Skip to content

Governance Model

Governance determines how decisions get made, who makes them, and how changes flow through the organization. In CTA scenarios, weak governance is a common underlying cause of failed implementations. The review board expects a CTA to design governance structures that balance control with agility — too much governance stalls delivery, too little creates chaos.

Architecture Review Board (ARB)

The ARB is the governing body that ensures architectural decisions align with organizational standards, long-term strategy, and technical best practices.

ARB Structure

RoleResponsibilityTypical Participant
ChairFacilitates meetings, ensures decisions are documentedEnterprise Architect or CTA
Voting MembersEvaluate proposals, make decisionsTechnical Architects, Lead Developers
Subject Matter ExpertsProvide domain-specific input when neededSecurity, Integration, Data specialists
RequestorsPresent proposals for reviewProject teams, feature owners
Executive SponsorBreaks ties, provides strategic alignmentVP of Engineering or CTO

ARB Meeting Cadence

Meeting TypeFrequencyPurpose
Regular ReviewBi-weekly or monthlyReview pending architectural proposals
Emergency ReviewAd hocCritical issues requiring immediate architectural decisions
Quarterly StrategyQuarterlyReview architectural roadmap, standards updates
Annual ReviewAnnuallyTechnology radar update, standards refresh

What Goes Through the ARB

  • New integration patterns or middleware selection
  • AppExchange package adoption (using the vendor evaluation scorecard)
  • Data model changes affecting more than one application area
  • New technology adoption (LWC components, OmniStudio, Agentforce)
  • Cross-cloud or multi-org architectural decisions
  • Changes to the org’s security model
  • Significant automation changes (new triggers, complex flows)

ARB Review Process Flow

flowchart TD
    A([Architecture Change<br/>Requested]) --> B{Does it match<br/>existing patterns?}
    B -->|Yes| C[Use Existing Pattern<br/>No ARB Needed]
    B -->|No| D[Submit ARB<br/>Proposal]

    D --> E[Proposal Document<br/>Problem + Options +<br/>Recommendation]
    E --> F[Schedule ARB<br/>Review Session]
    F --> G[Present to<br/>ARB Members]
    G --> H{ARB Decision}

    H -->|Approved| I[Document as ADR<br/>Update Standards]
    H -->|Approved with<br/>Conditions| J[Address Conditions<br/>Resubmit if Major]
    H -->|Rejected| K[Revise Proposal<br/>or Use Alternative]
    H -->|Deferred| L[Gather More Info<br/>Reschedule Review]

    I --> M([Proceed with<br/>Implementation])
    J --> M
    K --> D
    L --> E

    style A fill:#4ecdc4,stroke:#3ab5ad,color:#000
    style M fill:#2d6a4f,stroke:#1b4332,color:#fff
    style K fill:#e76f51,stroke:#c45a3f,color:#fff
    style I fill:#2d6a4f,stroke:#1b4332,color:#fff

Lightweight ARB

Not every decision needs a formal ARB session. Establish clear criteria for what qualifies as an ARB-level decision (new patterns, cross-domain impact, vendor selection) versus what can be decided by the tech lead within existing standards. Over-governing slows delivery; under-governing causes drift.

What Does NOT Need ARB Approval

  • Bug fixes within existing architecture
  • Configuration changes within established patterns
  • Minor field additions to existing objects
  • Report and dashboard creation
  • Standard Flow modifications within the one-automation-per-object pattern

Change Advisory Board (CAB)

The CAB focuses on change management — reviewing and approving changes before they are deployed to production.

