Back to list
Harery

phase-02-requirements-scope

by Harery

Enterprise 8-Phase Software Development Lifecycle Framework with Quality Gates, Multi-Agent Orchestration, and AI-Assisted Development using Claude Code. Perfect for regulated industries (HIPAA, SOC 2, PCI DSS, SOX, GDPR).

1🍴 0📅 Jan 22, 2026

SKILL.md


name: "phase_02_requirements_scope" description: "You'll transform your PRD into detailed, testable requirements. Through stakeholder workshops and user validation, you'll create crystal-clear functional requirements, solid non-functional requirements, comprehensive security specifications, and a traceability matrix that connects everything. This is where vision becomes buildable." phase: 2 phase_name: "Requirements & Scope" owner: "Product Owner (functional), CTA (technical)" secondary_owner: "Business Analyst / Systems Analyst" participants: ["Tech Lead", "CTA", "Security Lead", "Compliance Officer", "Data Architect", "DevOps", "SRE", "Performance Engineer", "Users", "Subject Matter Experts"] entry_criteria: [ "Business case approved by Executive Sponsor", "PRD completed and reviewed", "Technical feasibility confirmed", "Security considerations documented", "Stakeholders aligned and committed" ] exit_criteria: [ "Functional requirements documented and approved", "Non-functional requirements defined and baselined", "Security requirements documented and approved", "Compliance requirements identified and validated", "Data requirements documented", "Requirements traceability matrix created", "All requirements signed off by stakeholders", "Go/no-go decision to proceed to Phase 3" ] estimated_duration: "1 week" dependencies: ["phase_01_vision_strategy"] outputs: [ "Functional Requirements Specification", "User Stories and Use Cases", "Acceptance Criteria", "Prioritized Backlog", "Non-Functional Requirements Specification", "Performance SLAs", "Security Requirements Specification", "Compliance Requirements Specification", "Data Requirements Specification", "Requirements Traceability Matrix" ] next_phase: "phase_03_architecture_design"

Phase 2: Requirements & Scope

Where Vision Becomes Buildable


Welcome to the Detail Phase

Great work completing Phase 1! You've got funding, alignment, and a clear vision. Now comes the critical work that separates successful products from the "we built the wrong thing" disasters.

Here's the truth: Most failed projects fail in this phase, not in development. They build beautifully... the wrong thing. You're not going to be one of those projects.

Here's what you'll walk away with:

Requirements so clear a developer could start coding tomorrow Non-functional requirements that ensure your product actually works at scale Security requirements designed in (not patched on later) A traceability matrix that connects every requirement to its source Stakeholders who've explicitly signed off on exactly what you're building

Time investment: 8-12 weeks (yes, it's substantial—this is where you buy down risk)


What This Phase Feels Like (A Real Story)

I worked with a SaaS company that rushed through requirements. They spent 3 weeks on this phase and 9 months building. At launch, customers said "this doesn't solve our problem." They spent 6 months rebuilding.

Contrast that with a team I advised that spent 10 weeks on requirements:

  • Zero scope creep during development (the developers were amazed)
  • Stakeholder harmony—no mid-project "that's not what I wanted"
  • Security clearance obtained in half the usual time (requirements were crystal clear)
  • Launched on schedule with 94% user satisfaction

Their Tech Lead told me: "I was frustrated by how long requirements took. Two months later, I was thanking you. Every question I had was already answered."

That's the feeling we're aiming for. This phase feels slow, but it makes everything else fast.


Your Journey Through This Phase

Think of this phase as building the blueprint for a house:

WeekFocusWhat You're DoingWhy It Matters
1-3Functional RequirementsDetailed feature definitions, user stories, acceptance criteriaThese are the "what" everyone will build
4-5Non-Functional RequirementsPerformance, scalability, availability targetsThese ensure it works well under load
6-7Security & ComplianceSecurity controls, regulatory requirements, audit needsSecurity first, compliance baked in
8-9Data RequirementsData models, privacy, retention, volumesData is your most valuable asset
10-11Traceability & Sign-offRTM creation, stakeholder reviews, formal sign-offsEveryone commits to the same plan

Emotional checkpoint: You'll start energized from Phase 1, hit the "requirements fatigue" wall around week 6 (totally normal), push through detailed documentation, and end with deep confidence. The wall is real—you can climb it.


