>C: canonical events plus lineage
C->>C: assemble evidence pack under retention policy (INV-05)
C->>S: sign pack with regional key
S-->>C: signed pack
C-->>R: signed evidence bundle (CTR-03)
sequenceDiagram
participant A as Architect
participant R as Repository
participant B as EARB
participant L as Logging
A->>R: submit Waiver draft (WVR-xx)
R->>B: notify EARB of pending waiver
B->>B: review against principle P-08, risk
B-->>R: approve or reject with rationale
R->>L: append to Decision Registry
R-->>A: notify outcome with expiration date
CoDL itemType: ASRCard
Each ASR carries an owner, approver, implementing principle, and
verification approach. The ID column in this table maps to the CoDL
slug field for each ASRCard concept instance.
| ID | ASR | Why it matters | Implements | Owner | Approver | Verification |
|---|---|---|---|---|---|---|
| ASR-01 | The platform must ingest and normalize multi-party events across modes and regions with auditable lineage | Core business value | P-02, P-03 | PER-02 | PER-11 | CTR-01, INV-02 |
| ASR-02 | Every customer-visible shipment or product state must be explainable from retained evidence | Trust and compliance | P-03, P-04, P-10 | PER-17 | PER-11 | INV-01, INV-03, CTR-02 |
| ASR-03 | The platform must support regional data-residency enforcement where required | Global operations | P-09 | PER-17 | PER-08 | INV-05, INV-06 |
| ASR-04 | Partner onboarding must not require core-model rewrites for each carrier or supplier | Scalability | P-01 | PER-03 | PER-11 | CTR-05 |
| ASR-05 | High-severity disruptions must trigger actionable exceptions within 5 minutes median, 10 minutes p95 | Operational value | P-02 | PER-18 | PER-07 | MET-OP-03 |
| ASR-06 | Compliance evidence packages must be reproducible and exportable on demand within 4 hours | Regulatory support | P-04 | PER-17 | PER-10 | CTR-03, MET-OP-06 |
| ASR-07 | The architecture must support both shipment-level and product-level traceability | Market breadth | P-03 | PER-02 | PER-09 | ENT-04, ENT-10, ENT-11, ENT-12 |
| ASR-08 | Governance exceptions must be explicit, time-bounded, and reviewable | Architecture control | P-08 | PER-11 | PER-05 | Waiver register (section 26) |
| ASR-09 | Repository artifacts must be useful, owned, and current within their freshness SLA | BTABOK repository discipline | P-05, P-06, P-07 | PER-16 | PER-11 | MET-AR-02, MET-AR-04 |
| ASR-10 | The platform must support decommissioning and backward-compatible transition plans for legacy protocols | Long-term maintainability | P-01 | PER-03 | PER-11 | Section 29 |
CoDL itemType: DecisionRecord
Each ASD uses the full BTABOK decision shape: scope, type, options
considered, recommendation, reversibility, linked ASRs, status,
approver, and date. The ASD-xx identifiers map to the CoDL
slug field for each DecisionRecord concept instance.
The per-decision field-value blocks below (ASD-01 through ASD-08) illustrate the shape of a CoDL DecisionRecord concept. A formal CoDL definition declares these fields (Scope, Type, Options, Recommendation, Reversibility, Method, Linked ASRs, Linked principles, Cascades, Status, Owner, Approver, Decided) as typed sections and metadata rather than free-form rows. A representative CoDL definition looks roughly like:
concept DecisionRecord extends StandardMetadata {
scope: enum(Enterprise, Solution, Component)
type: enum(Structural, Constraint, Principle, Tactical)
options: list<shortText>
recommendation: shortText
reversibility: enum(High, Medium, Low, NearImpossible)
method: enum(Opinion, Scoring, CostBenefit, BudgetedEvaluation, Spike)
linkedASRs: list<ref<ASRCard>>
linkedPrinciples: list<ref<PrincipleCard>>
cascades: list<ref<DecisionRecord | WaiverRecord>>
status: enum(Proposed, Accepted, Superseded, Rejected)
owner: PersonRef
approver: PersonRef
decided: date
}
| Field | Value |
|---|---|
| Scope | Enterprise |
| Type | Structural |
| Options considered | (a) bespoke canonical schema; (b) EPCIS-aligned canonical with transport extensions; (c) partner-pass-through with no canonical |
| Recommendation | (b) EPCIS-aligned canonical with DCSA transport extensions |
| Reversibility | Low |
| Method | Budgeted evaluation with standards workshop |
| Linked ASRs | ASR-01, ASR-04, ASR-07, ASR-10 |
| Linked principles | P-01, P-02 |
| Cascades | ASD-02, ASD-04 |
| Status | Accepted |
| Owner | PER-02 |
| Approver | PER-11 |
| Decided | 2025-11-08 |
| Field | Value |
|---|---|
| Scope | Solution |
| Type | Structural |
| Options considered | (a) single ingestion-and-canonical service; (b) separate Event Backbone and Traceability Core |
| Recommendation | (b) separate services |
| Reversibility | Medium |
| Method | Architecture spike with load modeling |
| Linked ASRs | ASR-01, ASR-05 |
| Linked principles | P-02 |
| Cascades | ASD-05 |
| Status | Accepted |
| Owner | PER-02 |
| Approver | PER-11 |
| Decided | 2025-11-22 |
| Field | Value |
|---|---|
| Scope | Enterprise |
| Type | Constraint |
| Options considered | (a) single global data plane; (b) regional data planes with global control plane; (c) fully federated per-tenant planes |
| Recommendation | (b) regional data planes with global control plane |
| Reversibility | Near impossible |
| Method | Budgeted evaluation including legal review |
| Linked ASRs | ASR-03 |
| Linked principles | P-09 |
| Cascades | WVR-02 |
| Status | Accepted |
| Owner | PER-17 |
| Approver | PER-05 |
| Decided | 2025-12-02 |
| Field | Value |
|---|---|
