Platform strategy and interoperability
This is the second of 8 Technology Architecture modules. Platform strategy shapes how much reuse the enterprise can achieve, how expensive support becomes, and how consistently teams can change together over time. This module treats platform decisions as enterprise-architecture concerns and interoperability as the first-order test.
By the end of this module you will be able to:
- Explain platform decisions as enterprise-architecture choices rather than isolated technical preferences
- Describe the trade-off between standardisation and controlled variance using the TOGAF interoperability requirements framework from C220 Part 3
- Apply the G217 digital enterprise patterns to multi-team, multi-pace platform decisions
- Use interoperability criteria to compare technology options more intelligently than feature lists allow
- Explain the four TOGAF interoperability categories and give a London Grid example for each
- Relate platform coherence to business, information, and resilience needs in the London case

Real-world case · 2023
Seven messaging platforms. One integration nightmare.
In 2023, a mid-tier energy retailer discovered it was running seven different messaging platforms across four business units. Each unit had chosen its own stack based on team familiarity and local project timelines.
When the regulator required near-real-time publication of settlement data across all units, the integration team needed five months just to map the message formats. The CTO asked the Architecture Board a pointed question: "Do we have a platform strategy, or do we have seven independent procurement decisions?"
The answer was obvious once stated, but the enterprise had never asked the question explicitly. Platform strategy is one of those topics that feels like a technology discussion until you trace the consequences to reuse, support cost, integration consistency, and governance discipline.
If every business unit can choose its own messaging platform without interoperability rules, does the enterprise have a platform strategy or just seven independent procurement decisions?
That case shows why platform strategy belongs in enterprise architecture. The consequences of platform fragmentation are not limited to technology teams. They affect integration speed, support cost, regulatory compliance, and the enterprise's ability to change coherently. This module covers the TOGAF interoperability requirements framework, the two bad extremes, controlled variance, digital enterprise patterns from G217, and how to compare platform options in enterprise terms.
37.1 Why platform strategy is bigger than a stack decision
A platform strategy shapes how much reuse the enterprise can achieve, how expensive support becomes, how consistent integration can be, and how easily teams can change together over time. That makes it an enterprise-architecture concern, not only a technology-lead concern.
The architecture question is not simply which platform is best in isolation. It is how much coherence the enterprise needs and where it can tolerate deliberate difference. That question cannot be answered by a single team looking at a single project. It requires the cross-enterprise view that Phase D is supposed to provide.
When platform strategy is absent, local teams make reasonable local choices that create unreasonable enterprise outcomes. Integration becomes expensive. Support costs multiply. Governance loses its grip on the technology estate because there is no shared baseline to govern against. Skills fragment across too many platforms for any single person to maintain expertise.
When platform strategy is too rigid, the opposite problem emerges. Teams that cannot use the mandated platform build shadow solutions that the enterprise cannot see or govern. Delivery slows because every request must be forced through a platform that does not fit the local problem. Innovation dies because the standardisation process cannot keep pace with genuine new needs.
“Platform strategy governs the balance between standardisation and controlled variance across the enterprise technology estate.”
Working definition derived from TOGAF 10 digital enterprise guidance - G217, Using the TOGAF Standard in the Digital Enterprise
The key phrase is controlled variance. The enterprise needs enough coherence to govern and enough flexibility to serve genuinely different local needs.
37.2 The TOGAF interoperability requirements framework
C220 Part 3 of the TOGAF Standard defines a framework for interoperability requirements that is directly relevant to platform strategy. The framework identifies four categories of interoperability, each describing a different level at which systems need to work together. Understanding all four categories is essential because platform decisions affect every level.
Category 1: Operational interoperability
The ability to run and manage systems together. This covers shared monitoring, alerting, log aggregation, and incident response across platforms. If two platforms cannot be observed using the same tooling, operational interoperability is weak. In London, operational interoperability means the OT monitoring team and the enterprise IT operations team can see each other's systems well enough to coordinate during an incident, even if the platforms are physically separated.
Category 2: Information interoperability
The ability to exchange meaningful data across system boundaries. This covers data formats, metadata standards, transformation rules, and semantic agreement. Two systems that can exchange bytes but interpret them differently have syntactic connectivity without information interoperability. In London, information interoperability means the Common Information Model is used consistently enough that data flowing from SCADA to the analytical store to the LTDS publication pipeline does not require bespoke transformation at each boundary.
