Module 28 of 64 · Information Systems

Source of truth and information authority

24 min read 6 outcomes 3 standards cited

This is the third of 10 Information Systems Architecture modules. It examines why the common "single source of truth" directive can mislead architecture work and introduces the authority distinctions that make information governance honest and practical. The module introduces an information authority ownership model that the London case will use throughout the rest of Stage 4.

By the end of this module you will be able to:

  • Explain why the phrase "source of truth" can mislead architecture work when used carelessly
  • Differentiate attribute authority, lifecycle authority, stewardship, and publication authority
  • Describe the information authority ownership model and its five layers
  • Document information authority without pretending the enterprise has one perfect master system
  • Explain when a single-source claim is still valid and what conditions make it testable
  • Apply authority thinking to the London customer, planning, asset, and network information set
Governance image suggesting explicit authority boundaries, stewardship, and publication control across multiple information sources

Real-world case · 2023

Four months searching for a winner that did not exist.

In 2023, a large electricity transmission operator embarked on a data-quality improvement programme. The steering group opened with a directive: "We need a single source of truth for every major business entity." The architecture team spent four months trying to identify which system was the definitive source for customer, asset, network, and planning information.

It could not settle the question because, in practice, no single system was authoritative for every attribute and every lifecycle stage of any of those entities. Customer identity was managed by one system. Customer service history sat in another. Customer billing attributes were mastered in a third. All three were legitimate sources for different purposes.

The "single source of truth" directive had created the impression that the problem was choosing a winner. The real problem was understanding that the enterprise had multiple authority boundaries, and the architecture needed to make those boundaries explicit rather than flatten them into a slogan.

If three systems are each legitimately authoritative for different attributes of the same entity, can the enterprise really name a single source of truth?

That story illustrates why information authority is one of the most decision-relevant topics in Phase C. The intention behind "source of truth" is good: leaders want clarity and trust. The problem is that enterprise reality is usually more complex than a slogan can capture. This module introduces the authority distinctions that make governance honest.

28.1 Why the slogan causes trouble

Leaders often ask for a single source of truth because they want clarity and trust. The intention is understandable. The problem is that enterprise reality is usually more complex. Different systems may be authoritative for different attributes, stages, or forms of publication of the same business object.

If the architecture responds to the slogan too literally, it can flatten real governance needs and create the false impression that one product can own the truth of everything. The transmission operator in the opening story spent four months looking for a winner that did not exist because the directive assumed a shape of reality that the enterprise did not have.

The slogan causes three specific problems. First, it implies a single system answer when the enterprise actually has distributed authority. Second, it discourages the team from asking the harder question: "Which parts of this entity are authoritative in which system, for which purpose?" Third, it can become a political tool where system owners compete to be named "the source of truth" rather than collaborating on a shared authority model.

The concept of a source of truth is useful only when the architecture specifies what information is authoritative, for which consumers, and under which conditions. Without that precision, the concept creates more governance confusion than it resolves.

Working definition informed by G190 and G21B - G190, Information Mapping

The phrase is useful only when the architecture specifies what is authoritative, for whom, and under which conditions. A bounded, testable claim is valuable. An unbounded slogan is not.

28.2 The authority distinctions that matter

Four kinds of authority appear repeatedly in enterprise information architecture. Recognising them prevents the architecture from collapsing a nuanced problem into an impossible one-system answer.

Attribute authority. One system or role may be authoritative for selected fields or properties, but not for the whole entity. Customer identity might sit in one system while service history sits in another. In a London distribution network, the asset register might be authoritative for asset specification data while the GIS is authoritative for spatial location. Both are legitimate. Neither is the whole truth.

Lifecycle authority. Different actors may control different stages such as registration, validation, operational update, retirement, or publication. The system that creates a record may not be the system that validates it for external publication. A connection application might be created in one system, validated in another, and published through a third. Each stage has its own authority owner.

