Submitted:
09 January 2026
Posted:
09 January 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Background and Related Work
2.1. Architecture Frameworks and Standards
2.2. Viewpoint Taxonomies and Related Research
2.3. Positioning and Gap Analysis
- Conceptual standards without concrete viewpoint sets, such as ISO/IEC/IEEE 42010 [1];
3. Problem Characterization and Motivation
3.1. Limitations of Current Architecture Documentation Practices
3.2. Industrial Pain Points
3.3. Motivation and Objectives
4. Meta-Model of the PACT Taxonomy
4.1. Viewpoints as First-Class Architectural Abstractions
- Viewpoints, which define architectural concerns, and the questions used to reason about them, from
- Artifacts, which provide concrete representations such as diagrams, matrices, tables, or structured descriptions.
4.2. Unified Viewpoint Definition Template
- Viewpoint Name
- Primary Concern
- Key Questions Answered
- Primary Stakeholders
- Structural / Behavioral Focus
- Logical / Physical Scope
4.3. Layered Organization of Viewpoints
- navigability for practitioners dealing with large viewpoint sets,
- selective adoption in industrial contexts where only subsets of concerns are relevant, and
- controlled expansion of the taxonomy as new architectural concerns emerges.
4.4. Prefix-Based Viewpoint Identification Scheme
- a layer prefix, and
- a local numeric index within that layer.
- B — Business / Organization
- A — Context & Application
- C — Container / Component / Technical Service
- IP — Integration & Processing
- D — Data Architecture
- SCR — Security, Compliance & Risk
- AGD — Architecture Governance & Decision
- DIN — Deployment / Infrastructure / Networking
- OR — Operations & Reliability
4.5. Architecture Governance & Decision as a Meta-Layer
- architectural decisions and their rationale,
- trade-offs among competing quality attributes,
- evolution and change impact, and
- organizational and economic alignment.
4.6. Core and Extensible Viewpoints
- a core set of viewpoints, capturing stable and recurring architectural concerns observed across domains, and
- an extensible structure, allowing additional viewpoints to be introduced using the same template and prefix-based identification scheme.
- introducing new identifiers within an existing layer, or
- defining a new layer when emerging concerns cannot be coherently integrated elsewhere.
4.7. Summary
- viewpoints as reusable, concern-driven architectural abstractions,
- a unified and explicit viewpoint definition template,
- a layered conceptual organization, and
- a prefix-based identification scheme that supports long-term evolution.
5. Full Viewpoint Taxonomy
5.1. Core Contribution and Design Principles
Broad and Structured Coverage
Explicit Alignment with ISO/IEC/IEEE 42010
Evolvability and Reusability
5.2. Full Viewpoint Taxonomy
5.2.1. Summary
5.3. Reuse, Mapping, and Evolution
- A viewpoint may be realized by one or more architecture artifacts (e.g., diagrams, matrices, catalogs).
- A single artifact may support multiple viewpoints, enabling efficient architecture reviews and reducing documentation redundancy [14].
6. Evaluation: Case-Based Assessment of the Taxonomy
6.1. Evaluation Objectives and Method
- RQ1: To what extent does the taxonomy provide broad and structured coverage of architectural concerns in a modern software-intensive system?
- RQ2: How does taxonomy-driven documentation compare with conventional documentation approaches in terms of concern visibility and review effectiveness?
- RQ3: Does the taxonomy support more structured and efficient enterprise architecture (EA) review and cross-team communication?
6.2. Case Description: A Microservice-Based E-Commerce Platform
- Core business domains such as user management, product catalog, order processing, payment, and recommendation.
- A microservice architecture deployed on a cloud-native infrastructure.
- Integration with external systems, including payment gateways and logistics providers.
- Both transactional and analytical data flows, including real-time event processing and batch-oriented reporting pipelines.
- Security, compliance, and operational requirements typical of enterprise environments, such as identity management, data protection, and availability targets.
6.3. Viewpoint Activation and Artifact Selection
- Business and organizational concerns (e.g., business capability and process viewpoints),
- Application and integration concerns (e.g., container, interaction, and integration viewpoints),
- Data architecture concerns (e.g., data flow, lineage, and governance viewpoints),
- Security and risk concerns (e.g., authentication, threat modeling, and attack path viewpoints),
- Deployment, infrastructure, and operational concerns (e.g., deployment, network, and observability viewpoints).
6.4. Comparative Analysis with Conventional Architecture Documentation Approaches
Comparison with C4-Based Documentation
Comparison with ISO/IEC/IEEE 42010–Aligned Descriptions
Comparison with TOGAF-Oriented Documentation
6.5. Evaluation Summary
- Enables broader and more systematic coverage of architectural concerns without requiring exhaustive documentation.
- Improves the visibility of non-functional and cross-domain risks, particularly in security, data governance, and operations.
- Supports more focused and efficient architecture reviews, reducing iteration cycles caused by late discovery of missing concerns.
7. Using the Taxonomy in Industrial Practice
7.1. Fragmentation of Architecture Practices in Industrial Settings
- architecture reviews focus on artifact presence rather than concern coverage [17], and
7.2. Supporting Enterprise Architecture Governance and Reviews
- Review scoping: Selecting a subset of relevant viewpoints based on project type, scale, or risk profile, consistent with risk-driven architecture evaluation principles [17].
