Skip to main content

Governance Quality Analysis

Perform comprehensive governance quality analysis across all architecture artifacts to identify inconsistencies, gaps, ambiguities, and compliance issues.

Command

arckit analyze <project ID or scope>

Arguments

  • scope (required): Project ID or “all projects”

Examples

arckit analyze "001"
arckit analyze "all projects"

Purpose

Identify inconsistencies, gaps, ambiguities, and compliance issues across all architecture governance artifacts before implementation or procurement. This command performs non-destructive analysis and produces a structured report for tracking and audit.

Operating Constraints

  • Non-Destructive: Do NOT modify existing artifacts
  • Architecture Principles Authority: Principles are non-negotiable - conflicts require adjustment of requirements/designs, not principles
  • UK Government Compliance Authority: TCoP, AI Playbook, ATRS compliance are mandatory
  • Evidence-Based: Every finding must cite specific file:section:line references

Detection Passes

The command runs comprehensive analysis across 11 domains:

A. Requirements Quality Analysis

Duplication Detection:
  • Near-duplicate requirements across BR/FR/NFR categories
  • Redundant requirements that should be consolidated
Ambiguity Detection:
  • Vague adjectives lacking measurable criteria (“fast”, “secure”, “scalable”)
  • Missing acceptance criteria
  • Unresolved placeholders (TODO, TBD, TBC, ???)
Underspecification:
  • Requirements with verbs but missing measurable outcomes
  • Missing NFR categories (no security, no performance, no compliance)
  • Missing data requirements (handles sensitive data but no DR-xxx)
Priority Issues:
  • All requirements marked as MUST (no prioritization)
  • No MUST requirements (everything is optional)
  • Conflicting priorities

B. Architecture Principles Alignment

Principle Violations (CRITICAL):
  • Requirements or designs that violate architecture principles
  • Technology choices that conflict with approved stack
  • Security approaches that violate security-by-design principle
Missing Principle Coverage:
  • Principles not reflected in requirements
  • Principles not validated in design reviews

C. Requirements → Design Traceability

Coverage Gaps:
  • Requirements with zero design coverage
  • Critical MUST requirements not covered
  • Security requirements (NFR-S-xxx) not in security architecture
  • Performance requirements (NFR-P-xxx) not validated in design
Orphan Design Elements:
  • Components in HLD/DLD not mapped to any requirement
  • Technology choices not justified by requirements

D. Vendor Procurement Analysis

SOW Quality:
  • SOW requirements match ARC--REQ-.md?
  • Missing evaluation criteria?
  • Ambiguous acceptance criteria?
Vendor Evaluation:
  • Evaluation criteria align with requirement priorities?
  • All critical requirements included in evaluation?

E. Stakeholder Traceability Analysis

Stakeholder Coverage:
  • All requirements traced to stakeholder goals?
  • Orphan requirements (not linked to any stakeholder goal)?
Conflict Resolution:
  • Requirement conflicts documented and resolved?
  • Decision authority identified?
RACI Governance Alignment:
  • Risk owners from stakeholder RACI matrix?
  • Data owners from stakeholder RACI matrix?

F. Risk Management Analysis

Risk Coverage:
  • High/Very High inherent risks have mitigation requirements?
  • Risks reflected in design?
  • Risk owners assigned and aligned with RACI matrix?
Risk-SOBC Alignment:
  • Strategic risks reflected in Strategic Case urgency?
  • Financial risks in Economic Case cost contingency?

G. Business Case Alignment

Benefits Traceability:
  • All benefits mapped to stakeholder goals?
  • All benefits supported by requirements?
  • Benefits measurable and verifiable?
Option Analysis Quality:
  • Do Nothing baseline included?
  • Recommended option justified by requirements scope?

H. Data Model Consistency

DR-xxx Requirements Coverage:
  • All DR-xxx requirements mapped to entities?
  • All entities traced back to DR-xxx requirements?
Data Model-Design Alignment:
  • Database schemas in DLD match data model entities?
  • CRUD matrix aligns with component design in HLD?

I. UK Government Compliance

TCoP (Technology Code of Practice):
  • Assessment exists?
  • All 13 points assessed?
  • Critical issues resolved?
AI Playbook (for AI systems):
  • Assessment exists?
  • Risk level determined?
  • All 10 principles and 6 themes assessed?
  • Mandatory assessments completed (DPIA, EqIA, Human Rights)?
ATRS (for AI systems):
  • Record exists?
  • Tier 1 and Tier 2 completed?
  • Ready for GOV.UK publication?