Stewardship authority. A governance role may protect quality, meaning, and standards without being the operational producer of every data change. The steward does not necessarily own the system. The steward owns the rules. In TOGAF terms, stewardship is the governance responsibility that ensures metadata definitions, quality thresholds, and usage policies are maintained even when multiple systems participate in producing or consuming the information.

Publication authority. The enterprise may designate which representation is trusted for external or cross-enterprise consumption even when upstream authority is shared. This is the "last mile" authority that determines what consumers are expected to rely on. In the London case, the LTDS publication layer has publication authority for network development information even though the upstream data is produced by planning and asset systems.

28.3 The information authority ownership model

The four authority types combine into an information authority ownership model with five layers. Each layer answers a different governance question, and together they replace the single-source slogan with a structured, testable view.

  1. Entity and domain identification. What is the business entity or information domain being governed? Use enterprise language from the information map (Module 27), not system or table names.
  2. Attribute decomposition. Which attributes or attribute groups need separate authority assignments? Not every attribute needs the same governance treatment. Identity attributes may need tighter control than historical transaction records.
  3. Authority assignment. For each attribute group, which system, role, or team holds attribute authority and lifecycle authority? This layer records who can create, update, validate, and retire the information.
  4. Stewardship assignment. Which role or function stewards the meaning, quality rules, and usage policies? The steward may be different from the operational authority. The steward ensures the rules are followed across all participating systems.
  5. Publication designation. Which representation is trusted for external or cross-enterprise consumption? What metadata must travel with the published view? This layer connects authority to the downstream trust that consumers depend on.

The model is documented as a matrix or structured table, not as a single-system declaration. Each row represents an entity or attribute group. Each column captures one of the five layers. The result is an authority map that governance boards can review, challenge, and use to resolve disputes.

In an asset-intensive organisation, the engineering team may hold attribute authority for asset specification data. The maintenance team may hold lifecycle authority for condition updates. The data governance office may steward the definitions and quality rules. The regulatory-reporting function may hold publication authority for the view that the regulator receives. Asking "which system is the source of truth for assets?" misses all five layers of this model.

Information authority describes the governance relationship between an enterprise, its information assets, and the systems, roles, and processes that create, validate, steward, and publish that information.

Working definition derived from G190 and G21B - G190 and G21B

Authority is a governance concept, not a system concept. A system may participate in authority, but the authority itself belongs to the enterprise. The ownership model makes that distinction practical.

Governance image suggesting explicit authority boundaries across multiple information sources
Information authority in a real enterprise is rarely a single-system answer. An authority map that shows the real governance boundaries is more honest and more useful than a slogan.

28.4 How to document information authority honestly

A practical information-authority exercise follows four steps that align with the ownership model described above.

  1. Name the business entity or information object in plain language. Use enterprise vocabulary from the information map, not system or table names. "Customer" is enterprise language. "CRM_CONTACT_MASTER" is not.
  2. Break the object into the attributes or lifecycle states that matter to real decisions. Not every attribute needs the same governance treatment. Customer identity, contact details, billing attributes, and service history may each have different authority owners.
  3. Record which system or role is authoritative for each part and which role stewards the meaning and controls. This step populates the authority and stewardship layers of the ownership model.
  4. Record which published representation consumers are expected to trust and what assumptions or caveats travel with it. This step populates the publication layer and connects authority to downstream consumer trust.

This produces an authority map rather than a single-system claim. The map is more honest, more governable, and more useful for integration and publication decisions later.

28.5 When a single-source claim can still be valid

The phrase can still be useful when the architecture is genuinely talking about one defined representation for one defined consumer purpose. The problem is not the phrase itself. The problem is using it without saying what is authoritative, for whom, and under which conditions.

A team that says "the CRM is the single source of truth for customer contact details used by the call centre" has made a bounded, testable claim. The claim specifies the entity (customer contact details), the authority system (the CRM), and the consumer purpose (call-centre use). That claim can be validated, governed, and changed when conditions change.