7.3. Enabling Cross-Team Communication
- Business stakeholders can focus on capability, process, and ownership viewpoints [6].
7.4. Extensibility for AI-Intensive Systems
- Specializing the Data Lineage View to trace training data, model versions, and inference outputs [39].
7.5. Applicability to Data-Intensive Systems
- business-level data flows,
- technical data pipelines, and
- governance and compliance concerns.
7.6. Adoption in Cloud-Native Architectures
7.7. Summary
8. Discussion and Implications (With Citations)
8.1. Coverage Across Architectural Concerns
8.2. Alignment with ISO/IEC/IEEE 42010
8.3. Evolution and Extensibility Potential
8.4. Implications for Research
8.5. Implications for Practice
8.6. Balancing Documentation Effort and Architectural Value
8.7. Citation and Reference Value
9. Limitations and Future Work
Funding
Acknowledgments
Appendix A
Extended Viewpoint Definitions for the PACT Taxonomy
- Viewpoint ID
- Viewpoint Name
- Primary Concern
- Intent / Rationale
- Key Questions Answered
- Primary Stakeholders
- Notes on Usage / Common Pitfalls
A.1 Business / Organization Layer (B)
- Primary Concern: Business capability structure
- Intent / Rationale:
- To provide a stable, technology-independent representation of what the organization is able to do. Capabilities serve as a long-term anchor for alignment across business, IT, and strategy.
- Key Questions Answered:
- What capabilities exist? Which are core or differentiating? Where are investment priorities?
- Primary Stakeholders:
- Executives, Enterprise Architects
- Notes:
- Should remain stable across system redesigns; avoid mixing with process sequencing.
- Primary Concern: End-to-end business processes
- Intent / Rationale:
- To describe how capabilities are realized through ordered activities and decisions.
- Key Questions Answered:
- How does work flow across roles and systems?
- Primary Stakeholders:
- Product, Operations
- Notes:
- Focus on business intent, not technical orchestration.
- Primary Concern: Users, roles, and external actors
- Intent / Rationale:
- To clarify who interacts with the system and in what capacity.
- Key Questions Answered:
- Who uses the system? Who initiates or receives interactions?
- Primary Stakeholders:
- Product, Security
- Notes:
- Distinct from authentication mechanisms (see SCR layer).
- Primary Concern: Ownership and responsibility
- Intent / Rationale:
- To establish accountability for systems, data, and decisions.
- Key Questions Answered:
- Who owns what? Who approves changes?
- Primary Stakeholders:
- Executives, EA
- Notes:
- Often missing in technical documentation, but critical for governance.
- Primary Concern: Cross-domain influence and decision coupling
- Intent / Rationale:
- To expose dependencies and influence paths between business domains.
- Key Questions Answered:
- How do decisions in one domain affect others?
- Primary Stakeholders:
- Product, Architects
- Notes:
- Helps anticipate organizational bottlenecks.
A.2 Context & Application Layer (A)
- Primary Concern: System boundaries
- Intent / Rationale:
- To define what is inside the system and what lies in its environment.
- Key Questions Answered:
- What external systems and actors interact with the system?
- Primary Stakeholders:
- Product, Development
- Notes:
- Foundation for all downstream viewpoints.
- Primary Concern: Functional decomposition
- Intent / Rationale:
- To group system functionality independent of deployment or implementation.
- Key Questions Answered:
- What functions does the system provide?
- Primary Stakeholders:
- Product, Development
- Notes:
- Avoid conflating with component structure.
- Primary Concern: Inter-application responsibilities
- Intent / Rationale:
- To show how applications collaborate at a logical level.
- Key Questions Answered:
- How does responsibility flow across applications?
- Primary Stakeholders:
- Development, Product
- Notes:
- Often precedes technical integration design.
- Primary Concern: Role-to-application mapping
- Intent / Rationale:
- To clarify authorization intent at a conceptual level.
- Key Questions Answered:
- Who can do what in which system?
- Primary Stakeholders:
- Product, Security
- Notes:
- Not a substitute for access control models.
A.3 Container / Component / Technical Service Layer (C)
- Primary Concern: Runtime execution units
- Intent / Rationale:
- To describe deployable units and their responsibilities.
- Key Questions Answered:
- What runs independently?
- Primary Stakeholders:
- Software Architects, Developers
- Notes:
- Logical, not physical deployment.
- Primary Concern: Internal structure
- Intent / Rationale:
- To explain how containers are decomposed internally.
- Key Questions Answered:
- How is complexity managed?
- Primary Stakeholders:
- Developers
- Notes:
- Avoid over-detailing early.
- Primary Concern: Logical service responsibility
- Intent / Rationale:
- To define service boundaries independent of deployment.
- Key Questions Answered:
- What capability does each service provide?
- Primary Stakeholders:
- Architects, Developers
- Notes:
- Key for microservice clarity.
- Primary Concern: Technology selection
- Intent / Rationale:
- To make technology choices explicit and reviewable.
- Key Questions Answered:
- Which frameworks, platforms, and runtimes are used?
- Primary Stakeholders:
- Development, Operations
- Notes:
- Frequently required in EA reviews.
- Primary Concern: Communication mechanisms
- Intent / Rationale:
- To document interaction patterns and protocols.
- Key Questions Answered:
- How do components communicate?
- Primary Stakeholders:
- Development, SRE
- Notes:
- Critical for performance and reliability analysis.