| Scope | Solution |
| Type | Structural |
| Options considered | (a) derived lineage computed on demand; (b) lineage as first-class persisted object with pointers |
| Recommendation | (b) first-class lineage |
| Reversibility | Low |
| Method | Cost-benefit analysis |
| Linked ASRs | ASR-01, ASR-02, ASR-06, ASR-07 |
| Linked principles | P-03, P-04 |
| Cascades | INV-01, INV-02 |
| Status | Accepted |
| Owner | PER-02 |
| Approver | PER-11 |
| Decided | 2025-12-14 |
| Field | Value |
|---|---|
| Scope | Solution |
| Type | Structural |
| Options considered | (a) shared analytics and compliance stack; (b) separate compliance services with dedicated retention and signing |
| Recommendation | (b) separate compliance services |
| Reversibility | Medium |
| Method | Scoring |
| Linked ASRs | ASR-02, ASR-03, ASR-06 |
| Linked principles | P-04, P-09 |
| Cascades | INV-05, INV-06 |
| Status | Accepted |
| Owner | PER-17 |
| Approver | PER-10 |
| Decided | 2026-01-09 |
| Field | Value |
|---|---|
| Scope | Enterprise |
| Type | Constraint |
| Options considered | (a) free-for-all Confluence; (b) curated repository with ownership, freshness SLAs, archival rules |
| Recommendation | (b) curated repository |
| Reversibility | Medium |
| Method | Opinion plus reference-benchmarking |
| Linked ASRs | ASR-09 |
| Linked principles | P-05, P-06, P-07 |
| Cascades | CAP-REP-01 |
| Status | Accepted |
| Owner | PER-16 |
| Approver | PER-11 |
| Decided | 2026-01-20 |
| Field | Value |
|---|---|
| Scope | Enterprise |
| Type | Constraint |
| Options considered | (a) informal exceptions via email; (b) formal waiver process with ID, expiration, approver |
| Recommendation | (b) formal waiver process |
| Reversibility | Low |
| Method | Scoring |
| Linked ASRs | ASR-08 |
| Linked principles | P-08 |
| Cascades | Section 26 waivers |
| Status | Accepted |
| Owner | PER-11 |
| Approver | PER-05 |
| Decided | 2026-01-27 |
| Field | Value |
|---|---|
| Scope | Enterprise |
| Type | Principle |
| Options considered | (a) full TOGAF-style deliverable set; (b) BTABOK-style minimum durable deliverable set |
| Recommendation | (b) BTABOK-style minimum set |
| Reversibility | Medium |
| Method | Opinion |
| Linked ASRs | ASR-09 |
| Linked principles | P-05, P-06 |
| Cascades | Section 24 |
| Status | Accepted |
| Owner | PER-01 |
| Approver | PER-11 |
| Decided | 2026-02-03 |
Bidirectional mapping linking each ASR to the ASDs that address it and vice versa.
| ASD-01 | ASD-02 | ASD-03 | ASD-04 | ASD-05 | ASD-06 | ASD-07 | ASD-08 | |
|---|---|---|---|---|---|---|---|---|
| ASR-01 | X | X | X | |||||
| ASR-02 | X | X | ||||||
| ASR-03 | X | X | ||||||
| ASR-04 | X | |||||||
| ASR-05 | X | |||||||
| ASR-06 | X | X | ||||||
| ASR-07 | X | X | ||||||
| ASR-08 | X | |||||||
| ASR-09 | X | X | ||||||
| ASR-10 | X |
Each ASR has at least one addressing ASD. Each ASD addresses at least one ASR. No decision is orphaned from the requirement base.
BTABOK describes the repository as being first for architects, and warns that maintained documentation should stay minimal and useful. [R4][R5]
| ID | Repository area | Contents | Steward |
|---|---|---|---|
| REP-ST | Strategy | Business cases, objective trees, investment themes, roadmaps | PER-06 |
| REP-PS | Principles and Standards | Principle catalog, standards profiles, approved reference patterns | PER-01 |
| REP-DR | Decision Registry | ASDs, waivers, consequences, linked ASRs | PER-11 |
| REP-VL | Viewpoint Library | Reusable viewpoint templates and example views | PER-16 |
| REP-DM | Domain Models | Capability map, information concepts, master taxonomy | PER-02 |
| REP-RA | Reference Architectures | Integration, data, security, deployment, analytics, compliance | PER-01 |
| REP-DA | Delivery Alignment | Initiative traceability, architecture checkpoints, implementation evidence | PER-19 |
| REP-OM | Operate and Measure | KPI definitions, outcome scorecards, architecture fitness metrics | PER-06 |
Every deliverable has an ID, an owner, an approver, a review cadence,
a freshness SLA, and an intended decision audience. The ID column in
this table maps to the CoDL slug field for each deliverable
concept instance.
| ID | Deliverable | Owner | Approver | Cadence | Freshness SLA | Audience |
|---|---|---|---|---|---|---|
| DEL-01 | Business Case | PER-05 | PER-06 | Annual | 12 months | ETSC |
| DEL-02 | Capability Map | PER-01 | PER-11 | Semi-annual | 6 months | Product, EARB |
| DEL-03 | Stakeholder and Concern Map | PER-11 | PER-05 | Quarterly | 3 months | EARB |
| DEL-04 | ASR Catalog | PER-01 | PER-11 | Quarterly | 3 months | EARB, domain councils |
| DEL-05 | Decision Registry | PER-11 | PER-01 | Continuous | 30 days | Everyone |
| DEL-06 | Principle Catalog | PER-01 | PER-11 | Annual | 12 months | Everyone |
| DEL-07 | Reference Architecture Pack | PER-01 | PER-11 | Semi-annual | 6 months | Engineering |
| DEL-08 | Roadmap and Transition Architecture | PER-01 | PER-05 | Quarterly | 3 months | ETSC, product |
| DEL-09 | Waiver Register | PER-11 | PER-05 | Continuous | 30 days | EARB, auditors |
| DEL-10 | Outcome Scorecard | PER-06 | PER-05 | Monthly | 30 days | ETSC, domain councils |
| DEL-11 | Standards Catalog | PER-01 | PER-11 | Semi-annual | 6 months | Engineering, partners |
| DEL-12 | Viewpoint Catalog and View Gallery | PER-16 | PER-11 | Semi-annual | 6 months | Everyone |
CoDL itemType: GovernanceBody for section 25.1, GovernanceRule for section 25.2.
