Back to list
Harery

phase-03-architecture-design

by Harery

Enterprise 8-Phase Software Development Lifecycle Framework with Quality Gates, Multi-Agent Orchestration, and AI-Assisted Development using Claude Code. Perfect for regulated industries (HIPAA, SOC 2, PCI DSS, SOX, GDPR).

1🍴 0📅 Jan 22, 2026

SKILL.md


name: "phase_03_architecture_design" description: "You'll transform requirements into a robust, secure, scalable architecture. Through system design, security architecture, data modeling, infrastructure planning, and threat modeling, you'll create the blueprint that guides development. This is where abstract requirements become concrete technical decisions." phase: 3 phase_name: "Architecture & Design" owner: "Chief Technology Architect (CTA)" secondary_owner: "Technical Lead" participants: ["Tech Lead", "Security Architect", "DevOps", "Data Architect", "Cloud Architect", "SRE", "UX Lead", "Product Designer", "Users"] entry_criteria: [ "Functional requirements documented and approved", "Non-functional requirements defined", "Security requirements documented", "Compliance requirements identified", "Data requirements documented" ] exit_criteria: [ "System architecture approved by CTA", "Security architecture approved by CISO", "Data architecture approved and validated", "Infrastructure design approved and cost-validated", "API and integration design completed", "UI/UX design validated with users", "Technical specifications documented", "Threat modeling completed and reviewed", "Design review conducted with all stakeholders", "ADRs created", "Go/no-go decision to proceed to Phase 4" ] estimated_duration: "1 week" dependencies: ["phase_02_requirements_scope"] outputs: [ "System Architecture Document", "Security Architecture Document", "Data Architecture (ERD, Schemas)", "Cloud Infrastructure Design", "API Specifications (OpenAPI/Swagger)", "UI/UX Mockups and Prototypes", "Technical Specifications", "Architecture Decision Records (ADRs)", "Threat Models" ] next_phase: "phase_04_development_planning"

Phase 3: Architecture & Design

Where Requirements Become Blueprint


Welcome to the Architecture Phase

Congratulations on reaching Phase 3! You've done the hard work of defining clear requirements. Now comes the creative and technical work of designing how to build it.

This is where the abstract becomes concrete. Where "the system must be fast" becomes "we'll use Redis caching with a 5-minute TTL." Where "user data must be secure" becomes "AES-256 encryption at rest with AWS KMS key management."

Here's what you'll walk away with:

A system architecture that meets all your requirements Security architecture designed in (not bolted on) Data architecture that supports your current and future needs Infrastructure design that's cost-optimized and scalable API specifications that developers can implement from UI/UX designs validated with real users Threat models that identify and mitigate security risks

Time investment: 14-19 weeks (this is the longest phase—for good reason)


What This Phase Feels Like (A Real Story)

I advised a startup that rushed architecture design. They spent 4 weeks designing and 6 months building. At scale testing, they discovered their architecture couldn't handle 1/10th of their target load. They spent 4 months re-architecting.

Contrast that with a team that spent 16 weeks on architecture:

  • Handled 10x launch-day traffic without breaking a sweat
  • Security audit passed in half the usual time (security was designed in)
  • New feature velocity stayed high (architecture was flexible and clear)
  • Infrastructure costs were 40% lower than projections (cost optimization was designed in)

Their CTA told me: "I was impatient to start coding. Now I'm grateful we designed first. Every trade-off decision was made before we wrote a single line of code."

That's the feeling we're aiming for. You'll enter development confident, not crossing fingers.