A.4 Integration & Processing Layer (IP)
- Primary Concern: Business-level system integration
- Intent / Rationale:
- To describe how applications collaborate to support end-to-end business scenarios, independent of low-level technical constraints.
- Key Questions Answered:
- How do applications exchange information? Where are integration responsibilities assigned?
- Primary Stakeholders:
- Product Owners, Application Architects
- Notes on Usage / Common Pitfalls:
- Should focus on responsibility and intent, not protocol details.
- Primary Concern: Technical integration constraints
- Intent / Rationale:
- To capture non-functional integration characteristics such as latency, throughput, and coupling.
- Key Questions Answered:
- What technical limitations or guarantees apply to integration?
- Primary Stakeholders:
- Developers, SRE
- Notes:
- Complements IP1; avoid duplicating business semantics.
- Primary Concern: Execution semantics and orchestration
- Intent / Rationale:
- To explain how requests are processed and coordinated across system components.
- Key Questions Answered:
- How is work orchestrated? Where are control points?
- Primary Stakeholders:
- Developers, Operations
- Notes:
- Particularly important for distributed systems.
- Primary Concern: Action and decision flow
- Intent / Rationale:
- To describe logical execution paths including branching and decisions.
- Key Questions Answered:
- What actions occur and in what order?
- Primary Stakeholders:
- Architects, Developers
- Notes:
- Focus on logic, not timing.
- Primary Concern: Executable workflows
- Intent / Rationale:
- To represent operational workflows that can be executed or automated.
- Key Questions Answered:
- How does the workflow run at runtime?
- Primary Stakeholders:
- Product, SRE
- Notes:
- Distinct from B2 (business process) in execution focus.
- Primary Concern: Temporal interaction order
- Intent / Rationale:
- To make call ordering and dependencies explicit.
- Key Questions Answered:
- What is the exact sequence of interactions?
- Primary Stakeholders:
- Developers, Architects
- Notes:
- Use selectively to manage effort.
A.5 Data Architecture Layer (D)
- Primary Concern: Business-level data movement
- Intent / Rationale:
- To show how data supports business processes.
- Key Questions Answered:
- How does data flow across business activities?
- Primary Stakeholders:
- Product, Operations
- Notes:
- Avoid premature technical detail.
- Primary Concern: Data transformation logic
- Intent / Rationale:
- To explain how data is derived, enriched, or aggregated.
- Key Questions Answered:
- How is data transformed over time?
- Primary Stakeholders:
- Data Engineers, ML Engineers
- Notes:
- Crucial for analytics and AI systems.
- Primary Concern: Data traceability
- Intent / Rationale:
- To enable auditing and impact analysis by tracing data origins.
- Key Questions Answered:
- Where did this data come from?
- Primary Stakeholders:
- Compliance, Data Governance
- Notes:
- Often mandated by regulation.
- Primary Concern: Data inventory and ownership
- Intent / Rationale:
- To treat data as a managed enterprise asset.
- Key Questions Answered:
- What data assets exist and who owns them?
- Primary Stakeholders:
- Data Office
- Notes:
- Foundation for governance.
- Primary Concern: Conceptual data entities
- Intent / Rationale:
- To define business concepts independent of storage.
- Key Questions Answered:
- What core entities exist?
- Primary Stakeholders:
- Data Architects, Business Analysts
- Notes:
- Should remain stable.
- Primary Concern: Data quality characteristics
- Intent / Rationale:
- To expose quality expectations and metrics.
- Key Questions Answered:
- Is data accurate and complete?
- Primary Stakeholders:
- Data Stewards
- Notes:
- Often overlooked in architecture
- Primary Concern: Regulatory data paths
- Intent / Rationale:
- To ensure compliance along data flows.
- Key Questions Answered:
- Is sensitive data handled correctly?
- Primary Stakeholders:
- Compliance, Legal
- Notes:
- Distinct from security controls.
- Primary Concern: Technical data pipelines
- Intent / Rationale:
- To document execution stages and responsibilities.
- Key Questions Answered:
- How is data processed technically?
- Primary Stakeholders:
- Data Engineers
- Notes:
- Physical focus.
- Primary Concern: Data residency
- Intent / Rationale:
- To show where data is stored geographically.
- Key Questions Answered:
- Where does data physically reside?
- Primary Stakeholders:
- EA, Compliance
- Notes:
- Increasingly critical globally.
- Primary Concern: Logical data structure
- Intent / Rationale:
- To describe entity relationships.
- Key Questions Answered:
- How are entities related?
- Primary Stakeholders:
- Developers, Data Architects
- Notes:
- Platform-independent.
- Primary Concern: Physical data implementation
- Intent / Rationale:
- To capture actual database schemas.
- Key Questions Answered:
- How is data stored?
- Primary Stakeholders:
- DBAs
- Notes:
- Most volatile data viewpoint.
A.6 Security, Compliance & Risk Layer (SCR)
- Primary Concern: Security mechanisms and enforcement points
- Intent / Rationale:
- To make security controls explicit and reviewable across system boundaries.
- Key Questions Answered:
- What controls enforce security policies?
- Primary Stakeholders:
- Security Architects, DevOps
- Notes on Usage / Common Pitfalls:
- Should focus on controls, not threat enumeration (see SCR2).
- Primary Concern: Threat identification and risk assessment
- Intent / Rationale:
- To systematically analyze potential threats and vulnerabilities.