| ID | Body | Scope | Authority | Chair | Cadence |
|---|---|---|---|---|---|
| GOV-ETSC | Executive Technology Steering Committee | Funding, strategic direction, major platform bets | Approve strategic assignments | PER-05 | Quarterly |
| GOV-EARB | Enterprise Architecture Review Board | Reference architecture, major decisions, waivers | Approve or reject material architecture changes | PER-11 | Biweekly |
| GOV-DDC-D | Domain Design Council: Data | Data canonical model, information policies | Define data standards | PER-02 | Biweekly |
| GOV-DDC-I | Domain Design Council: Integration | Partner integration patterns and standards | Define integration standards | PER-03 | Biweekly |
| GOV-DDC-S | Domain Design Council: Security | Security architecture, third-party risk | Define security standards | PER-04 | Biweekly |
| GOV-DDC-O | Domain Design Council: Operations | Observability, SRE, runbooks | Define operational standards | PER-18 | Biweekly |
| GOV-DDC-C | Domain Design Council: Compliance | Retention, audit, regulatory packs | Define compliance standards | PER-17 | Biweekly |
| GOV-RAF-EU | Regional Architecture Forum, EU | Local legal and operational fit | Escalate local exceptions | PER-21 | Monthly |
| GOV-RAF-US | Regional Architecture Forum, Americas | Local legal and operational fit | Escalate local exceptions | PER-13 | Monthly |
| GOV-RAF-APAC | Regional Architecture Forum, APAC | Local legal and operational fit | Escalate local exceptions | PER-12 | Monthly |
| GOV-RAF-MEA | Regional Architecture Forum, MEA | Local legal and operational fit | Escalate local exceptions | PER-14 | Monthly |
| GOV-RSG | Repository Stewardship Group | Artifact freshness, taxonomy, viewpoint catalog | Archive stale artifacts and enforce ownership | PER-16 | Monthly |
Global Corp. uses guided governance, not punitive governance. Validation surfaces warnings by default. Treat-warnings-as-errors is a per-initiative opt-in. This is consistent with BTABOK’s emphasis that governance should remain practical, stakeholder-informed, and enabling. [R6]
| Decision type | Responsible | Accountable | Consulted | Informed |
|---|---|---|---|---|
| New canonical entity added to Event model | DDC-D (GOV-DDC-D) | EARB (GOV-EARB) | DDC-I, DDC-C | Engineering leads |
| New partner integration outside standards | DDC-I | EARB | DDC-D, legal | Regional forum |
| Retention policy change for a jurisdiction | DDC-C | EARB | CISO, legal | Regional forum |
| Regional data residency waiver | DDC-C, CISO | EARB | DDC-D, legal | ETSC |
| Standard deprecation | DDC-I | EARB | Partners, engineering | Customers |
CoDL itemType: WaiverRecord
Concrete waivers demonstrating the pattern. Every waiver has a rule
reference, justification, risk, expiration, and approver. The WVR-xx
identifiers map to the CoDL slug field for each
WaiverRecord concept instance.
| Field | Value |
|---|---|
| Rule reference | P-01 Standards before custom, ASD-01 |
| Description | FreightCo uses a proprietary XML feed. No EPCIS or DCSA equivalent exists for their consolidation events. Custom adapter required. |
| Justification | FreightCo represents 14% of APAC consolidation volume. No feasible alternative in 2026. |
| Risk | Custom mapping increases onboarding cost for similar partners and creates ongoing maintenance obligation. |
| Compensating controls | Adapter isolated in APP-PC, quarterly review for standards emergence, sunset clause on next FreightCo API release. |
| Requested by | PER-03 Maria Oliveira |
| Approver | PER-11 Anja Petersen (EARB) |
| Approved | 2026-03-02 |
| Expires | 2027-03-02 |
| Status | Active |
| Field | Value |
|---|---|
| Rule reference | INV-06 PII regional control, ASD-03 |
| Description | EU DPP index queries require product metadata to be available in a cross-region read path. |
| Justification | DPP queries arrive from multiple regions; regional-only access fails read latency SLA. |
| Risk | Metadata carries limited supplier identifiers that may be interpreted as PII under some readings. |
| Compensating controls | Metadata scrubbed of direct PII; legal review signed off; quarterly audit of replicated fields. |
| Requested by | PER-15 Marcus Weber |
| Approver | PER-08 Chioma Okafor (CISO) and PER-11 Anja Petersen (EARB) |
| Approved | 2026-02-18 |
| Expires | 2026-08-18 |
| Status | Active, renewal review pending |
| Field | Value |
|---|---|
| Rule reference | P-07 Repository is first for architects, reference architecture for APP-PC |
| Description | Legacy-Bridge module shares a canonical model library with its successor during the LGY-01 decommissioning window. |
| Justification | Parallel operation required during migration to guarantee evidence continuity. |
| Risk | Shared library reduces isolation until migration completes. |
| Compensating controls | Freeze changes to shared library; daily integrity audit; migration completion target 2026-07-31. |
| Requested by | PER-18 Kenji Sato |
| Approver | PER-11 Anja Petersen (EARB) |
| Approved | 2026-03-14 |
| Expires | 2026-08-31 |
| Status | Active |
CoDL itemType: ViewpointCard
Global Corp. uses a reusable viewpoint catalog. Each viewpoint has an
ID, audience, concern, required models, and an owner. The View Gallery
in section 28 instantiates each viewpoint with at least one concrete
view. The ID column in this table maps to the CoDL slug
field for each ViewpointCard concept instance.