Your Journey Through This Phase

Think of this phase as designing a custom home:

WeekFocusWhat You're DoingWhy It Matters
1-4System ArchitectureArchitecture patterns, components, integrations, ADRsThe foundation everything else builds on
5-7Security ArchitectureSecurity controls, threat modeling, encryption, authSecurity designed in, not patched on
8-10Data ArchitectureData models, databases, migration, retentionData architecture is hard to change later
11-14Infrastructure & APIsCloud design, networks, CI/CD, API specsWhere your code will live and how it will talk
15-18UI/UX & SpecsUser interface, prototypes, technical specsWhat users will see and touch
19Design Review & Sign-offPresent to stakeholders, get approvalsEveryone commits to the design

Emotional checkpoint: You'll start excited by the creative challenge, hit complexity overwhelm around week 8 (normal!), work through detailed trade-offs, and end with architectural clarity. The complexity is real—you can navigate it.


Who's on This Journey With You?

This phase needs your most senior technical people. Architecture decisions are expensive to change.

RoleThey're Responsible ForWhy They Matter Now
CTAOverall architecture, technical decisions, trade-offsThey own the "how" from a technical perspective
Security ArchitectSecurity architecture, threat modeling, controlsSecurity architecture now = security built in later
Data ArchitectData models, databases, migration strategyData architecture changes are very expensive
Cloud ArchitectInfrastructure design,optimization, scalabilityInfrastructure decisions lock you into platforms
UX LeadUser interface, user experience, prototypesUX validated now = rebuilt UI avoided later
Tech LeadImplementation validation, feasibilityThey'll translate architecture to code

CTA (Chief Technology Architect): This is their time to shine. They'll spend 60-70% of their time on this phase, making decisions that will shape the product for years. One good architecture decision can save millions; one bad one canmillions.

Security Architect: They'll design defense-in-depth security, conduct threat modeling, and define security controls. Their work prevents the "we need to add security later" problem (which never ends well).

Data Architect: They'll design data models that scale, handle current and future volumes, and support compliance requirements. One well-designed schema can last a decade; one poorly-designed schema gets rewritten in a year.

Cloud Architect: They'll design infrastructure that's scalable, reliable, and cost-optimized. They'll ask questions like "serverless or containers?" and "multi-AZ or multi-region?" that have million-dollar implications.

UX Lead: They'll design interfaces that users love, validated through user testing. Good UX increases adoption and reduces support costs; bad UX kills products regardless of technical quality.

Tech Lead: They'll validate that the architecture is implementable by the team. They'll catch designs that are theoretically sound but practically difficult.


Step 1: System Architecture Design

What You'll Achieve

You'll design the overall system architecture: components, patterns, integrations, and technology choices.

The outcome: A system architecture document that guides all development work.

The Big Question: Monolith or Microservices?

This is the most common architecture question. Here's how to decide:

Start with a Monolith If:

  • Team size <20 developers
  • You're building an MVP or v1 product
  • Time-to-market is critical
  • You don't have DevOps expertise for distributed systems
  • Your scaling requirements are moderate (<100K users)

Start with Microservices If:

  • Team size >20 developers (need parallel development)
  • You have clear domain boundaries (bounded contexts)
  • You have DevOps expertise for distributed systems
  • Different components have different scaling needs
  • You need independent deployment cadences

Hybrid Approach (Recommended for Most Teams):

  • Start with a well-structured monolith
  • Design services with clear boundaries
  • Extract microservices when you hit a specific pain point

Real Example: Shopify started as a monolith. They extracted microservices only when they hit specific scaling bottlenecks. Today, they have thousands of services but grew into it organically.

Architecture Decision Records (ADRs)

Every significant architecture decision should be documented in an ADR:

# ADR-001: [Decision Title]

## Status
Accepted | Proposed | Deprecated | Superseded by [ADR-XXX]

## Context
[What is the situation that requires a decision? What are the driving forces?]

## Decision
[What did we decide? Be specific.]

## Consequences
- **Positive**: [What benefits does this decision bring?]
- **Negative**: [What are the downsides or risks?]
- **Cost**: [What are theimplications?]