Category 3: Technical interoperability
The ability to connect systems physically and logically. This covers network protocols, API standards, message formats, and transport mechanisms. Technical interoperability is the most visible category but often the least important when it exists without the others. In London, technical interoperability means the OT network, enterprise IT network, and telecom links can exchange traffic securely, but the security controls and trust boundaries between them are explicit rather than assumed.
Category 4: Business interoperability
The ability to align business processes across organisational or domain boundaries. This is the highest level and the hardest to achieve. It requires not just technical and information interoperability but also shared understanding of business rules, service levels, and accountability. In London, business interoperability means the connections process, the planning function, the publication team, and the regulatory reporting function can all work from a consistent view of network capacity and customer commitment, even though they use different systems.
Common misconception
“Interoperability just means the systems can exchange data.”
Data exchange is one layer (information interoperability). Full interoperability includes operational, technical, and business dimensions. A platform strategy that only addresses technical connectivity while ignoring operational observability and business process alignment creates a false sense of integration.
37.3 The two bad extremes
Platform strategy often swings between two positions, both harmful. Understanding why both fail helps the enterprise find the more honest middle ground.
Rigid standardisation
Everything is forced onto one pattern whether or not the local problem genuinely fits. This can create slow delivery, quiet workaround behaviour, and a growing gap between the official architecture and the real estate. Teams that cannot use the mandated platform often build shadow solutions that the enterprise cannot see or govern.
The architecture cost of rigid standardisation is invisible until you look for it. The official diagram shows one clean platform. The real estate has three additional platforms that nobody documented because the team knew the standard would not be approved. The governance structure thinks it is governing one estate. It is actually governing half of one, while the other half grows in the dark.
In London, rigid standardisation would mean forcing OT systems, enterprise IT, and the publication pipeline onto the same platform. That sounds efficient until you remember that the OT/IT separation principle exists precisely because operational technology has different resilience, security, and recovery requirements from enterprise IT. Forcing them together violates the architecture principle that was established for good structural reasons.
Uncontrolled freedom
Every team optimises locally, which can destroy interoperability, inflate support cost, and make governance nearly impossible. The enterprise ends up with an estate that works locally but fails at any cross-boundary task.
The opening story of this module is a perfect example. Seven messaging platforms across four business units. Each one worked locally. None of them could participate in cross-unit data exchange without bespoke integration. The cost of freedom was paid in integration complexity, not in platform procurement.
In London, uncontrolled freedom would mean each operational domain choosing its own telemetry, data storage, and publication tools without regard for cross-domain data exchange. The result would be six months of integration work every time a cross-domain business question needed an answer.
37.4 Controlled variance in practice
Controlled variance is not a compromise. It is a deliberate architecture position that requires more discipline than either extreme. The enterprise defines strong defaults, permits explicit exceptions, and enforces interoperability rules that apply to both.
Strong defaults with clear rationale. The enterprise defines a standard platform set and explains why those defaults exist. The rationale should reference business, information, and resilience needs, not just cost or familiarity. When the rationale is clear, teams understand the default and are more likely to follow it willingly rather than under compulsion.
Explicit exception process. Exceptions are permitted, but they must be stated, justified, and governed. Each exception should explain why the standard set does not fit, what interoperability obligations the exception must meet, and how the exception will be supported and governed over time. The Architecture Board should be able to review the exception register and understand why the enterprise has both a standard and a deliberate variant.
Interoperability rules that apply to everything. These rules define what the enterprise requires in terms of data exchange formats, interface contracts, security posture, observability, and lifecycle management. They apply to both standard and exception platforms. They are the glue that prevents controlled variance from drifting into uncontrolled freedom.
Periodic review and consolidation. The exception register should be reviewed at each architecture cycle. Some exceptions become new standards when the original rationale no longer holds. Some exceptions are consolidated back into the standard when the standard evolves. Without periodic review, controlled variance accumulates exceptions that nobody removes.
Common misconception
“A good platform strategy mandates one stack for everything and eliminates all exceptions.”
Rigid standardisation forces workarounds and creates shadow IT. Controlled variance is the stronger position: strong defaults where coherence matters, explicit exceptions where local needs genuinely differ, and interoperability rules that apply to both.