| ID | Viewpoint | Audience | Concern answered | Required models | Owner |
|---|---|---|---|---|---|
| VP-01 | Strategic | CEO, CFO, board | Why are we doing this and what value do we expect? | Objective tree, benefit metric map | PER-05 |
| VP-02 | Capability | Product and enterprise leaders | Which capabilities matter and where are the gaps? | Capability heat map | PER-09 |
| VP-03 | Stakeholder | Sponsors, change leaders | Who is affected, who decides, who resists? | Power-interest grid, concern map | PER-11 |
| VP-04 | Information | Data and compliance teams | What is the canonical meaning of tracked things and events? | Entity model, event model, lineage model | PER-02 |
| VP-05 | Integration | Engineering and partner teams | How do partners connect and how are standards applied? | Partner interaction model, standards adoption map | PER-03 |
| VP-06 | Operational | Control-tower and SRE teams | How does the business run day to day? | Process flow, exception flow | PER-18 |
| VP-07 | Security | CISO, auditors, regulators | How are trust, isolation, and evidence maintained? | Trust boundary model, control map | PER-04 |
| VP-08 | Deployment | Infrastructure and operations leaders | Where does it run and how is resilience achieved? | Deployment topology, failover map | PER-20 |
| VP-09 | Governance | EARB, executives | How are standards, waivers, and major decisions controlled? | Approval flow, RACI | PER-11 |
| VP-10 | Outcome | Sponsors and finance | Are we realizing the promised value? | Outcome scorecard | PER-06 |
CoDL itemType: CanvasDefinition (CaDL)
One view per viewpoint. Each view (V-01 through V-10) is a CaDL
canvas definition over one or more CoDL concepts defined elsewhere in
this document. Following the governing CaDL principle that a canvas is a
view of a concept and not a separate stored object type, the Mermaid
diagrams below are the rendered output; the CaDL definition describes
which concepts, sections, and fields are surfaced by the canvas. The
V-xx identifiers map to the CoDL slug field for each
CanvasDefinition instance.
An illustrative CaDL definition for V-01 (the strategic objective tree) is shown below. The Mermaid rendering that follows remains the canonical human-readable output; the CaDL block is the structural intent.
canvas V-01-strategic-objective-tree {
renders: viewpoint<VP-01>
audience: [STK-01, STK-02, STK-12]
layout: tree
root: concept<EnterpriseArchitecture>.mission
branches: list<concept<Objective>> from strategic.objectives
leaves: list<concept<ASRCard>> from objective.implementedBy
surfaces: [slug, name, shortDescription]
rendererHints: { orientation: "top-down", grouping: "by-objective" }
}
flowchart TB
Mission["Mission: Trusted global supply-chain visibility"]
O1["Obj 1: Preferred cross-enterprise platform"]
O2["Obj 2: Disruption detection in minutes"]
O3["Obj 3: Low partner onboarding effort"]
O4["Obj 4: Regulated traceability support"]
O5["Obj 5: Reusable architecture repository"]
Mission --> O1
Mission --> O2
Mission --> O3
Mission --> O4
Mission --> O5
O2 --> ASR05["ASR-05 actionable exceptions in 5 min"]
O3 --> ASR04["ASR-04 partner onboarding without rewrites"]
O4 --> ASR06["ASR-06 compliance export in 4 h"]
O5 --> ASR09["ASR-09 artifacts owned and current"]
flowchart LR
classDef critical fill:#C62828,stroke:#8E0000,color:#fff
classDef high fill:#EF6C00,stroke:#B53D00,color:#fff
classDef medium fill:#F9A825,stroke:#C17900,color:#000
classDef low fill:#9E9E9E,stroke:#616161,color:#fff
C1["CAP-PAR Partner Interop
baseline:Low-medium target:High"]:::critical
C2["CAP-TRC Traceability
baseline:Medium target:High"]:::critical
C3["CAP-TAS Trust & Security
baseline:Medium target:High"]:::critical
C4["CAP-REP Repository
baseline:Low-medium target:High"]:::critical
C5["CAP-ENT Enterprise Mgmt
baseline:Medium target:High"]:::critical
C6["CAP-CPS Compliance
baseline:Low target:Medium-high"]:::high
C7["CAP-CTR Control Tower
baseline:Medium-low target:Medium-high"]:::high
C8["CAP-DAI Data & Intel
baseline:Medium target:High"]:::high
C9["CAP-OUT Outcome Measurement
baseline:Low target:High"]:::high
C10["CAP-GOV Governance
baseline:Low-medium target:Medium-high"]:::medium
C11["CAP-CDL Customer Delivery
baseline:Medium target:High"]:::high
C12["CAP-COM Commercial
baseline:Medium target:Medium-high"]:::medium
quadrantChart
title Stakeholder power-interest grid
x-axis Low Interest --> High Interest
y-axis Low Power --> High Power
quadrant-1 Manage closely
quadrant-2 Keep satisfied
quadrant-3 Monitor
quadrant-4 Keep informed
STK-01 CEO: [0.9, 0.95]
STK-02 CFO: [0.85, 0.9]
STK-03 COO: [0.6, 0.85]
STK-04 CPO: [0.9, 0.88]
STK-05 Chief Architect: [0.95, 0.85]
STK-06 CISO: [0.85, 0.9]
STK-07 Regional Ops APAC: [0.8, 0.55]
STK-08 Integration Partner: [0.7, 0.45]
STK-09 Customer SC Director: [0.9, 0.6]