Who's on This Journey With You?

This phase needs more specialists than Phase 1. Requirements depth demands expertise.

RoleThey're Responsible ForWhy They Matter Now
You (Product Owner)Functional requirements, user stories, prioritiesYou own the "what" from the user's perspective
CTANon-functional requirements, technical feasibilityThey ensure requirements are actually achievable
Business AnalystEliciting and documenting requirementsThey're the requirements translation engine
Security LeadSecurity requirements and controlsSecurity requirements now = security built in later
Compliance OfficerRegulatory requirements and mappingNon-compliance discovered later = project delay
Data ArchitectData models, privacy, volumesData architecture is hard to change later

Product Owner (You): You'll spend 40-50 hours per week reviewing requirements, meeting with stakeholders, and prioritizing. You're the final arbiter of "what's in scope."

Business Analyst: This is their time to shine. They'll run workshops, document requirements, create user stories, and build the RTM. A great BA is worth their weight in gold.

CTA: They'll spend 10-15 hours per week reviewing requirements for technical feasibility. They'll catch requirements like "real-time sync across 10M users" early, when it's just a conversation.

Security Lead: They'll define security requirements like "all API calls must be authenticated" and "PII must be encrypted at rest." These become architecture drivers in Phase 3.

Compliance Officer: They'll map requirements to regulations like GDPR or HIPAA. One compliance requirement missed now can can cause significant delays in delays later.

Data Architect: They'll define data entities, relationships, and volumes. They'll ask questions like "how many users will we have in 3 years?" that impact infrastructure planning.


Step 1: Functional Requirements

What You'll Achieve

You'll transform PRD features into detailed, testable requirements that leave no room for ambiguity.

The outcome: A functional requirements specification so clear that developers, testers, and stakeholders all have the same understanding.

Your Action Plan

WeekFocusKey ActivitiesDeliverable
Week 1Requirements ElicitationStakeholder workshops, user interviews, requirements gatheringRaw requirements list
Week 2User Stories & AcceptanceCreate user stories, define acceptance criteria, prioritize (MoSCoW)User stories, acceptance criteria, prioritized backlog
Week 3Documentation & ValidationWrite functional requirements spec, review with stakeholdersFunctional Requirements Specification

What Makes a Requirement "Good"?

Every requirement should pass this test:

✓ Specific: Clear and unambiguous

  • Bad: "The system should be fast"
  • Good: "The system must respond to user actions within 200 milliseconds"

✓ Measurable: Can be tested and verified

  • Bad: "The system should be easy to use"
  • Good: "New users can complete core workflow within 5 minutes without training"

✓ Achievable: Technically feasible with available resources

  • Bad: "The system shall support unlimited concurrent users"
  • Good: "The system shall support 10,000 concurrent users (scalable to 100,000)"

✓ Relevant: Actually needed for the product

  • Bad: "The system shall support 47 languages" (if your market is English-only)
  • Good: "The system shall support English and Spanish (top 2 user languages)"

✓ Testable: Can be verified through testing

  • Bad: "The system shall provide a good user experience"
  • Good: "User satisfaction score must be ≥ 4.5/5.0 in post-launch survey"

✓ Traceable: Linked to source (PRD, user need, regulation)

  • Every requirement ID (e.g., REQ-FUNC-001) should link back to a PRD item or user story

Real Example: From Vague to Precise

Initial PRD Statement: "Users can search for products."

First Pass (Still Vague):

REQ-001: The system shall provide search functionality.

Problem: What kind of search? What fields? How fast?

Second Pass (Better):

REQ-001: The system shall allow users to search for products by name,
category, and SKU. Search results must be returned within 1 second.

Better: Now we know what and how fast. But still fuzzy on details.