37.5 G217 digital enterprise patterns for platform decisions
The TOGAF Series Guide G217 addresses how architecture practice works in digital enterprises where multiple teams deliver at different speeds with different technology stacks. Three patterns from G217 are directly relevant to platform strategy.
Pattern 1: Platform as a shared capability. The enterprise treats its core platforms not as products but as capabilities that teams consume through well-defined interfaces. This decouples platform evolution from application delivery. Teams build on the platform without needing to understand its internals. The platform team evolves the internals without breaking the interface contract.
Pattern 2: Multi-speed architecture. Different parts of the enterprise genuinely change at different speeds. Customer-facing digital services may need weekly releases. Operational technology may change annually. The platform strategy must support this reality rather than pretend that one delivery cadence fits all. In London, the publication pipeline may need quarterly regulatory updates while the SCADA platform changes once every three to five years.
Pattern 3: Guardrail governance. Instead of approving every technology choice centrally, the enterprise publishes guardrails (principles, interoperability rules, security baselines) and lets teams choose within those boundaries. Governance effort shifts from approval bottleneck to guardrail definition and compliance monitoring. The Architecture Board reviews guardrail effectiveness rather than individual technology selections.
These patterns reinforce controlled variance. They acknowledge that uniformity is neither achievable nor desirable in most enterprises, but they insist on coherence at the points where coherence creates enterprise value: integration, observability, security, and governance.
37.6 What to compare when assessing platform options
When the enterprise is evaluating platform choices, the comparison should cover more than feature lists and analyst scores. The following criteria are drawn from the interoperability framework and the controlled-variance principle.
Enterprise service support. How well does the option support shared services, common capabilities, and integration patterns that the enterprise depends on? A platform that is excellent in isolation but cannot participate in shared data exchange is a poor enterprise choice.
Interoperability across all four categories. Does the option strengthen or weaken operational, information, technical, and business interoperability? A platform with excellent technical connectivity but no operational observability support creates a false sense of integration.
Operational burden. How much support overhead, skills concentration, and lifecycle risk does the option introduce? A platform that requires specialist skills the enterprise does not have is a strategic liability, not just a training gap. The question is whether the enterprise can sustain the operational model the platform requires.
Governance fit. Can the platform choice be governed within the existing architecture capability? Can the Architecture Board review it, challenge it, and track its lifecycle? A platform that requires its own governance process outside the enterprise architecture framework fragments the governance picture.
Change rate and evolution path. Does the option support the change speed the enterprise needs? How does the vendor or community evolve the platform, and does that evolution path align with the enterprise's own roadmap? A platform with a two-year deprecation cycle may not suit an enterprise that plans five-year infrastructure investments.
Exit cost and lock-in exposure. What would it cost to move away from this platform if the enterprise's needs or the vendor's direction changed? A platform with low entry cost but high exit cost is a strategic risk that the Architecture Board should assess explicitly.
37.7 Why interoperability must stay visible
Interoperability is not a vague aspiration. It is a measurable property that the enterprise can test, enforce, and govern. Platform strategy should either improve interoperability or at least avoid weakening it.
The practical tests are straightforward. Can a new system exchange data with existing systems without bespoke transformation? Can operations teams monitor and support the new platform using existing tools and processes? Can governance review the platform choice without needing a separate specialist assessment?
When interoperability is invisible in the platform strategy, the enterprise discovers the cost later. Integration projects take longer. Data quality degrades at boundaries. Support teams cannot cross-skill. Governance loses confidence in the technology estate because it can no longer see the whole picture.
The TOGAF interoperability requirements framework from C220 Part 3 provides a structured way to keep interoperability visible. For each major platform boundary, the architecture should state which of the four interoperability categories apply, what level of interoperability is required, and what evidence will demonstrate that the requirement is met. That turns interoperability from a vague aspiration into a governable requirement.
Common misconception
“Interoperability can be solved later with integration middleware.”
Middleware can bridge gaps, but it cannot fix a platform strategy that was designed without interoperability as a criterion. The structural problem has to be addressed at the platform-choice level, not at the integration-plumbing level.
London Grid Distribution: platform strategy in a utility
In London Grid Distribution, platform strategy affects publication capability, operational support, planning reuse, resilience evidence, and how easily the enterprise can absorb new regulatory and transformation demands.
The London case is also useful because it shows why one platform answer is rarely enough. The enterprise needs coherence, but it also needs a realistic exception model for operational and specialist domains.