STK-10 Regulatory Affairs: [0.75, 0.55]
STK-11 Sustainability: [0.65, 0.5]
STK-12 EARB: [0.9, 0.85]
flowchart LR
P["Partner Payload (EPCIS XML)"]
H["Payload Hash (INV-01)"]
EV["Canonical Event ENT-13"]
L["LineagePointer (INV-02)"]
S["Subject (Shipment/Item)"]
EVI["Evidence Store"]
P -->|hash| H
H --> EV
P -->|store| EVI
EV -->|references| L
L --> EVI
EV --> S
flowchart TB
subgraph Standards
EPCIS["GS1 EPCIS 2.0"]
DCSA["DCSA T&T"]
IoT["IoT Telemetry Profiles"]
end
subgraph Patterns
REST["REST/JSON"]
WEB["Webhooks"]
AS2["AS2/SFTP"]
EDI["EDI"]
end
subgraph Onboarding
CERT["Partner Certification (CTR-05)"]
MAP["Mapping Pack"]
SLA["Integration SLA"]
end
Standards --> Patterns
Patterns --> Onboarding
Onboarding --> APP_PC["APP-PC Partner Gateway"]
flowchart LR
IN["Event arrives"] --> RN["Normalized (CTR-01)"]
RN --> RU["Rule evaluation"]
RU -->|clean| OK["No action"]
RU -->|anomaly| AL["Alert raised (ENT-17)"]
AL --> TR["Triage"]
TR -->|confirmed| EX["Exception (ENT-18)"]
EX --> RES["Resolution workflow"]
EX --> NOT["Customer notification"]
RES --> CL["Closed with evidence"]
flowchart TB
classDef trust fill:#2E6295,stroke:#1A3D5C,color:#fff
classDef dmz fill:#F9A825,stroke:#C17900,color:#000
classDef ext fill:#9E9E9E,stroke:#616161,color:#fff
Partner["Partner (external)"]:::ext
Customer["Customer (external)"]:::ext
DMZ["Edge: Partner Gateway + Customer Portal"]:::dmz
Trusted["Trusted Plane: Event Backbone, Traceability Core, Compliance Core"]:::trust
KMS["Regional KMS"]:::trust
SIEM["Security Ops (APP-SO)"]:::trust
Partner -.mTLS + signed payload.-> DMZ
Customer -.OAuth2 + mTLS.-> DMZ
DMZ --> Trusted
Trusted --> KMS
DMZ --> SIEM
Trusted --> SIEM
flowchart LR
classDef primary fill:#2E6295,stroke:#1A3D5C,color:#fff
classDef secondary fill:#438DD5,stroke:#2E6295,color:#fff
classDef dr fill:#999999,stroke:#6B6B6B,color:#fff
EU1["EU Primary (Dublin)"]:::primary
EU2["EU DR (Frankfurt)"]:::dr
US1["US Primary (Virginia)"]:::primary
US2["US DR (Oregon)"]:::dr
APAC1["APAC Primary (Singapore)"]:::primary
APAC2["APAC DR (Tokyo)"]:::dr
CP["Global Control Plane (multi-region active-active)"]:::secondary
CP --> EU1
CP --> US1
CP --> APAC1
EU1 -.failover.-> EU2
US1 -.failover.-> US2
APAC1 -.failover.-> APAC2
flowchart TB
Draft["Draft (author)"] --> DDC["Domain Design Council review"]
DDC --> RAF["Regional Architecture Forum review (if regional impact)"]
RAF --> EARB["EARB review"]
EARB -->|approve| Accepted["Accepted and logged in Decision Registry"]
EARB -->|waiver needed| Waiver["Waiver drafted (see WVR-xx)"]
Waiver --> EARBW["EARB waiver decision"]
EARBW -->|approve| Accepted
EARB -->|reject| Rejected["Rejected with rationale"]
Accepted --> Exec["Executed in plan"]
Exec --> Verified["Verified post-deployment"]
See section 32 for the full Outcome Scorecard. This view renders the top-line KPI panel referenced by VP-10.
flowchart LR
OUT["Outcome Scorecard"]
OUT --> B1["Business Metrics
MET-BZ-01..05"]
OUT --> A1["Architecture Metrics
MET-AR-01..05"]
OUT --> O1["Operational Metrics
MET-OP-01..06"]
B1 --> STK01["STK-01 CEO"]
B1 --> STK02["STK-02 CFO"]
A1 --> STK05["STK-05 Chief Architect"]
A1 --> STK12["STK-12 EARB"]
O1 --> STK03["STK-03 COO"]
O1 --> STK07["STK-07 Regional Ops"]
CoDL itemType: LegacyModernizationRecord
The LGY-xx identifiers map to the CoDL slug field for
each LegacyModernizationRecord concept instance.
| Field | Value |
|---|---|
| System | GlobalTrack-APAC v3 |
| Acquired via | 2022 acquisition of APAC logistics analytics firm |
| Current scope | Visibility tooling for 112 APAC customers, ocean and road only |
| Replaced by | APP-TC, APP-OI, APP-CX (Global Corp. core) |
| Owner | PER-12 Ravi Menon |
| Sponsor | PER-07 Hiroshi Tanaka |
| Current state | Production, feature-frozen |
| Target state | Decommissioned |
| Migration window | 2026-03-01 to 2026-08-31 |
| Evidence preservation | Full event history exported to APP-DP Data Platform archive with lineage preserved |
| Customer migration plan | Tiered, 14 customer waves by volume and contract renewal date |
| Parallel operation | Shared canonical library under WVR-03 until cutover |
| Risks | Evidence discontinuity, customer retention during migration, partner API breakage |
| Mitigations | Daily integrity audit, dedicated migration team, per-customer parallel run of 30 days |
| Status | Active, wave 4 of 14 |
| Field | Value |
|---|---|
| System | EDI214-Adapter-v2 |
| Current scope | 23 US road carriers still transmit via EDI 214 only |
| Target state | Retained as bridge until standards adoption exceeds 90% of US carriers |
| Owner | PER-03 Maria Oliveira |
| Sponsor | PER-13 Sarah Goldberg |
| Review cadence | Quarterly against standards-adoption metric |
| Status | Retained |
CoDL itemType: TransitionArchitecture for each T1/T2/T3 and target block; RoadmapItem for capability movements within a transition.