- Key Questions Answered:
- What threats exist and where are the risks?
- Primary Stakeholders:
- Security, Risk Management
- Notes:
- Often performed iteratively; not a one-time artifact.
- Primary Concern: Adversarial traversal paths
- Intent / Rationale:
- To visualize how an attacker could move through the system.
- Key Questions Answered:
- How could an attack propagate?
- Primary Stakeholders:
- Security Operations, Incident Response
- Notes:
- Complements SCR2 by emphasizing sequence.
- Primary Concern: Service-to-service authentication
- Intent / Rationale:
- To document trust relationships among services.
- Key Questions Answered:
- How do services authenticate each other?
- Primary Stakeholders:
- Security, Developers
- Notes:
- Distinct from user authentication.
- Primary Concern: User authentication mechanisms
- Intent / Rationale:
- To clarify how users are authenticated and identity is established.
- Key Questions Answered:
- How are users authenticated?
- Primary Stakeholders:
- Security, Product
- Notes:
- Authorization concerns belong to A4 / Governance.
- Primary Concern: Regulatory and compliance boundaries
- Intent / Rationale:
- To explicitly represent regulatory zones and constraints.
- Key Questions Answered:
- Which regulations apply where?
- Primary Stakeholders:
- Compliance, Legal
- Notes:
- Often implicit; making it explicit reduces risk.
- Primary Concern: Security observability
- Intent / Rationale:
- To ensure security-relevant events are observable.
- Key Questions Answered:
- How are security incidents detected?
- Primary Stakeholders:
- Security Operations
- Notes:
- Bridges security and operations layers
A.7 Architecture Governance & Decision Layer (AGD)
- Primary Concern: Governance structures and rules
- Intent / Rationale:
- To define how architectural decisions are guided and constrained.
- Key Questions Answered:
- How are architectural decisions governed?
- Primary Stakeholders:
- Executives, Enterprise Architects
- Notes on Usage / Common Pitfalls:
- Should not prescribe implementation details.
- Primary Concern: Architectural decision records
- Intent / Rationale:
- To document significant architectural decisions and their rationale.
- Key Questions Answered:
- Why was this design chosen?
- Primary Stakeholders:
- Architects, Development Leads
- Notes:
- Critical for long-term system understanding.
- Primary Concern: Architectural evolution
- Intent / Rationale:
- To assess the impact of change across viewpoints.
- Key Questions Answered:
- What breaks if something changes?
- Primary Stakeholders:
- Architects, Program Management
- Notes:
- Often missing until late-stage failures occur.
- Primary Concern: Quality trade-offs
- Intent / Rationale:
- To explicitly reason about competing quality attributes.
- Key Questions Answered:
- Which qualities are prioritized and why?
- Primary Stakeholders:
- Architects, Product Owners
- Notes:
- Prevents implicit trade-offs.
- Primary Concern: Economic implications
- Intent / Rationale:
- To relate architectural choices to cost and value.
- Key Questions Answered:
- What is the cost/value impact of decisions?
- Primary Stakeholders:
- Executives, Finance
- Notes:
- Bridges architecture and business strategy.
A.8 Deployment / Infrastructure / Networking Layer (DIN)
- Primary Concern: Deployment location and environment distribution
- Intent / Rationale:
- To clarify where systems and components are deployed across environments and regions.
- Key Questions Answered:
- Where are systems deployed?
- Primary Stakeholders:
- Enterprise Architects, Infrastructure Teams
- Notes on Usage / Common Pitfalls:
- Should distinguish logical deployment intent from physical realization.
- Primary Concern: Network structure and segmentation
- Intent / Rationale:
- To make network boundaries and communication paths explicit.
- Key Questions Answered:
- How is the network structured?
- Primary Stakeholders:
- Network Engineers, Infrastructure Architects
- Notes:
- Often under-documented or conflated with application diagrams.
- Primary Concern: Infrastructure composition
- Intent / Rationale:
- To document runtime infrastructure components and dependencies.
- Key Questions Answered:
- What infrastructure components exist?
- Primary Stakeholders:
- DevOps, Operations
- Notes:
- Should evolve with infrastructure-as-code artifacts.
- Primary Concern: Capacity and scaling
- Intent / Rationale:
- To reason about resource provisioning and scalability.
- Key Questions Answered:
- What resources are allocated and how do they scale?
- Primary Stakeholders:
- SRE, Infrastructure Teams
- Notes:
- Enables proactive capacity planning.
A.9 Operations & Reliability Layer (OR)
- Primary Concern: Operational processes
- Intent / Rationale:
- To describe how systems are operated and supported.
- Key Questions Answered:
- How are incidents and routine operations handled?
- Primary Stakeholders:
- Operations Teams, DevOps
- Notes on Usage / Common Pitfalls:
- Often treated as out-of-scope in architecture documentation.
- Primary Concern: Incident handling and escalation paths
- Intent / Rationale:
- To clarify responsibilities during failures.
- Key Questions Answered:
- Who responds when things go wrong?
- Primary Stakeholders:
- Operations, Support
- Notes:
- Critical for high-availability systems.
- Primary Concern: Recovery strategies
- Intent / Rationale:
- To ensure systems can recover from failures.
- Key Questions Answered:
- What are RPO/RTO targets and recovery mechanisms?
- Primary Stakeholders:
- Infrastructure, Executives
- Notes:
- Should align with business continuity planning.