Final Pass (Testable):

REQ-001: Product Search

**Description**: Users shall be able to search for products using the following:
- Product name (full-text search)
- Category (dropdown selection)
- SKU (exact match)

**Performance**: Search results must be displayed within 1 second for 95% of queries.

**Scope**: Search shall query the product catalog database containing up to
100,000 products.

**Acceptance Criteria**:
1. User can enter search term in search box
2. System returns products matching search criteria
3. Results are ranked by relevance
4. Results display product name, image, price, and "Add to Cart" button
5. No results state shows helpful message
6. Search is case-insensitive
7. Partial matches are supported (e.g., "phone" matches "smartphone")

**Priority**: Must Have (MVP)
**Source**: PRD-3.2 (Core User Features)
**Owner**: Product Owner

This is a requirement a developer can implement and a tester can verify.


Step 2: Non-Functional Requirements

What You'll Achieve

You'll define the quality attributes that determine how well your system performs: speed, scalability, reliability, usability.

The outcome: Clear performance targets that drive architecture and provide acceptance criteria.

Why NFRs Matter (The Hard Truth)

The Situation: A team built an e-commerce platform with vague NFRs: "system should be fast and reliable."

What Happened:

  • Launch day: 5,000 users simultaneously hit "Add to Cart"
  • Response time: 45 seconds (users abandoned)
  • Database crashed under load
  • Site was down for 6 hours
  • Lost significant revenue in sales in one day
  • Company's reputation took a massive hit

The Post-Mortem:

  • No performance requirements were defined
  • No load testing was done (no targets to test against)
  • Database couldn't handle concurrent writes
  • No caching strategy was designed

What Good NFRs Would Have Done:

  • "System must support 5,000 concurrent users" → would have driven architecture
  • "Response time <500ms for 95% of requests" → would have required caching
  • "99.9% uptime (4.3 hours downtime/month)" → would have required high-availability design

The Lesson: Vague NFRs = failed launches. Specific NFRs = systems that work.

NFR Categories and Examples

CategoryWhat It CoversExample Requirements
PerformanceResponse time, throughput, latency"API responses <200ms for 95% of requests"
ScalabilityUser growth, data growth, transaction volume"System must scale to 100,000 users without code changes"
AvailabilityUptime, downtime, reliability"99.9% uptime (max 43 minutes downtime/month)"
UsabilityUI/UX standards, accessibility"WCAG 2.1 AA compliant, new users onboard in <5 minutes"
MaintainabilityCode quality, documentation, technical debt"Code coverage ≥80%, all APIs documented"
OperabilityMonitoring, alerting, deployment"All critical metrics monitored, alerts fired within 1 minute"

Step 3: Security Requirements

What You'll Achieve

You'll define comprehensive security requirements that will drive your security architecture.

The outcome: Security requirements that ensure compliance and protect your users.

The Security Requirements Framework

1. Authentication & Authorization

RequirementDescriptionPriority
SEC-001Users must authenticate using email/password or SSOMust Have
SEC-002Multi-factor authentication (MFA) required for admin usersMust Have
SEC-003MFA optional for standard users (encouraged)Should Have
SEC-004Role-based access control (RBAC) with least privilegeMust Have
SEC-005Session timeout after 30 minutes of inactivityMust Have

2. Data Protection

RequirementDescriptionPriority
SEC-006All PII encrypted at rest using AES-256Must Have
SEC-007All data in transit encrypted using TLS 1.3Must Have
SEC-008Encryption keys managed using AWS KMS or HashiCorp VaultMust Have
SEC-009Data masking for PII in logs and non-production environmentsMust Have

3. Audit & Logging

RequirementDescriptionPriority
SEC-010All authentication attempts logged (success and failure)Must Have
SEC-011All authorization changes loggedMust Have
SEC-012Logs retained for 90 days (compliance requirement)Must Have
SEC-013Log integrity protected (immutable or signed)Should Have

4. Network Security

RequirementDescriptionPriority
SEC-014All services deployed within VPC with private subnetsMust Have
SEC-015Web Application Firewall (WAF) required for all public endpointsMust Have
SEC-016DDoS protection implemented (AWS Shield or similar)Must Have

5. Vulnerability Management

RequirementDescriptionPriority
SEC-017Static Application Security Testing (SAST) in CI/CD pipelineMust Have
SEC-018Dynamic Application Security Testing (DAST) before releaseMust Have
SEC-019Dependency scanning (SCA) for all third-party librariesMust Have
SEC-020Critical vulnerabilities patched within 7 daysMust Have

Step 4: Compliance Requirements

What You'll Achieve

You'll identify all applicable regulations and map them to technical requirements.