The OT platform domain. SCADA, distribution management, protection relay management, and substation automation have specific resilience, security, and lifecycle requirements. These platforms change slowly, require specialist skills, and must recover independently. They are a justified exception to the enterprise IT standard.
The enterprise IT domain. Workflow engines, API gateways, analytical platforms, and governance tools follow standard enterprise patterns. They change faster, use common skills, and benefit from standardisation. This is where strong defaults produce the most enterprise value.
The publication and data exchange domain. The LTDS publication pipeline sits between OT data sources and external regulatory consumers. It needs information interoperability with OT (to receive data), technical interoperability with the regulatory platform (to publish data), and business interoperability with the planning function (to ensure consistency). The publication domain may use enterprise IT platforms but has unique interoperability requirements that the platform strategy must address explicitly.
The telecom domain. Field communications, smart-meter networks, and control-system links have their own platform realities. The telecom strategy must be visible in the enterprise platform picture because telecom dependencies cross every other domain.
- London needs strong defaults, not false uniformity. OT platforms, enterprise IT, and publication infrastructure serve different purposes with different constraints.
- Interoperability rules matter because the estate spans planning, operations, data, telecoms, and governance views.
- The LTDS publication obligation creates a hard interoperability test: can operational, planning, and analytical data be combined and published reliably regardless of which platform holds each piece?
- The controlled-variance model means the Architecture Board should know why OT platforms differ from enterprise IT platforms, what interoperability rules apply at the boundary, and how exceptions are governed over time.
A delivery team requests an exception to the enterprise standard messaging platform because the standard product does not support a real-time telemetry protocol their OT systems require. The Architecture Board should:
An enterprise has three business units, each using a different cloud provider. A new cross-unit data-sharing requirement arrives. Which platform-strategy question should the architecture team ask first?
According to the TOGAF interoperability requirements framework (C220 Part 3), which category of interoperability is concerned with shared monitoring, alerting, and incident response across platforms?
A gas distribution company allowed its operations teams to select any historian platform that met a basic API specification. Within two years, the company had three historian products with different retention policies, query interfaces, and security models. When the business needed a unified asset-health view, integration cost exceeded procurement savings by a factor of four. What was missing?
Key takeaways
- Platform strategy affects reuse, support, changeability, and governance across the enterprise. It is an enterprise-architecture concern, not just a technology-team topic.
- The TOGAF interoperability requirements framework (C220 Part 3) identifies four categories: operational, information, technical, and business interoperability. All four should be assessed for every major platform boundary.
- Rigid uniformity and uncontrolled freedom are both weak enterprise positions. Controlled variance is the more honest target: strong defaults, explicit exceptions, and interoperability rules that apply to everything.
- G217 digital enterprise patterns (platform as capability, multi-speed architecture, guardrail governance) support controlled variance in multi-team, multi-pace environments.
- Interoperability should be an explicit comparison criterion in every platform decision. Feature lists and analyst scores are not enough.
- In London, the estate spans OT, enterprise IT, publication, and telecom domains. Platform strategy must explain why each domain uses the platforms it does, what interoperability rules apply at each boundary, and how exceptions are governed over time.
Standards and sources cited in this module
The TOGAF Standard, 10th Edition (C220)
Part 1, Phase D and Part 3, Interoperability Requirements
The core standard and authority for technology architecture and the interoperability requirements framework that defines the four interoperability categories.
G217, Using the TOGAF Standard in the Digital Enterprise
Full guide
Digital enterprise guidance referenced for platform-as-capability, multi-speed architecture, and guardrail governance patterns in multi-team environments.
G152, Integrating Risk and Security within a TOGAF Enterprise Architecture
Full guide
Risk and security integration guidance relevant to how security posture should be included in platform comparison criteria and interoperability rules.
G21D, Using the TOGAF Framework in the Government Enterprise Architecture Context
Full guide
Government and regulated-sector guidance relevant to platform strategy in environments with strong assurance and interoperability requirements.
Digitalisation Strategy and Action Plan 2025-2030, Ofgem
Full strategy document
Regulatory digitalisation direction that creates the interoperability obligations London Grid Distribution must meet through its platform strategy.
You now understand platform strategy as an enterprise-architecture concern and interoperability as its primary test. The next question is how risk and security should shape architecture decisions while they are still forming, rather than arriving as a late review. That is Module 38.
Module 37 of 64 · Technology Architecture