- Primary Concern: Reliability objectives
- Intent / Rationale:
- To define and monitor reliability targets.
- Key Questions Answered:
- What SLOs apply?
- Primary Stakeholders:
- SRE, Development Teams
- Notes:
- Links architecture decisions to operational outcomes.
- Primary Concern: System visibility
- Intent / Rationale:
- To ensure system behavior is observable at runtime.
- Key Questions Answered:
- How is system health observed?
- Primary Stakeholders:
- DevOps, SRE
- Notes:
- Complements OR4 by providing evidence.
A.10 Appendix Summary
Appendix B. Artifact Mapping (Industrial-Oriented, Low-Risk)
B.1 Design Principles for Artifact Mapping
- Non-intrusive: No new mandatory artifacts are introduced.
- Tool-agnostic: The mapping does not depend on specific tools (e.g., ArchiMate, UML, C4).
- Process-neutral: Compatible with waterfall, agile, DevOps, and hybrid delivery models.
- Incremental adoption: Organizations may start with a subset of viewpoints and artifacts.
B.2 Viewpoint-to-Artifact Mapping (Representative, Value-Driven)
| Artifact ID | Artifact Name | Purpose (High-Level) | Typical Contents | Supported Viewpoints (Representative) | Effort vs. Value |
| A1 | Technical Architecture Diagram | Shows major technical components and their relationships | Services, modules, logical boundaries | Technical Service, Container, Application Interaction | ⭐⭐⭐☆☆ high value, moderate effort |
| A2 | Application Collaboration Diagram | Illustrates communication relationships between systems/services | Nodes, links, directionality | Application Interaction, Integration | ⭐⭐⭐☆☆ high value, moderate effort |
| A3 | Business Process Diagram | Represents business workflows and decision points | Activities, tasks, roles | Business Process, Governance | ⭐⭐☆☆☆ moderate value, low effort |
| A4 | Data Model Diagram | Defines key data entity relationships | Entities, relationships | Logical Data Model, Data Architecture | ⭐⭐⭐☆☆ high value, moderate effort |
| A5 | Data Pipeline Diagram | Shows how data moves and transforms | Sources, ETL/ELT stages | Data Flow, Data Lineage, Data Evolution | ⭐⭐⭐☆☆ high value, moderate effort |
| A6 | Auth & Service Flow Diagram | Maps authentication, authorization, and service invocation | Identity providers, tokens, trust boundaries | User Authentication, Service Authentication, Security Control | ⭐⭐⭐⭐☆ very high value, moderate effort |
| A7 | System Process Flow Diagram | Shows runtime orchestration and execution paths | Sync/async calls, retries, errors | System Processing, Operations, Resilience | ⭐⭐⭐⭐☆ very high value, moderate effort |
| A8 | Resource List | Provides inventory of systems, owners, and environments | System names, ownership, environments | Deployment, Infrastructure, Governance | ⭐⭐☆☆☆ moderate value, low effort |
| A9 | Data Asset Matrix | Maps data assets to value, ownership, and sensitivity | Assets, classifications, consumers | Data Asset, Compliance, Data Governance | ⭐⭐⭐☆☆ high value, moderate effort |
| A10 | Data Compliance Diagram | Shows regulatory and control boundaries for data | Regulatory zones, control points | Data Compliance, Sovereignty | ⭐⭐☆☆☆ moderate value, low effort |
- 5.
- Start with Core Artifacts
- 6.
- Artifacts such as A1 (Technical Architecture Diagram), A6 (Auth & Service Flow Diagram), and A7 (System Process Flow Diagram) provide high analytical leverage and cover multiple structural and behavioral concerns.
- 7.
- Add Data-Centric Artifacts Only When Data Is a Dominant Concern
- 8.
- A4 (Data Model Diagram) and A5 (Data Pipeline Diagram) should be prioritized when data movement, derivation, lineage, or compliance risks are central.
- 9.
- Use Lightweight Artifacts for Governance and Compliance Contexts
- 10.
- A8 (Resource List) and A10 (Data Compliance Diagram) expose ownership, responsibility, and regulatory boundaries with minimal modeling overhead.
- 11.
- Avoid Redundant Artifacts
- 12.
- When multiple artifacts convey overlapping concerns, teams should prioritize the artifact with higher analytical value for the target stakeholders rather than maximizing diagram count.
B.3 Typical Adoption Patterns in Industry
B.3.1 Minimal Adoption (Low Maturity)
- Use 5–8 core viewpoints (e.g., Capability, Application Landscape, Deployment, Security).
- Reuse existing diagrams without modification.
- Primary value: improved review consistency and shared vocabulary.
B.3.2 Selective Adoption (Medium Maturity)
- Introduce viewpoint-based labeling of artifacts.
- Use viewpoints to structure architecture review checklists.
- Primary value: improved comparability across projects.
B.3.3 Systematic Adoption (High Maturity)
- Maintain a viewpoint catalog aligned with EA governance.
- Link viewpoints to architecture decisions (ADR).
- Primary value: traceability, reuse, and long-term evolution.
B.4 Support for Enterprise Architecture Governance
- Providing a common reference model for architecture reviews.
- Enabling reviewers to assess coverage gaps explicitly.
- Reducing subjective interpretation of “complete architecture documentation.”
