Module 48 of 64 · Migration and Delivery

Architecture landscape and partitioning

60 min read 7 outcomes 5 standards cited

This is the fifth of 8 Migration and Delivery modules. It covers the architecture landscape concept and partitioning guidance from C220 Part 5 in full, including the three levels of architecture (strategic, segment, capability), the partitioning criteria, the role of the Architecture Repository in landscape management, and the governance discipline that prevents partitioning from becoming fragmentation. No knowledge beyond Module 47 is assumed.

By the end of this module you will be able to:

  • Define architecture landscape and explain how it relates to the Architecture Repository and the Enterprise Continuum
  • Describe the three levels of architecture (strategic, segment, capability) from C220 Part 5 and explain when each level is appropriate
  • List the partitioning criteria from C220 Part 5 and explain the trade-offs of each
  • Use partitions to reduce complexity without pretending interdependence has disappeared
  • Explain how governance keeps partitions coherent and how the Architecture Board manages cross-partition dependencies
  • Explain how the architecture landscape feeds portfolio management decisions (G238) and the difference between strategic and tactical portfolio choices
  • Apply partitioning discipline to the London change threads and repository views across all four domain threads
Layered systems visual used here to suggest that large architecture efforts need sensible partitions without hiding cross-cutting dependencies

Real-world case · 2023

Four clean partitions. Every hard cross-cutting problem orphaned between them.

A large telecoms operator attempted to run a single enterprise architecture engagement covering its consumer, wholesale, network, and IT divisions simultaneously. The engagement collapsed under its own weight within four months.

The response was to partition the work by division. That helped with scope management but created a new problem: the cross-divisional dependencies that mattered most were now orphaned between the partitions. The identity model was defined differently in each partition. The data-authority rules conflicted. The integration patterns were incompatible.

Partitioning is necessary for large architecture efforts. The question is never whether to partition but how to partition in a way that makes work manageable without hiding the joins that matter. The telecoms operator had partitioned correctly for scope management but incorrectly for architectural coherence. The distinction is what C220 Part 5 exists to address.

If each partition can tell a self-contained story but nobody can explain how they interact, has the landscape been partitioned or fragmented?

That story illustrates the trade-off at the heart of partitioning: scope management versus dependency visibility. This module explains the full C220 Part 5 landscape and partitioning guidance, including the three architecture levels, the partitioning criteria, and the governance mechanisms that keep partitions coherent.

48.1 What architecture landscape means

The architecture landscape is the total set of architectures that the enterprise maintains and governs at any point in time. It includes baseline architectures (current state), target architectures (desired future state), and transition architectures (intentionally designed interim states). The landscape exists at multiple levels of detail and covers all four architecture domains.

The landscape is not a single document. It is the enterprise's architectural knowledge base, maintained in the Architecture Repository and governed through the architecture governance framework. C220 Part 5 describes the landscape as the context within which all architecture work takes place.

The Enterprise Continuum provides the classification framework for the landscape. It ranges from generic foundation architectures (applicable across industries) through common-systems architectures (applicable within an industry) to organisation-specific architectures. The landscape lives at the organisation-specific end of the continuum, but it draws on and references assets from the generic and industry-common levels.

The architecture landscape shows the architectures of the enterprise, at various levels of abstraction, at various states of the enterprise, and across time.

The TOGAF Standard, 10th Edition - C220 Part 5, Architecture Landscape and Partitioning

Three dimensions in one sentence: levels of abstraction (strategic, segment, capability), states (baseline, transition, target), and time (the landscape evolves as the enterprise evolves). Managing this three-dimensional view is what landscape governance is for.

48.2 The three levels of architecture from C220 Part 5

C220 Part 5 defines three levels at which architecture work can be conducted. Each level serves a different audience, addresses a different scope, and produces outputs at a different level of detail. Understanding the levels matters because it prevents teams from either drowning in detail at the strategic level or making implementation decisions without strategic context.

Strategic architecture

A strategic architecture provides a long-term, enterprise-wide view that guides investment and direction. It defines the principles, major capability targets, and cross-enterprise constraints that all lower-level architectures must respect. Its audience is enterprise leadership and the Architecture Board. Its outputs include architecture principles, capability targets, technology direction, and enterprise-wide standards.