Each transition references specific capability movements (baseline to target) and the ASRs/ASDs it advances.
CoDL itemType: RiskCard
The ID column in this table maps to the CoDL slug field
for each RiskCard concept instance.
| ID | Risk | Impact | Probability | Owner | Mitigation |
|---|---|---|---|---|---|
| RSK-01 | Over-customization for large customers | Platform fragmentation | Medium | PER-01 | Standards-first policy, waiver control |
| RSK-02 | Partner data quality variability | False alerts, poor ETA quality | High | PER-03 | Lineage, confidence scoring, certification profiles |
| RSK-03 | Regional data sovereignty conflicts | Regulatory exposure | Medium | PER-17 | Regional data planes, jurisdiction packs, ASD-03 |
| RSK-04 | Artifact sprawl in repository | Low trust in architecture | High | PER-16 | Freshness SLA, archive policy, owner enforcement, ASD-06 |
| RSK-05 | Governance overload | Slower delivery | Medium | PER-11 | Guided governance, tiered review thresholds, treat-warnings-as-errors per initiative |
| RSK-06 | Weak business-value traceability | Architecture loses sponsorship | Medium | PER-06 | Outcome scorecard (section 32), benefit owner |
| RSK-07 | Compliance surface expands faster than platform | Market lag | High | PER-10 | Modular compliance packs |
| RSK-08 | Cyber supplier risk | Compromise through ecosystem | Medium | PER-08 | Supplier risk assessments and policy requirements, P-10 |
| RSK-09 | LGY-01 migration evidence discontinuity | Customer trust loss | Low | PER-12 | Daily integrity audit, parallel run, WVR-03 |
| RSK-10 | Shadow IT reintroducing fragmentation | Architecture erosion | Medium | PER-01 | Repository visibility, discovery scans, waiver mandatory |
CoDL itemType: ScorecardDefinition (SpecChat extension)
The MET-xx identifiers map to the CoDL slug field for
each metric concept instance within the scorecard.
| ID | Metric | Baseline | Target (month 30) | Measurement | Owner |
|---|---|---|---|---|---|
| MET-BZ-01 | Customer disruption detection time (median) | 3.4 hours | 5 minutes | Platform telemetry | PER-18 |
| MET-BZ-02 | Customer renewal rate (logo) | 82% | 93% | CRM | PER-09 |
| MET-BZ-03 | Partners using standards-based interfaces | 41% | 85% | Partner catalog | PER-03 |
| MET-BZ-04 | Compliance package turnaround (p95) | 38 hours | 4 hours | Compliance Core logs | PER-17 |
| MET-BZ-05 | Revenue from premium compliance and sustainability services | USD 28M | USD 120M | Finance | PER-06 |
| ID | Metric | Baseline | Target (month 30) | Measurement | Owner |
|---|---|---|---|---|---|
| MET-AR-01 | Major changes with decision record | 44% | 100% | Decision Registry | PER-11 |
| MET-AR-02 | Reusable standards with current owner and review date | 52% | 98% | Standards Catalog | PER-01 |
| MET-AR-03 | Waiver volume and waiver aging (median age) | n/a baseline | under 45 days | Waiver Register | PER-11 |
| MET-AR-04 | Repository freshness rate | 58% | 95% | Repository telemetry | PER-16 |
| MET-AR-05 | Strategic initiatives mapped to target capabilities | 67% | 100% | Roadmap to capability map | PER-01 |
| ID | Metric | Baseline | Target (month 30) | Measurement | Owner |
|---|---|---|---|---|---|
| MET-OP-01 | Event ingestion timeliness (p95) | 12 seconds | 2 seconds | Platform telemetry | PER-02 |
| MET-OP-02 | Traceability completeness (events with lineage) | 71% | 99.5% | INV-02 check | PER-02 |
| MET-OP-03 | High-severity exception time to actionable alert (p95) | 24 minutes | 10 minutes | Operational Intelligence | PER-18 |
| MET-OP-04 | Alert precision | 62% | 90% | Triage feedback | PER-18 |
| MET-OP-05 | Partner onboarding lead time (median) | 84 days | 21 days | Partner Onboarding service | PER-03 |
| MET-OP-06 | Audit evidence reproduction time (p95) | 52 hours | 4 hours | Compliance Core | PER-17 |
CoDL itemType: StandardCard
External and internal standards adopted by Global Corp. The STD-xx
identifiers map to the CoDL slug field for each
StandardCard concept instance.
| ID | Standard | Version | Scope | Owner | Review cadence | Status |
|---|---|---|---|---|---|---|
| STD-01 | GS1 EPCIS and CBV | 2.0 | Event semantics across product, shipment, transport | PER-02 | Annual | Adopted |
| STD-02 | DCSA Track and Trace | current | Ocean shipment milestones and APIs | PER-03 | Annual | Adopted |
| STD-03 | ISO 28000 | 2022 | Supply chain security management | PER-04 | Biennial | Adopted |
| STD-04 | NIST CSF | 2.0 | Cybersecurity framework including supply chain | PER-08 | Annual | Adopted |
| STD-05 | EU Ecodesign Sustainable Products Regulation | current | DPP compliance | PER-15 | Continuous | Adopted |
| STD-06 | FDA FSMA 204 | final rule 2023 | Food traceability CTEs and KDEs | PER-10 | Continuous | Adopted |
| STD-07 | OAuth 2.1 / OIDC | current | Customer and partner identity | PER-04 | Annual | Adopted |
| STD-08 | mTLS with certificate pinning | internal profile v1.2 | Service-to-service and partner calls | PER-04 | Semi-annual | Adopted |
| STD-09 | OpenTelemetry | current | Observability across platform | PER-20 | Annual | Adopted |
| STD-10 | Global Corp. Canonical Event Schema | v1.0 | Internal canonical event model | PER-02 | Quarterly | Adopted |
Global Corp. is intentionally designed as a BTABOK Engagement Model-complete fictional enterprise.