B.5 Mapping to ISO/IEC/IEEE 42010 Concepts
- Viewpoints define the concerns to be addressed.
- Artifacts serve as concrete representations of views.
- Multiple artifacts may instantiate the same viewpoint.
B.6 Risk Mitigation and Practical Considerations
- Viewpoints are recommendatory, not mandatory.
- Artifact mapping is context-sensitive, not prescriptive.
- Organizations may omit viewpoints that are irrelevant to a given system.
Appendix C. Viewpoint–Artifact Mapping Matrix
| Business / Organization Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| B1 Business Capability View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| B2 Business Process View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| B3 User / Actor View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| B4 Organizational View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| B5 Interaction & Influence View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Context & Application Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| A1 Context View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| A2 Functional / Application View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| A3 Application Interaction View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| A4 User Role View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Container / Component / Technical Service Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| C1 Container View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| C2 Component View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| C3 Technical Service View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| C4 Technical Stack View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| C5 Communication / Protocol View | ✓ | ✓ | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||
| Integration & Processing Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| IP1 Application Integration View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| IP2 Technical Integration View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| IP3 System Processing View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| IP4 Activity View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| IP5 Process Flow View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| IP6 Sequence Diagram View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Data Architecture Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| D1 Business Data Flow View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D2 Data Evolution / Derivation View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D3 Data Lineage View | ✓ | ✓ | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||
| D4 Data Asset View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D5 Data Entity View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D6 Data Quality View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D7 Data Flow Compliance View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D8 Data Pipeline View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D9 Data Sovereignty View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D10 Logical Data Model View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| D11 Physical Data Model View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| Security, Compliance & Risk Layer (SCR) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| GCS1 Architecture Governance View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| GCS2 Security Control View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| GCS3 Risk / Threat Modeling View | ✓ | ✓ | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||
| GCS4 Attack Path View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| GCS5 Service Authentication View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| GCS6 User Authentication View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| GCS7 Compliance View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| Deployment / Infrastructure / Networking Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| DIN1 Application Location View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| DIN2 Network Topology View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| DIN3 Deployment / Infrastructure View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| DIN4 Resource View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| Operations & Reliability Layer | ||||||||||||||||||||||||||||||||||||||||||||||||||||
| Viewpoint ID | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 | A10 | ||||||||||||||||||||||||||||||||||||||||||
| OR1 Operations View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| OR2 Resilience / DR View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| OR3 Reliability / SLO View | ✓ | |||||||||||||||||||||||||||||||||||||||||||||||||||
| OR4 Monitoring / Observability View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
| OR5 Incident & Recovery View | ✓ | ✓ | ||||||||||||||||||||||||||||||||||||||||||||||||||
References
- ISO/IEC/IEEE, ISO/IEC/IEEE 42010:2011 – Systems and Software Engineering — Architecture Description, ISO/IEC/IEEE, 2011.
- ISO/IEC, ISO/IEC 12207:2017 – Systems and Software Engineering — Software Life Cycle Processes, ISO/IEC, 2017.
- ISO/IEC, ISO/IEC 15288:2015 – Systems and Software Engineering — System Life Cycle Processes, ISO/IEC, 2015.
- The Open Group, TOGAF® Standard, 10th Edition, The Open Group, 2022.
- J. A. Zachman, “A Framework for Information Systems Architecture,” IBM Systems Journal, vol. 26, no. 3, pp. 276–292, 1987.
- M. Lankhorst et al., Enterprise Architecture at Work, 4th ed., Springer, 2017.
- D. Simon, K. Fischbach, and D. Schoder, “Enterprise architecture management and its role in corporate strategic management,” Information Systems and e-Business Management, vol. 12, no. 1, pp. 5–42, 2014. [CrossRef]
- P. Kruchten, “The 4+1 View Model of Architecture,” IEEE Software, vol. 12, no. 6, pp. 42–50, 1995.
- L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 4th ed., Addison-Wesley, 2021.
- N. Rozanski and E. Woods, Software Systems Architecture, 2nd ed., Addison-Wesley, 2012.
- P. Clements et al., Documenting Software Architectures: Views and Beyond, 2nd ed., Addison-Wesley, 2011.
- C. Hofmeister, R. Nord, and D. Soni, “Applied Software Architecture,” Addison-Wesley, 2000.
- C. Hofmeister, R. Nord, and D. Soni, “A general model of software architecture design derived from five industrial approaches,” Journal of Systems and Software, vol. 80, no. 1, pp. 106–126, 2007. [CrossRef]
- C. Lange and P. Avgeriou, “Documentation of software architecture: A survey,” Journal of Systems and Software, vol. 82, no. 4, pp. 548–569, 2009.
- P. Avgeriou, “Architectural knowledge management: Past, present, and future,” IEEE Software, vol. 31, no. 6, pp. 66–73, 2014.
- R. Kazman, J. Asundi, and M. Klein, “Quantifying the costs and benefits of architectural decisions,”Proceedings of the 23rd International Conference on Software Engineering (ICSE),pp. 297–306, 2001.
- R. Kazman, L. Bass, M. Klein, and G. Abowd, “ATAM: Method for architecture evaluation,” SEI Technical Report, CMU/SEI-2000-TR-004, 2000.
- P. Kruchten, P. Lago, and H. van Vliet, “Building up and reasoning about architectural knowledge,” Quality of Software Architectures, LNCS 4214, Springer, 2006.