The outcome: A compliance matrix that ensures you meet all regulatory obligations.

Common Regulations and Their Implications

RegulationIndustryKey RequirementsWhat It Means for Your Product
GDPREU data subjectsData subject rights, breach notification (72h), data protection by designUser data export, consent management, breach response plan
HIPAAHealthcarePHI protection, access controls, audit trails, business associate agreementsEncryption, access logs, BAAs with vendors
PCI DSSPaymentsCard data protection, vulnerability scanning, quarterly reviewsTokenization, no card data storage, ASV scans
SOC 2SaaS vendorsSecurity, availability, privacy controls; annual auditsControl documentation, evidence collection, audit readiness
SOXPublic companiesFinancial controls, change management, audit trailsChange approval process, financial data integrity

Step 5: Data Requirements

What You'll Achieve

You'll define all data entities, relationships, volumes, and privacy requirements.

The outcome: A data requirements specification that drives database design and compliance.

What to Define

✓ Data Entities

  • List all data entities (User, Order, Product, Transaction, etc.)
  • For each entity, define attributes and types
  • Example: User (id: UUID, email: string, name: string, created_at: timestamp)

✓ Data Relationships

  • Entity relationships (one-to-one, one-to-many, many-to-many)
  • Example: User → Orders (one-to-many), Order → Products (many-to-many)

✓ Data Volumes

  • Current volumes (if migrating from existing system)
  • Projected volumes (1 year, 3 years, 5 years)
  • Example: "10,000 users at launch, 100,000 by year 1, 500,000 by year 3"

✓ Data Retention

  • How long each data type is retained
  • Example: "Transaction data retained for 7 years (tax requirement), user activity logs 90 days"

✓ Data Privacy

  • Data classification (public, internal, confidential, restricted)
  • PII identification and handling
  • Example: "User email and name are PII, must be encrypted at rest"

✓ Data Lifecycle

  • Create, read, update, delete, archive, purge
  • Example: "User accounts soft-deleted (archive) for 30 days, then permanently deleted"

✓ Data Security

  • Encryption requirements (at rest, in transit)
  • Access controls (who can access what)
  • Example: "Only authorized support staff can access user PII, all access logged"

The Requirements Traceability Matrix (RTM)

Why RTMs Matter

The RTM is your most important artifact in this phase. It connects every requirement to its source and tracks it through all phases.

Without an RTM:

  • "Why did we build this feature?" crickets
  • "Does this requirement have a test?" unknown
  • "What happens if we remove this feature?" cascade of unknown impacts

With an RTM:

  • Every requirement traces to a PRD item, user story, or regulation
  • Every requirement has tests defined
  • Impact analysis is instant (trace forward and backward)

RTM Structure

Requirement IDSourceDescriptionOwnerPriorityStatusTest CoveragePhaseVerified
REQ-FUNC-001PRD-3.2User authenticationProduct OwnerMustApprovedYesP5
REQ-FUNC-002USER-001Password resetProduct OwnerShouldDraftNoP5
REQ-NFR-001NFR-2.1Response time <200msCTAMustBaselineYesP6
REQ-SEC-001SEC-1.1MFA required for adminsSecurity LeadMustApprovedYesP5
REQ-DATA-001GDPR-ART-32Data export functionalityProduct OwnerMustApprovedYesP5

Columns Explained:

  • Requirement ID: Unique identifier (REQ-{TYPE}-{###})
  • Source: Where this came from (PRD, user story, regulation)
  • Description: Brief requirement description
  • Owner: Who owns this requirement
  • Priority: Must/Should/Could/Won't
  • Status: Draft/Under Review/Approved/Implemented
  • Test Coverage: Yes/No (is there a test for this?)
  • Phase: Which phase implements this
  • Verified: Checkbox for verification sign-off

Quality Gates: Before You Move to Phase 3

Completing this phase is exhausting—but you've just dramatically de-risked your project.