## Alternatives Considered
1. [Alternative 1]: [Why we rejected it]
2. [Alternative 2]: [Why we rejected it]

## Related Decisions
- [ADR-XXX]: [Related decision]
- [PRD-XXX]: [Related requirement]

## Implemented By
[Who is implementing this decision]

## Date
[YYYY-MM-DD]

Example ADR Excerpt:

# ADR-001: PostgreSQL as Primary Database

## Context
We need a relational database with ACID transactions for our e-commerce platform.
Requirements: 100K users at launch, scaling to 1M in year 1.

## Decision
Use PostgreSQL 15+ as our primary database.

## Consequences
- **Positive**: Strong ACID support, excellent JSON support, mature ecosystem
- **Negative**: Vertical scaling limits (will need sharding at ~10M users)
- **Cost**: Moderate ($500/month for managed RDS at launch)

## Alternatives Considered
1. MySQL: Rejected due to weaker JSON support and fewer advanced features
2. MongoDB: Rejected due to lack of ACID guarantees (critical for transactions)

Step 2: Security Architecture Design

What You'll Achieve

You'll design comprehensive security architecture: authentication, authorization, encryption, network security, and monitoring.

The outcome: A security architecture document that implements your security requirements.

Threat Modeling: Think Like an Attacker

Threat modeling identifies security vulnerabilities before you build. Use the STRIDE methodology:

Threat TypeDescriptionExampleMitigation
SpoofingImpersonating someone elseAttacker logs in as adminMFA, strong password policies
TamperingModifying data or codeAttacker modifies order totalDigital signatures, integrity checks
RepudiationDenying an actionUser claims they didn't place orderComprehensive audit logging
Information DisclosureExposing sensitive dataAPI returns user PIIEncryption, access controls
Denial of ServiceDisrupting service availabilityAttacker floods API with requestsRate limiting, DDoS protection
Elevation of PrivilegeGaining unauthorized accessRegular user accesses admin featuresRBAC, least privilege

The Situation: A team was building a financial services app.

Threat Model Revealed:

  • An attacker could intercept API calls and replay transactions (Tampering threat)
  • User session tokens weren't rotated, enabling session hijacking (Spoofing threat)
  • PII was logged in clear text (Information Disclosure threat)

The Fix (Before Any Code Was Written):

  • Added request signing with nonces to prevent replay attacks
  • Implemented short-lived tokens with refresh token rotation
  • Configured logging to automatically redact PII

The Result: When the security audit came, they passed with zero high-severity findings. The auditor said "I've never seen a first-time audit this clean."

The Cost: 2 weeks of threat modeling up front. The Savings: 4 months of rework + audit delays + reputation damage.


Step 3: Data Architecture Design (0)

What You'll Achieve

You'll design logical and physical data models, database schemas, and data migration strategies.

The outcome: A data architecture document that supports your requirements and scales with your growth.

Database Selection Guide

DatabaseBest ForConsiderations
PostgreSQLGeneral-purpose, ACID transactions, complex queriesMature, reliable, great JSON support
MySQLTraditional relational workloadsWidely supported, slightly less feature-rich than Postgres
MongoDBFlexible schemas, document storage, rapid iterationSchema flexibility is a double-edged sword
RedisCaching, session storage, pub/subIn-memory, not for persistent data
ElasticsearchFull-text search, log analyticsPowerful search, but not a primary database

The Situation: A SaaS company started with PostgreSQL for everything.

At Launch (10K users):

  • PostgreSQL handled everything beautifully
  • Simple architecture, easy to maintain

At 100K Users (Year 1):

  • Added Redis for caching (reduced DB load by 70%)
  • Implemented read replicas for reporting queries

At 1M Users (Year 2):

  • Implemented partitioning for time-series data
  • Added Elasticsearch for full-text search

At 10M Users (Year 4):

  • Extracted analytics to a data warehouse (Snowflake)
  • Implemented sharding for user data

The Key: They didn't over-engineer at launch. They started simple and evolved the architecture as needed, guided by clear data requirements from Phase 2.