- J. Tyree and A. Akerman, “Architecture decisions: Demystifying architecture,” IEEE Software, vol. 22, no. 2, pp. 19–27, 2005.
- M. Fowler and J. Lewis, “Microservices: a definition of this new architectural term,” martinfowler.com, 2014.
- S. Newman, Building Microservices, 2nd ed., O’Reilly Media, 2021.
- B. Burns, B. Grant, D. Oppenheimer, E. Brewer, and J. Wilkes, “Borg, Omega, and Kubernetes,” ACM Queue, vol. 14, no. 1, 2016. [CrossRef]
- C. Richardson, Microservices Patterns, Manning, 2018.
- M. Kleppmann, Designing Data-Intensive Applications, O’Reilly Media, 2017.
- E. Evans, Domain-Driven Design, Addison-Wesley, 2003.
- N. Marz and J. Warren, Big Data: Principles and Best Practices of Scalable Realtime Data Systems, Manning, 2015.
- Shostack, Threat Modeling: Designing for Security, Wiley, 2014.
- ISO/IEC, ISO/IEC 27001:2022 — Information Security Management Systems, ISO/IEC, 2022.
- R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems,3rd ed., Wiley, 2020.
- J. Bosch, Design and Use of Software Architectures, Addison-Wesley, 2000.
- D. Garlan, R. Allen, and J. Ockerbloom, “Architectural mismatch,” IEEE Software, vol. 12, no. 6, pp. 17–26, 1995.
- R. de Boer et al., “Architectural knowledge: Getting to the core,” Software Architecture, LNCS 5292, Springer, 2008.
- S. Brown, The C4 Model for Software Architecture, https://c4model.com, 2018.
- IEEE Computer Society, “Software Architecture in Industrial Practice,” IEEE Software, special issues, multiple years.
- P. Kruchten, “What colour is your architecture?” IEEE Software, vol. 23, no. 4, pp. 86–88, 2006.
- H. van Vliet, Software Engineering: Principles and Practice, 3rd ed., Wiley, 2008.
- Tang, P. Avgeriou, A. Jansen, R. Capilla, and M. Ali Babar, “A comparative study of architecture knowledge management tools,” Journal of Systems and Software, vol. 83, no. 3, pp. 352–370, 2010. [CrossRef]
- E. Breck et al., “The ML test score: A rubric for ML production readiness,” IEEE Big Data, 2017.
- D. Sculley et al., “Hidden technical debt in machine learning systems,” NIPS, 2015.
- M. Amershi et al., “Software engineering for machine learning,” IEEE Software, vol. 36, no. 4, pp. 81–90, 2019.
| Business / Organization Layer (B) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| B1 | Business Capability View | Capability structure | What business capabilities exist and which are critical? | Executives, EA | Structural | Logical |
| B2 | Business Process View | End-to-end workflows | How do business processes execute across domains? | Product, Operations | Behavioral | Logical |
| B3 | User / Actor View | Users and roles | Who interacts with the system and in what roles? | Product, Security | Structural | Logical |
| B4 | Organizational Ownership View | Accountability & governance | Who owns systems, data, and decisions? | Executives, EA | Structural | Logical |
| B5 | Interaction & Influence View | Cross-domain influence | How do organizational units influence each other? | Product, Architecture | Structural | Logical |
| Context & Application Layer (A) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| A1 | System Context View (C4 L1) | System boundary | What is inside and outside the system? | Product, Development | Structural | Logical |
| A2 | Application Functional View | Functional decomposition | How are application functions grouped? | Product, Development | Structural | Logical |
| A3 | Application Interaction View | Application collaboration | How do applications interact and depend on each other? | Development, Integration | Behavioral | Logical |
| A4 | User Role–Application Mapping View | Access responsibility | Which roles can access which applications? | Product, Security | Structural / Behavioral | Logical |
| Container / Component / Technical Service Layer (C) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| C1 | Container View (C4 L2) | Runtime containers | What are the main runtime units? | Solution Architects, Dev | Structural | Logical |
| C2 | Component View (C4 L3) | Internal modularity | How are components structured within containers? | Solution Architects, Dev | Structural | Logical |
| C3 | Technical Service View | Service responsibility | What capability boundary does each service own? | Dev, Architects | Structural | Logical |
| C4 | Technical Stack View | Technology choices | Which languages, frameworks, and platforms are used? | Dev, Operations | Structural | Physical |
| C5 | Communication & Protocol View | Interaction mechanisms | How do components communicate? | Dev, SRE | Structural / Behavioral | Logical / Physical |
| Integration & Processing Layer (IP) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| IP1 | Application Integration View | Business-level integration | How do applications exchange data? | Product, Integration | Behavioral | Logical |
| IP2 | Technical Integration View | Technical constraints | What latency, throughput, or coupling constraints exist? | Dev, SRE | Behavioral | Physical |
| IP3 | System Processing View | Execution semantics | How are requests processed end-to-end? | Dev, Operations | Behavioral | Logical |
| IP4 | Activity View | Action paths | What actions and decisions occur during execution? | Architects, Dev | Behavioral | Logical |
| IP5 | Process Flow View | Workflow execution | How do workflows orchestrate services? | Product, SRE | Behavioral | Logical |
| IP6 | Sequence Interaction View | Call ordering | What is the interaction sequence? | Dev, Architects | Behavioral | Logical |
| Data Architecture Layer (D) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| D1 | Business Data Flow View | Business data movement | How does data support business processes? | Product, Operations | Behavioral | Logical |