Exit Criteria Checklist

  • Functional requirements documented and approved (every feature defined and signed off)
  • Non-functional requirements defined and baselined (performance targets set)
  • Security requirements documented and approved (security requirements complete)
  • Compliance requirements identified and validated (regulations mapped to requirements)
  • Data requirements documented (data entities, volumes, privacy defined)
  • Requirements traceability matrix created (every requirement traced to source)
  • All requirements signed off by stakeholders (explicit sign-offs, not implicit)
  • Go/no-go decision documented (explicit decision to proceed to Phase 3)

The Big Question: Are Requirements Good Enough?

Ask these questions. If you can't answer "yes" to all, your requirements aren't ready:

1. The Developer Test Could a developer who knows nothing about this project read your requirements and start coding without asking clarifying questions?

2. The Tester Test Could a tester write test cases based solely on your requirements, without making assumptions?

3. The Stakeholder Test If a stakeholder said "this isn't what I wanted," could you point to the specific requirement they approved?

4. The Traceability Test Can you trace every requirement back to its source (PRD, user story, regulation)?

5. The Testability Test Does every requirement have at least one test case defined?

6. The Priority Test Is every requirement prioritized (Must/Should/Could/Won't)?

7. The Feasibility Test Has the CTA confirmed that all requirements are technically achievable?

If you answer "no" to any of these, you're not ready for Phase 3. Keep working.


Templates and Examples

Everything you need is in these directories:

./templates/
├── functional_requirements_template.md   # Detailed functional requirements
├── user_story_template.md                # User story format
├── nfr_template.md                       # Non-functional requirements
├── security_requirements_template.md     # Security requirements
├── compliance_matrix_template.md         # Regulation mapping
├── data_requirements_template.md         # Data entities and volumes
└── rtm_template.md                       # Requirements traceability matrix

./examples/
├── sample_requirements_specification.md  # Complete requirements example
├── sample_rtm.xlsx                       # Excel RTM example
└── sample_compliance_mapping.md          # Regulation-to-requirement mapping

Phase Completion: Celebrate Your Progress

You've accomplished something massive:

Transformed vision into detailed, testable requirements Defined performance and quality targets Built security and compliance into requirements Created a traceability matrix that connects everything Got explicit stakeholder sign-offs

Next up: Phase 3, where you'll design the architecture. Thanks to your requirements, your architecture team will have clear direction.


Previous Phase: Phase 1: Vision & Strategy Next Phase: Phase 3: Architecture & Design


Questions or need guidance?

  • Framework Overview: See ../../README.md
  • All Phase Details: See skills/phase_*/SKILL.md
  • Role Definitions: See skills/shared/roles/SKILL.md
  • Security Guidance: See skills/shared/security/SKILL.md
  • Compliance Guidance: See skills/shared/compliance/SKILL.md

Version: 2.0.0 (Expert Mentor Edition) Reviewed By: OCTALUME EXPERT MENTOR TEAM


You're doing the hard work that makes everything else easy. Keep it up.


Version 1.0.0 | OCTALUME Enterprise Lifecycle Framework

Score

Total Score

75/100

Based on repository quality metrics

SKILL.md

SKILL.mdファイルが含まれている

+20
LICENSE

ライセンスが設定されている

+10
説明文

100文字以上の説明がある

+10
人気

GitHub Stars 100以上

0/15
最近の活動

1ヶ月以内に更新

+10
フォーク

10回以上フォークされている

0/5
Issue管理

オープンIssueが50未満

+5
言語

プログラミング言語が設定されている

+5
タグ

1つ以上のタグが設定されている

+5

Reviews

💬

Reviews coming soon