Step 4: Infrastructure & API Design (1-14)

What You'll Achieve

You'll design cloud infrastructure, networking, CI/CD pipelines, and API specifications.

The outcome: Infrastructure design that's scalable, secure, and cost-optimized.

Cloud Provider Selection

ProviderStrengthsConsiderations
AWSMost mature, widest service selection, 30%+ market shareCan be complex, pricing can be confusing
AzureEnterprise-friendly, strong hybrid cloud, great for .NETSome services less mature than AWS
GCPStrong in data/analytics/AI, developer-friendlySmaller market share, fewer enterprise features

Recommendation: Choose based on your team's expertise. All three can run your product well. Team familiarity > minor feature differences.

API Design: REST vs. GraphQL vs. gRPC

API StyleBest ForConsiderations
RESTGeneral-purpose APIs, public APIsSimple, well-understood, widely supported
GraphQLComplex data needs, mobile apps, flexible queriesSteeper learning curve, overkill for simple APIs
gRPCMicroservices communication, internal APIsHigh performance, but not browser-friendly

Team A (REST):

  • Used REST with OpenAPI specification
  • Developers could start coding from the spec immediately
  • Auto-generated client SDKs for frontend and mobile
  • Clear versioning strategy (/api/v1/, /api/v2/)
  • Result: Fast development, easy integration

Team B (GraphQL - Overkill):

  • Used GraphQL because it was "trendy"
  • Simple CRUD operations became complex queries
  • Team spent months learning GraphQL nuances
  • No clear versioning strategy
  • Result: Slower development, unnecessary complexity

The Lesson: Use the right tool for the job. REST is the right choice for most applications.


Quality Gates: Before You Move to Phase 4

Completing this phase means you have a complete blueprint for building your product.

Exit Criteria Checklist

  • System architecture approved by CTA (documented, reviewed, signed off)
  • Security architecture approved by CISO (threat models completed, controls defined)
  • Data architecture approved and validated (schemas, migrations, retention defined)
  • Infrastructure design approved and cost-validated (cloud design,projections reviewed)
  • API and integration design completed (specs documented, examples provided)
  • UI/UX design validated with users (prototypes tested, feedback incorporated)
  • Technical specifications documented (coding standards, testing strategy defined)
  • Threat modeling completed and reviewed (all major threats identified and mitigated)
  • Design review conducted with all stakeholders (formal presentation, sign-offs obtained)
  • Architecture Decision Records (ADRs) created (all major decisions documented)
  • Go/no-go decision documented (explicit decision to proceed to Phase 4)

Phase Completion: Celebrate Your Progress

You've accomplished something monumental:

Transformed requirements into a complete architecture Designed security in (not bolted on) Created data architecture that will scale Defined infrastructure that's cost-optimized Specified APIs that developers can implement from Validated UI/UX with real users Identified and mitigated security threats

Next up: Phase 4, where you'll plan the development work. Thanks to your architecture, your development team will have clear direction.


Previous Phase: Phase 2: Requirements & Scope Next Phase: Phase 4: Development Planning


Version: 2.0.0 (Expert Mentor Edition) Reviewed By: OCTALUME EXPERT MENTOR TEAM


Architecture is the art of drawing lines. You've drawn them beautifully. Time to build.


Version 1.0.0 | OCTALUME Enterprise Lifecycle Framework

Score

Total Score

75/100

Based on repository quality metrics

SKILL.md

SKILL.mdファイルが含まれている

+20
LICENSE

ライセンスが設定されている

+10
説明文

100文字以上の説明がある

+10
人気

GitHub Stars 100以上

0/15
最近の活動

1ヶ月以内に更新

+10
フォーク

10回以上フォークされている

0/5
Issue管理

オープンIssueが50未満

+5
言語

プログラミング言語が設定されている

+5
タグ

1つ以上のタグが設定されている

+5

Reviews

💬

Reviews coming soon