A strategic architecture should not describe implementation detail. Its purpose is to set direction, not to design solutions. If a strategic architecture specifies which platform to use, it has dropped to the wrong level.

Segment architecture

A segment architecture provides more detail for a major division, business area, or capability group of the enterprise. It bridges the strategic view and the solution view. Its audience is divisional leadership and programme architects. Its outputs include detailed capability models, information models, application portfolios, and technology standards for the segment.

A segment architecture must be consistent with the strategic architecture above it. If the segment architecture defines principles or standards that conflict with the enterprise-wide view, the conflict must be resolved through governance, not hidden.

Capability architecture (solution level)

A capability or solution architecture provides the detail needed to guide implementation of a specific solution or capability. Its audience is delivery teams and solution architects. Its outputs include detailed design, component specifications, integration patterns, and deployment models.

A capability architecture must be consistent with the segment architecture that contains it and, through the segment, with the strategic architecture. The chain of consistency from strategic through segment to capability is what gives the enterprise architectural coherence across levels.

48.3 Partitioning criteria from C220 Part 5

Partitioning is the act of dividing the architecture landscape into manageable portions that can be owned, developed, and governed by different teams. C220 Part 5 describes several criteria by which the enterprise can partition its architecture work.

By architecture domain. Separate business, information, application, and technology architecture into distinct partitions. This aligns with the ADM's phase structure but creates risk at the domain boundaries. Cross-domain dependencies (such as the relationship between data authority and technology platform choice) can be missed.

By organisational unit. Partition by division, department, or business unit. This aligns with ownership and accountability but can orphan cross-unit concerns like shared data models, common platforms, and enterprise-wide standards.

By geography. Partition by region, country, or site. This is appropriate when regulatory, cultural, or infrastructure differences make a single architecture impractical. It creates risk when geographically partitioned architectures need to share services or data.

By time horizon. Partition by strategic (long-term), tactical (medium-term), and operational (short-term) horizons. This aligns with the three architecture levels but creates risk when short-term decisions are made without reference to long-term direction.

By subject matter. Partition by topic such as security, data, integration, or user experience. This creates deep expertise within each partition but can fragment the enterprise view if the partitions do not communicate.

By capability or value stream. Partition by business capability or value stream. This aligns architecture work with business outcomes but requires strong cross-capability governance to prevent divergence on shared infrastructure and standards.

Common misconception

Partitioning means each partition can operate independently.

Good partitions clarify ownership while preserving visible interfaces, constraints, and dependency maps. If each partition tells a self-contained story but nobody can explain how they interact, the landscape has been fragmented, not partitioned. The test is whether the cross-partition dependencies are visible and governed.

48.4 Governance of partitions

Partitioning without governance creates fragmentation. C220 Part 5 describes several governance mechanisms that keep partitions coherent.

Architecture Board oversight. The Architecture Board is responsible for the overall landscape, including the coherence across partitions. Partition-level architecture teams may govern their own scope, but the Architecture Board governs the joins.

Cross-partition dependency maps. The enterprise must maintain a visible map of dependencies that cross partition boundaries. This map is a governance tool, not a diagramming exercise. When a partition-level team changes something that affects another partition, the dependency map is what makes the impact visible.

Shared standards and principles. Enterprise-wide principles and standards apply across all partitions unless a governed exception has been granted. This prevents partitions from diverging on fundamental decisions like identity models, data formats, or integration patterns.

Repository discipline. All partitions publish their outputs to the same Architecture Repository. This makes the landscape visible as a whole, even when the work is distributed. A partition that maintains its own separate repository is effectively hidden from enterprise governance.

Interface contracts. When partitions share services, data, or infrastructure, the interfaces should be formally defined and governed. Interface contracts prevent one partition from making changes that break another partition's assumptions.

Layered systems visual used here to suggest that large architecture efforts need sensible partitions without hiding cross-cutting dependencies
Partitioning helps the enterprise manage complexity. The test is whether cross-cutting dependencies remain visible across the partition boundaries.