It does not stop at a technical reference architecture. It treats architecture as a practice that spans:
That is the key point. A supply-chain tracking company is a good vehicle for this exercise because the domain naturally forces the architecture to confront interoperability, traceability, regulation, resilience, and distributed decision-making. The resulting enterprise architecture is therefore a credible testbed for BTABOK, not just a decorative scenario.
This document also serves as the seed for a SpecChat BTABOK profile worked example. Appendix B maps the enterprise architecture into SpecChat artifacts.
[R1] Business Technology Architecture Body of Knowledge | IASA - BTABoK. https://iasa-global.github.io/btabok/
[R2] Architecture Lifecycle | IASA - BTABoK. https://iasa-global.github.io/btabok/architecture_lifecycle.html
[R3] Views and Viewpoints | IASA - BTABoK. https://iasa-global.github.io/btabok/views.html
[R4] Deliverables | IASA - BTABoK. https://iasa-global.github.io/btabok/deliverables.html
[R5] Repository | IASA - BTABoK. https://iasa-global.github.io/btabok/repository.html
[R6] Governance Approach | IASA - BTABoK. https://iasa-global.github.io/btabok/governance_em.html
[R7] World Bank Releases Logistics Performance Index 2023. https://www.worldbank.org/en/news/press-release/2023/04/21/world-bank-releases-logistics-performance-index-2023
[R8] EPCIS and CBV | GS1. https://www.gs1.org/standards/epcis
[R9] Track and Trace standard | DCSA. https://dcsa.org/standards/track-and-trace
[R10] Digital Product Passport under the Ecodesign for Sustainable Products Regulation | European Commission. https://commission.europa.eu/energy-climate-change-environment/standards-tools-and-labels/products-labelling-rules-and-requirements/ecodesign-sustainable-products-regulation_en
[R11] FSMA Final Rule on Requirements for Additional Traceability Records for Certain Foods (Food Traceability Rule, Section 204) | FDA. https://www.fda.gov/food/food-safety-modernization-act-fsma/fsma-final-rule-requirements-additional-traceability-records-certain-foods
[R12] NIST Cybersecurity Framework 2.0: Quick-Start Guide for Cybersecurity Supply Chain Risk Management (SP 1305) | NIST. https://www.nist.gov/publications/nist-cybersecurity-framework-20-quick-start-guide-cybersecurity-supply-chain-risk
[R13] ISO 28000:2022 Security and resilience, Security management systems, Requirements | ISO. https://www.iso.org/standard/79612.html
[R14] BTABOK and SpecChat Alignment Report,
repository source archive/BTA-BOK-integration.md,
dated 2026-04-16. The original broad-scope gap analysis, preserved for
provenance.
[R15] Preiss, Paul. Structured Concept Definition Language. BTABoK 3.2, IASA Global Education Portal (2026).
[R16] Repository: docs/design-notes/SpecLang-Design.md.
The consolidated design covering Core SpecLang, the BTABOK profile, CoDL
and CaDL alignment, and the Engagement Model scope. It records both the
Option A decision (CoDL syntax canonical) and the Option X decision
(infrastructure absorption into Core SpecLang). It supersedes and
incorporates the prior CoDL-CaDL-Integration-Notes.md,
Core-SpecLang-Absorption-Design.md, BTABOK-Profile-v0.1-Design.md, and
BTABOK-EngagementModel-Mapping.md (all now in archive/).
[R17] Repository: docs/design-notes/Spec-Type-System.md.
Consolidated design covering the spec type taxonomy, rationale, and
validation architecture.
This appendix maps the Global Corp. enterprise architecture into a SpecChat spec collection using the BTABOK profile. It is a scaffolding sketch, not a final spec set.
Every file in the table below carries the Core SpecLang SpecItem metadata (specLangVersion, slug, itemType, name, version, publishStatus, authors, reviewers, committer, tags, createdAt, updatedAt, retentionPolicy, and freshnessSla for indefinite-retention specs) regardless of whether its Profile column shows Core, Core + BTABOK, or BTABOK. The collection manifest additionally declares profileVersion, codlVersion, and cadlVersion when the BTABOK profile is active. Core SpecItem metadata is universal infrastructure after the Option X decision. Profile scope determines only which concept types, concept-specific fields, and CaDL canvases activate on top of the core.
