Roles: Architect
- Architect
The architect has overall responsibility for defining and describing the architecture, as well as driving major technical decisions.
- Architectural Security Best Practices
After reading Secure Design Best Practices, architects who are part of a software development team may find this page useful as the weaknesses are addressed by known security tactics, helping the architect in embedding security throughout the initial design process.
- Architecture
"Architecture is the fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution." [IEEE 1471]
- Architecture Dependency Tracking
This document provides a guideline for tracking dependencies between architecture activities. A dependency exists when a specific activity needs to be executed before another activity can be executed or even started.
- Architecture Document Structure
This document provides a guideline for structuring architecture documentation in the PAPCP R&D environment.
- Architecture Review Guideline
Architecture Review Goals
- Attack Surface Analysis
Performing an Attack Surface Analysis includes analyzing the security architecture to identify and document product interfaces and surfaces that could be attacked, as well as consider if there are planned security measures that will provide enough protection against attacks on these surfaces.
- Definition of Ready and Definition of Done
The "Definition of Ready" (DoR) are the checks performed when a system epic, epic, feature, story, or bug is defined and ready to start work on. The "Definition of Done" (DoD) is the checks performed when the work items are completed before it is closed.
- How-to Perform Threat Modeling
Threat modeling is the process of analyzing various business and technical requirements of a system identifying the potential threats, the mitigations of these threats, and documenting the vulnerabilities these threats have on the system.
- How-to Work with Epics
This guide describes how to handle epics in streams. It includes examples of epic descriptions and information about the epic definition, grooming, and change management.
- How-to Work with Features
This guide describes how to handle features in streams. It includes examples of feature descriptions and information about the feature definition, grooming, and change management.
- How-to Work with System Architecture Epics and Features
The purpose of this guide is to provide handson support to the roles involved in defining the system architecture influenced by requirements, captured in the system epics, epics, and features.
- How-to Work with System Requirements and System Epics
This guide describes how to handle system requirements and system epics. It includes descriptions and information about the system requirement / system epic definition, workflow, grooming, and change management.
- How-to Write and Review a Test Case in ADO
For a new epic, feature, or user story, there may be a need to write new test cases or modify existing test cases. The purpose of this guide is to provide handson support to the roles involved in writing, updating, or reviewing test cases of a product.
- Product Capabilities
Product capabilities describe what the product “can do” for anyone who wants to understand its capabilities. They represent the product's property and are updated throughout its lifecycle through multiple releases.
- Refining Architecture
Software architecture is not a static document, instead, it's a continuous iterative process throughout each increment. This guide serves as a reference for the roles providing and describing different levels of architecture.
- Requirements Structure
This guide describes how system requirements in Decision Focus are broken down into system epics, epics and features in Azure DevOps (ADO).
- Secure Design Best Practices
This chapter gives some basic best practices for a secure software design. Assessing how security is addressed in the design of a product is one important step to ensure that the product meets the best security level and can be done at various points in a product lifecycle.
- Security Criticality Analysis
The Security Criticality Analysis is performed to identify which of the components in a product are important to pay extra attention to when trying to minimize the risk of vulnerabilities.
- System Interfaces
This guide describes what system interfaces are, how they are documented, and how they are managed.
- System Requirement Review Guideline
A system requirement review intends to improve the quality of the requirements. It applies both to system requirements and technology requirements.
- Versioning Architecture Documents
This guide describes the what, why, and how related to the versioning of architecture documents.