48.5 London Grid Distribution: landscape and partitioning in practice

The London case needs partitioning because connections, publication, resilience, and governance work progress at different levels and rhythms. At the same time, the repository has to show the joins among them or the architecture quickly becomes misleading.

London architecture levels

Strategic level: Enterprise-wide principles for data authority, publication discipline, cyber resilience, and regulatory transparency. These principles constrain all lower-level work.

Segment level: The connections segment covers the customer connections value stream end-to-end, including case management, planning, publication, and assurance. The asset management segment covers network asset lifecycle. Each segment has its own architecture team and its own ADM cycle.

Capability level: Individual solution architectures for the case-management platform, the publication pipeline, the model tooling, and the cross-layer assurance view. Each capability architecture traces back to the segment and, through it, to the strategic principles.

London partitioning decisions

The London architecture is partitioned primarily by capability and value stream, with cross-partition governance provided by the Architecture Board and the repository. The critical cross-partition dependencies include:

  • Data-authority rules (strategic) constrain every segment and capability architecture.
  • The publication pipeline (connections segment) depends on the asset data model (asset management segment).
  • Cyber assurance (cross-cutting) applies to every partition but is owned at the strategic level.
  • The case-management platform (capability) must enforce authority rules defined at the segment level.

Each of these dependencies must be visible in the repository and governed by the Architecture Board. Without that visibility, partition teams will make local decisions that create cross-partition conflicts.

48.6 Portfolio management and architecture: the G238 linkage

The TOGAF Series Guide G238 addresses the relationship between enterprise architecture and portfolio management. The central insight is that the architecture landscape is the primary input to portfolio decisions, and portfolio decisions are the primary output that connects architecture to enterprise investment.

What portfolio management means in an architecture context

Portfolio management in this context is the discipline of selecting, prioritising, and sequencing the enterprise's change initiatives so that they deliver the target architecture within acceptable risk, cost, and time constraints. It is not project management (which manages individual initiatives) and it is not programme management (which manages groups of related initiatives). It is the enterprise-level view of which changes to invest in, when, and in what order.

Without architecture input, portfolio decisions become political: whoever argues most persuasively gets funding. With architecture input, portfolio decisions become structural: investments are sequenced based on dependency chains, capability gaps, risk profiles, and the transition states needed to reach the target architecture.

How the architecture landscape feeds portfolio decisions

G238 describes several specific ways the architecture landscape supports portfolio management.

  • Gap analysis. The gap between the baseline architecture and the target architecture identifies the changes the enterprise needs to make. Each gap is a potential portfolio item. The architecture landscape makes these gaps visible and traceable across all four domains.
  • Dependency mapping. The architecture landscape shows which changes depend on other changes. A data-quality initiative that depends on a platform migration cannot start before the platform is in place. Portfolio sequencing must respect these dependencies or create delivery risk.
  • Risk assessment. The architecture landscape identifies where the enterprise has concentration risk, technical debt, or compliance exposure. Portfolio decisions should prioritise changes that reduce the most consequential risks, not just the most visible ones.
  • Transition-state logic. The transition architectures from Phase E and Phase F define intentional intermediate states. Portfolio management uses these transition states to sequence investment across multi-year programmes.

Strategic versus tactical portfolio decisions

G238 distinguishes between strategic and tactical portfolio decisions. Strategic portfolio decisions determine the enterprise's long-term investment direction: which major capabilities to build, which platforms to adopt, and which programmes to fund across multiple years. These decisions are informed by the strategic-level architecture.

Tactical portfolio decisions determine how to sequence and resource work within an approved programme: which work packages to deliver first, how to handle cross-team dependencies, and how to manage scope changes within a fixed budget. These decisions are informed by segment and capability-level architectures.

The risk arises when tactical decisions are made without reference to strategic architecture. A delivery team that resequences work packages to meet a local deadline may create a dependency conflict that only the strategic architecture can reveal. G238 recommends that tactical portfolio changes above a defined risk threshold are reviewed against the architecture landscape before approval.

The architecture landscape exists to inform investment. A portfolio decision that ignores the landscape is an investment decision made without structural evidence.