| File | Type | Profile | Tier | CoDL itemType | Description |
|---|---|---|---|---|---|
| global-corp.manifest.md | Manifest | Core + BTABOK | n/a | CollectionManifest | Root manifest for the collection |
| global-corp.architecture.spec.md | Base System Spec | Core + BTABOK | 0 | SystemSpec | Enterprise base spec, system context and principles |
| global-corp.stakeholders.spec.md | Context/Stakeholder Spec | BTABOK | 0 | StakeholderCard | STK-01..STK-12 with concerns and viewpoints |
| global-corp.asrs.spec.md | ASR/Quality Spec | BTABOK | 0 | ASRCard | ASR-01..ASR-10 |
| global-corp.decisions.spec.md | Decision Registry | BTABOK | 1 | DecisionRecord | ASD-01..ASD-08 |
| global-corp.governance.spec.md | Governance Spec | BTABOK | 1 | GovernanceBody, GovernanceRule | Governance bodies, rules, RACI |
| global-corp.waivers.spec.md | Waiver Register | BTABOK | 2 | WaiverRecord | WVR-01..WVR-03 |
| global-corp.roadmap.spec.md | Roadmap/Transition Spec | BTABOK | 1 | TransitionArchitecture, RoadmapItem | T1, T2, T3, target |
| global-corp.viewpoints.spec.md | Viewpoint Catalog | BTABOK | 0 | ViewpointCard | VP-01..VP-10 |
| global-corp.views.spec.md | View Gallery | Core + BTABOK | 1 | CanvasDefinition | V-01..V-10 |
| global-corp.standards.spec.md | Standards Catalog | BTABOK | 0 | StandardCard | STD-01..STD-10 |
| event-backbone.spec.md | Base System Spec | Core + BTABOK | 2 | SystemSpec | APP-EB detailed system spec |
| traceability-core.spec.md | Base System Spec | Core + BTABOK | 2 | SystemSpec | APP-TC detailed system spec |
| partner-connectivity.spec.md | Base System Spec | Core + BTABOK | 2 | SystemSpec | APP-PC detailed system spec |
| compliance-core.spec.md | Base System Spec | Core + BTABOK | 3 | SystemSpec | APP-CC detailed system spec |
| operational-intelligence.spec.md | Base System Spec | Core + BTABOK | 3 | SystemSpec | APP-OI detailed system spec |
| dpp-sustainability.spec.md | Base System Spec | Core + BTABOK | 3 | SystemSpec | APP-SD detailed system spec |
| legacy-globaltrack-apac.decommission.spec.md | Legacy Modernization Spec | BTABOK | 3 | LegacyModernizationRecord | LGY-01 decommissioning plan |
| experiment-cold-chain-fusion.spec.md | Experiment Spec | BTABOK | 3 | ExperimentCard | EXP-01 |
| experiment-dpp-electronics.spec.md | Experiment Spec | BTABOK | 3 | ExperimentCard | EXP-02 |
| experiment-multimodal-eta.spec.md | Experiment Spec | BTABOK | 3 | ExperimentCard | EXP-03 |
| outcome-scorecard.spec.md | Scorecard Spec | BTABOK | 2 | ScorecardDefinition | MET-BZ, MET-AR, MET-OP |
All references use the stable human-readable IDs introduced in this
document (ASR-xx, ASD-xx, WVR-xx, STK-xx, VP-xx, V-xx, MET-xx, STD-xx,
ENT-xx, CTR-xx, INV-xx, DYN-xx, EXP-xx, LGY-xx, CAP-xx, P-xx, PER-xx,
BSVC-xx, APP-xx, DEL-xx, REP-xx, GOV-xx, VS-xx, RSK-xx). Each ID serves
as the Core SpecLang slug field. Cross-spec references use
the three Core SpecLang reference types (introduced from CoDL via Option
X): ref<T> for strong references within the
collection, weakRef for references that may resolve outside
the collection, and externalRef for references to
non-SpecChat systems (Jira, Confluence, Miro). Each ID is globally
unique within the Global Corp. collection. Cross-spec references cite
the ID with no file-path dependency, so moves and renames do not break
the reference graph.
Per the SpecChat BTABOK integration scope decision (see SpecLang-Design.md Section 7), only the Engagement Model is mapped to SpecChat. This appendix declares which sections of this document feed Engagement Model specs and which are enterprise context that would not be expressed as SpecChat artifacts.
| Section | Content | SpecChat EM extraction | Notes |
|---|---|---|---|
| 1, 2, 4 | Purpose, design intent, corporate profile | Prose in base spec or manifest | Background, not itself a spec |
| 5 | Strategic thesis and objectives | Prose context only | Value Model territory; reference only |
| 6 | Business case (NABC) | Reference only | Value Model, not extracted |
| 8 | Business architecture: value streams, capabilities | Capability catalog (reference) | Partially extractable as context |
| 9 | Personas directory | Owner/approver reference data in manifest | Identity references only, not a spec |
| 10 | Stakeholders and concerns | Stakeholder Spec (EM) | Extracted as context spec |
| 11 | Principles | Principles catalog (EM) | Extracted |
| 12 | Lifecycle walkthrough | Prose in governance/roadmap specs | Context |
| 13 | Experiment cards | Experiment Specs (EM) | Extracted |
| 14-19 | Target architecture, applications, information, integration, deployment, security | Base System Specs (EM) | Extracted as multiple system specs |
| 20 | Dynamic interactions | Dynamic blocks in base specs (Core SpecLang) | Extracted |
| 21 | ASRs | ASR/Quality Spec (EM) | Extracted |
| 22 | ASDs | Decision Specs (EM) | Extracted |
| 23 | Traceability matrix | Derived projection (EM) | Generated from ASRs and ASDs |
| 24 | Repository and deliverables | Manifest metadata (EM) | Extracted into manifest |
| 25 | Governance bodies and rules | Governance Spec (EM) | Extracted |
| 26 | Waivers | Waiver Register (EM) | Extracted |
| 27 | Viewpoint catalog | Viewpoint Catalog (EM) | Extracted |
| 28 | View gallery | View Gallery (EM) | Extracted |
| 29 | Legacy modernization | Legacy Modernization Spec (EM) | Extracted |
| 30 | Roadmap and transitions | Roadmap/Transition Spec (EM) | Extracted |
| 31 | Risks | Risk register metadata (EM) | Extracted as manifest or dedicated spec |
| 32 | Outcome scorecard | Scorecard Spec (EM boundary case) | Extracted; some Value Model overlap |
| 33 | Standards catalog | Standards Catalog Spec (EM) | Extracted |
| 34 | Final assessment | Prose only | Document closing, not a spec |
Out of scope entirely (mentioned here but not extracted into SpecChat): career paths for personas, competency models for architects, organizational structure, compensation and employment relationships, community and professional development activities. These are People Model and Competency Model concerns.