| D2 | Data Derivation & Evolution View | Data transformation | How is data derived and transformed? | Data Engineering, ML | Behavioral | Logical / Physical |
| D3 | Data Lineage View | Traceability | Where does data originate and propagate? | Compliance, Data Eng | Behavioral | Logical / Physical |
| D4 | Data Asset View | Ownership & value | What data assets exist and who owns them? | Data Office | Structural | Physical |
| D5 | Conceptual Data Entity View | Business entities | What core business entities exist? | Data Architects, Business | Structural | Logical |
| D6 | Data Quality View | Quality assurance | Is data accurate, complete, and timely? | Data Stewards | Structural / Behavioral | Logical / Physical |
| D7 | Data Compliance Flow View | Regulatory paths | Does data usage comply with regulations? | Compliance, Product | Behavioral | Logical / Physical |
| D8 | Data Pipeline View | Technical pipelines | How is data processed technically? | Data Engineering | Behavioral | Physical |
| D9 | Data Sovereignty View | Residency constraints | Where is data stored and restricted? | Compliance, EA | Structural | Physical |
| D10 | Logical Data Model View | Logical schema | How are entities logically related? | Dev, Data Architects | Structural | Logical |
| D11 | Physical Data Model View | Physical schema | How is data physically implemented? | DBA, Dev | Structural | Physical |
| Security, Compliance & Risk Layer (SCR) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| SCR1 | Security Control View | Control mechanisms | What controls enforce security policy? | Security, DevOps | Structural / Behavioral | Logical / Physical |
| SCR2 | Threat & Risk Modeling View | Threat analysis | What threats and risks exist? | Security, Risk | Structural / Behavioral | Logical / Physical |
| SCR3 | Attack Path View | Adversarial traversal | How could an attacker move through the system? | Security, IR | Behavioral | Physical |
| SCR4 | Service Authentication View | Service trust | How do services authenticate each other? | Security, Dev | Structural / Behavioral | Logical / Physical |
| SCR5 | User Authentication View | User identity | How are users authenticated? | Security, Product | Structural / Behavioral | Logical / Physical |
| SCR6 | Authorization & Access Control View | Access enforcement | Who is authorized to do what? | Security, Compliance | Structural / Behavioral | Logical |
| SCR7 | Compliance Boundary View | Regulatory scope | Which regulations apply and where? | Compliance, EA | Structural | Logical / Physical |
| Architecture Governance & Decision Layer (AGD)(Meta-layer) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| AGD1 | Architecture Decision View | Decision rationale | What architectural decisions were made and why? | Architects, EA | Structural | Logical |
| AGD2 | Evolution & Change Impact View | Change analysis | What is impacted by a proposed change? | Architects, Product | Behavioral | Logical |
| AGD3 | Quality Attribute Trade-off View | Trade-off reasoning | How are quality attributes balanced? | Architects, SRE | Structural / Behavioral | Logical |
| AGD4 | Cost & Value View | Economic impact | What are the costs and expected value? | Executives, Finance | Structural | Logical |
| AGD5 | Team–Architecture Alignment View | Organizational fit | Are teams aligned with the architecture? | Engineering Managers | Structural | Logical |
| Deployment / Infrastructure / Networking Layer (DIN) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| DIN1 | Application Deployment Location View | Deployment topology | Where are applications deployed? | EA, Infrastructure | Structural | Physical |
| DIN2 | Network Topology View | Network segmentation | How is the network structured? | Network, Security | Structural | Physical |
| DIN3 | Infrastructure Composition View | Infrastructure layout | What infrastructure components exist? | Dev, Operations | Structural | Physical |
| DIN4 | Resource & Capacity View | Scaling & capacity | How are resources allocated and scaled? | SRE, Infrastructure | Structural | Physical |
| Operations & Reliability Layer (OR) | ||||||
| ID | Viewpoint Name | Primary Concern | Key Questions Answered | Primary Stakeholders | Focus | Scope |
| OR1 | Operations View | Incident handling | How are incidents managed operationally? | Operations, Dev | Behavioral | Physical |
| OR2 | Resilience & DR View | Recovery strategy | What are RPO/RTO objectives? | Infrastructure, Executives | Structural / Behavioral | Physical |
| OR3 | Reliability & SLO View | Reliability targets | What service levels are required? | Dev, SRE | Structural / Behavioral | Logical |
| OR4 | Monitoring & Observability View | System visibility | How is system health observed? | Dev, SRE | Structural | Logical |
| OR5 | Operational Feedback View | Learning loops | How do operations inform evolution? | Architects, Operations | Behavioral | Logical |
| Aspect | C4-Only Documentation | ISO/IEC/IEEE 42010 (Conceptual) | TOGAF-Oriented Documentation | Taxonomy-Driven Approach |
| Viewpoint definition | Fixed, limited | Abstract, project-specific | Implicit in artifacts | Explicit and standardized |
| Concern coverage | Structural focus | Depends on viewpoint selection | Enterprise-centric | Integrated and balanced |
| Data & security visibility | Limited | Inconsistent | Partial | Explicit and systematic |
| EA review effectiveness | Local | Conceptually sound but variable | Governance-oriented | Structured and risk-aware |
| Cross-project comparability | Low | Low–Medium | Medium | High |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