Working definition derived from G238 portfolio management guidance - G238, Portfolio Management and Architecture

G238's core message is that architecture and portfolio management are two sides of the same enterprise discipline. Architecture provides the structural evidence. Portfolio management translates that evidence into investment decisions.

48.7 London Grid: how the transformation portfolio connects to the architecture roadmap

The London transformation programme portfolio includes several major initiatives: connections reform, data publication modernisation, OT platform renewal, cyber resilience improvement, and regulatory compliance. Each initiative is a portfolio item. The architecture landscape determines how they relate to each other.

Dependency-driven sequencing. Data publication modernisation depends on data-quality improvements, which depend on OT platform telemetry accuracy. The portfolio cannot fund publication modernisation in isolation. The architecture landscape makes this dependency chain visible so that portfolio sequencing respects the structural order.

Strategic portfolio decision. Should the enterprise invest in a unified data platform or continue with domain-specific data systems? This is a strategic portfolio decision that the architecture landscape informs by showing where data authority is currently fragmented, what the integration cost is, and what risk the fragmentation creates for LTDS publication accuracy.

Tactical portfolio decision. Within the connections reform programme, should the self-service portal be delivered before or after the backend assessment engine upgrade? The architecture landscape shows that the portal depends on real-time network data from the assessment engine, so the backend upgrade should be sequenced first or the portal will need expensive temporary integrations.

Without the architecture landscape, these portfolio decisions would be made on the basis of business urgency alone. Business urgency is a valid input, but it is not sufficient. The architecture provides the structural evidence that prevents the portfolio from creating dependency conflicts, rework, and integration surprises.

Check your understanding

An architecture team partitions its work into four domain areas. Each domain produces its own target-state view, but no cross-domain dependency map exists. What is the most likely risk?

C220 Part 5 defines three levels of architecture. Which are they?

An initiative-level team says it does not need to follow enterprise-wide principles because its delivery timeline is too tight. How should this be handled?

What is the primary difference between partitioning and fragmentation?

Key takeaways

  • The architecture landscape is the total set of architectures the enterprise maintains, viewed across three dimensions: abstraction level, state, and time.
  • C220 Part 5 defines three architecture levels: strategic (direction), segment (division or capability group), and capability/solution (implementation detail).
  • Six partitioning criteria are available: domain, organisational unit, geography, time horizon, subject matter, and capability/value stream.
  • Each criterion has trade-offs: scope management improves but cross-boundary dependency visibility must be actively maintained.
  • Five governance mechanisms keep partitions coherent: Architecture Board oversight, cross-partition dependency maps, shared standards, repository discipline, and interface contracts.
  • London partitions primarily by capability and value stream, with strategic-level principles constraining all lower-level work and the Architecture Board governing cross-partition dependencies.
  • G238 links architecture landscape to portfolio management: gap analysis, dependency mapping, risk assessment, and transition-state logic all feed portfolio sequencing decisions. Strategic portfolio decisions set long-term direction; tactical decisions must still respect the architecture landscape.

Standards and sources cited in this module

  1. The TOGAF Standard, 10th Edition (C220)

    Part 5, Architecture Landscape and Partitioning; Part 3, Applying the ADM

    The primary source for landscape management, the three architecture levels, and all partitioning criteria covered in this module.

  2. G186, Practitioners' Approach to Developing Enterprise Architecture Following the TOGAF ADM

    Full guide

    Practical guidance on managing partitioned architecture work within the ADM framework.

  3. G212, Architecture-Led Incremental Planning

    Full guide

    Incremental planning across partitioned architecture efforts.

  4. G238, Portfolio Management and Architecture

    Full guide

    The TOGAF Series Guide linking architecture landscape to portfolio management decisions. Referenced in Sections 48.6 and 48.7 for how gap analysis, dependency mapping, and transition-state logic feed portfolio sequencing.

  5. Connections reform programme, Ofgem

    Programme overview

    Regulatory context for the London Grid partitioning example.

You now understand landscape and partitioning as a governed control choice with three architecture levels, six partitioning criteria, and five governance mechanisms. The next question is how architecture and agile delivery can support one another without creating the false opposition that weakens both. That is Module 49.

Module 48 of 64 · Migration and Delivery