A team that says "we need a single source of truth for customer data" has made a claim too vague to govern anything. It does not specify which attributes, which lifecycle stages, which consumers, or which publication channels. The architecture team should always push for the bounded version.

Three conditions make a single-source claim testable. First, it specifies which attributes or lifecycle stages are covered. Second, it names the consumer purpose the authority serves. Third, it states how conflicts with other systems are resolved. If all three are present, the claim is useful. If any are missing, the claim needs refining before it can be governed.

Common misconception

Every enterprise should have a single source of truth for each major business entity.

Authority is often distributed across attributes, lifecycle stages, stewardship roles, and publication channels. An information-authority map that shows those boundaries honestly is more governable than a slogan that implies one system can own the truth of everything.

London Grid Distribution

In London Grid Distribution, customer details, planning assumptions, asset condition, topology, telemetry, and published outputs do not all share one natural authority location. They sit across functions and systems with different operational and governance responsibilities.

The London authority map needs to show at least the following authority assignments.

  • Customer information. Identity attributes may be authoritative in the customer-management system. Connection-request details may be authoritative in the connections platform. Billing attributes may be authoritative in the finance system. Stewardship should sit with the customer-data office.
  • Planning information. Scenario assumptions are authoritative in the planning-modelling tool. Published forecasts carry publication authority through the LTDS layer. The planning team stewards the methodology and interpretation rules.
  • Asset information. Specification data may be authoritative in the asset register. Condition data may be authoritative in the maintenance system. Spatial data may be authoritative in the GIS. The asset-data governance office stewards definitions and quality thresholds.
  • Network information. Topology and connectivity are authoritative in the network model. Ratings and constraints may be authoritative in the engineering-design system. Publication authority for external network development data sits with the LTDS publication layer.

That is why the London case needs an information-authority map rather than a one-system myth. The course uses that map to explain downstream publication rules, integration choices, and analytics trust. Every module that follows in Stage 4 builds on the authority structure defined here.

Check your understanding

A programme board directs the architecture team to identify 'the single source of truth for asset data.' The architecture team finds that asset specification, condition, maintenance history, and published regulatory views are each mastered by different systems and roles. What should the team recommend?

A governance review asks: 'Who is authoritative for the customer record?' The architecture team replies: 'The CRM.' A senior architect challenges this because billing attributes are mastered in the finance system and service history is mastered in the field-operations platform. What authority distinction is the team missing?

An enterprise declares its new data platform to be 'the single source of truth for all planning information.' Six months later, planning teams complain that the platform's published forecasts contradict the assumptions held in the scenario-modelling tool. What has gone wrong?

Which layer of the information authority ownership model answers the question: 'What metadata must travel with the published view so that consumers can interpret it correctly?'

Key takeaways

  • Source of truth is too blunt on its own for serious architecture work. It becomes useful only when bounded by entity, attribute, consumer, and purpose.
  • Authority can be attribute-specific, lifecycle-specific, stewardship-based, or publication-based. Collapsing these into one system answer hides the real governance structure.
  • The information authority ownership model has five layers: entity identification, attribute decomposition, authority assignment, stewardship assignment, and publication designation.
  • An information-authority map is usually more honest and more governable than a slogan.
  • Trust improves when authority is recorded explicitly instead of implied vaguely.
  • The London case needs distributed authority assignments across customer, planning, asset, and network information, each with multiple layers.

Standards and sources cited in this module

  1. G190, Information Mapping

    Full guide

    Provides the information-domain and authority-mapping method that underpins this module.

  2. G21B, Customer Master Data Management

    Full guide

    Demonstrates attribute and lifecycle authority distinctions in the customer-data context.

  3. G234, Metadata Management

    Full guide

    Connects authority and publication to the metadata that makes published outputs trustworthy.

You now understand why information authority is distributed rather than singular, and how the ownership model captures that reality in five layers. The next question is: how does customer master data management work as an architecture problem rather than a software purchase? That is Module 29.

Module 28 of 64 · Information Systems Architecture