J. MOD Secure by Design Compliance

7 SbD Principles Assessment:
  • All 7 principles assessed?
  • CAAT registered and updated?
  • DTSL appointed?
NIST CSF Coverage:
  • Identify, Protect, Detect, Respond, Recover functions covered?
Three Lines of Defence:
  • First Line (DTSL), Second Line (Technical Coherence), Third Line (Audit) implemented?

K. Consistency Across Artifacts

Terminology Drift:
  • Same concept named differently across files
  • Inconsistent capitalization/formatting
Technology Stack Consistency:
  • Stack choices in HLD match principles
  • Technology in DLD matches HLD

Severity Assignment

CRITICAL:
  • Violates architecture principles (MUST)
  • Missing core artifact (no ARC--REQ-.md)
  • MUST requirement with zero design coverage
  • Stakeholder: Orphan requirements not linked to goals
  • Risk: High/Very High risks with no mitigation
  • UK Gov: TCoP/AI Playbook blocking issues
  • MOD: CAAT not registered, no DTSL appointed
HIGH:
  • Duplicate or conflicting requirements
  • Ambiguous security/performance attribute
  • Missing NFR category (no security, no performance)
  • Vendor design doesn’t address SOW requirements
MEDIUM:
  • Terminology drift
  • Missing optional NFR coverage
  • Underspecified edge case
  • Minor traceability gaps
LOW:
  • Style/wording improvements
  • Minor redundancy
  • Documentation formatting

Output

Generates ARC-{PROJECT_ID}-ANAL-v{VERSION}.md with:
  • Executive summary with overall status and governance health score
  • Findings summary table (ID, Category, Severity, Location, Summary, Recommendation)
  • Requirements analysis with coverage matrix
  • Architecture principles compliance
  • Stakeholder traceability analysis
  • Risk management analysis
  • Business case analysis (if SOBC exists)
  • Data model analysis (if DATA exists)
  • UK Government compliance analysis (if applicable)
  • MOD compliance analysis (if applicable)
  • Security & compliance summary
  • Recommendations (Critical/High/Medium/Low priorities)
  • Metrics dashboard
  • Detailed findings with examples

Governance Health Score

Grade Thresholds:
  • A (90-100%): Excellent governance, ready to proceed
  • B (80-89%): Good governance, minor issues
  • C (70-79%): Adequate governance, address high-priority issues
  • D (60-69%): Poor governance, major rework needed
  • F (<60%): Insufficient governance, do not proceed

Prerequisites

Architecture Principles (MANDATORY):
  • Check if projects/000-global/ARC-000-PRIN-*.md exists
  • If NOT found: ERROR “Run /arckit:principles first”
Project Artifacts (More artifacts = better analysis):
  • REQ (Requirements)
  • STKE (Stakeholder Analysis)
  • RISK (Risk Register)
  • SOBC (Business Case)
  • DATA (Data Model)
  • Vendor HLD/DLD files
  • Design review documents (HLDR, DLDR)
  • Compliance assessments (TCOP, SECD, AIPB, ATRS)

Hook Pre-processing

If the Governance Scan Pre-processor Hook has run:
  • All artifact metadata, requirements, principles, risks, cross-references extracted
  • Vendor data and placeholder counts available
  • Go directly to semantic analysis and detection passes
  • Do NOT re-read artifacts listed in hook output
  • arckit conformance - Architecture conformance (ADR implementation, drift)
  • arckit traceability - Requirements traceability matrix
  • arckit principles-compliance - Detailed RAG scoring of principles
  • arckit health - Quick metadata health check

Remediation Guidance

After analysis, the command can suggest:
  1. Specific edits to fix requirements
  2. Design review guidance
  3. Command sequences to address gaps
  4. Templates for missing artifacts
Commands to run based on findings:
  • arckit principles - Create/update architecture principles
  • arckit stakeholders - Analyze stakeholder drivers, goals, conflicts
  • arckit risk - Create risk register
  • arckit sobc - Create business case
  • arckit data-model - Create data model
  • arckit tcop - Technology Code of Practice assessment
  • arckit ai-playbook - AI Playbook assessment
  • arckit mod-secure - MOD Secure by Design assessment

Build docs developers (and LLMs) love