CAB vs ARB

AspectARBCAB
FocusDesign decisionsDeployment decisions
WhenBefore buildingBefore deploying
Question”Is this the right solution?""Is this safe to deploy?”
OutcomeArchitecture approvalChange approval
ParticipantsArchitects, tech leadsRelease managers, QA, ops

Change Classification

Change TypeRisk LevelApproval ProcessExample
StandardLowPre-approved, no CAB reviewField label change, report creation
NormalMediumCAB review requiredNew automation, integration change
EmergencyHigh/CriticalExpedited approval (post-implementation review)Production bug fix, security patch
MajorHighFull CAB + ARB reviewNew cloud implementation, data migration

Change Management Flow

Every change to a Salesforce org — whether code, configuration, or data — follows a lifecycle from request to verification. This flow integrates the ARB and CAB roles.

flowchart TD
    A([Change Request<br/>Submitted]) --> B{Classify Change}

    B -->|Standard| C[Pre-Approved<br/>No CAB Review]
    B -->|Normal| D[CAB Review<br/>Required]
    B -->|Emergency| E[Expedited Approval<br/>CAB Chair Only]
    B -->|Major| F[Full ARB +<br/>CAB Review]

    C --> G[Assign to<br/>Developer/Admin]
    D --> H{CAB Approves?}
    E --> I[Implement Fix<br/>Post-Implementation<br/>Review Required]
    F --> J{ARB Approves<br/>Architecture?}

    J -->|Yes| H
    J -->|No| K[Revise Architecture<br/>Resubmit]
    H -->|Yes| G
    H -->|No| L[Return to<br/>Requestor]

    G --> M[Build & Test in<br/>Dev Environment]
    I --> M
    M --> N[Deploy to SIT<br/>Run Integration Tests]
    N --> O[Deploy to UAT<br/>Business Validation]
    O --> P{UAT Sign-Off?}

    P -->|Yes| Q[Deploy to Staging<br/>Smoke Tests]
    P -->|No| R[Fix Defects<br/>Retest]
    R --> M

    Q --> S[Deploy to<br/>Production]
    S --> T[Post-Deployment<br/>Verification]
    T --> U([Change Closed<br/>Logged in Register])

    style A fill:#4ecdc4,stroke:#3ab5ad,color:#000
    style U fill:#2d6a4f,stroke:#1b4332,color:#fff
    style E fill:#e76f51,stroke:#c45a3f,color:#fff
    style K fill:#e76f51,stroke:#c45a3f,color:#fff
    style L fill:#e76f51,stroke:#c45a3f,color:#fff

Emergency Changes

Emergency changes bypass the standard CAB review process but are not exempt from governance. Every emergency change must have a post-implementation review within 48 hours. If emergencies become frequent, it signals a systemic problem with testing, architecture, or release planning that the CTA must address.

RACI Matrix

A RACI matrix clarifies who does what for key governance activities.

Salesforce Governance RACI

ActivityCTA/EADev LeadAdmin LeadPMBusiness Owner
Architecture decisionsA, RCCII
Code standardsARII-
Declarative standardsACRI-
Change requestsCRRAR
Production deploymentsCRRAI
Incident managementCRRII
Vendor evaluationA, RCCCR
Data governanceCCCIA, R
User provisioningIIRIA
Release planningCRRAC

R = Responsible (does the work), A = Accountable (final decision), C = Consulted, I = Informed

CTA Exam Signal

Including a RACI matrix (even a simplified one) in your CTA presentation shows the review board that you think about organizational structure, not just technology. This is a distinguishing factor between a Technical Architect and a Chief Technical Architect.

Salesforce Center of Excellence (CoE) Model

A CoE is the organizational structure that governs Salesforce across the enterprise.

CoE Models

flowchart TD
    subgraph Centralized["Centralized CoE"]
        direction TB
        C1[Central SF Team]
        C2[All Projects]
        C3[All Admins]
        C4[All Developers]
        C1 --> C2
        C1 --> C3
        C1 --> C4
    end

    subgraph Federated["Federated CoE"]
        direction TB
        F1[Central Standards Team]
        F2[BU 1 SF Team]
        F3[BU 2 SF Team]
        F4[BU 3 SF Team]
        F1 --> F2
        F1 --> F3
        F1 --> F4
    end

    subgraph Hybrid["Hybrid CoE"]
        direction TB
        H1[Central Architecture + Standards]
        H2[Central Shared Services]
        H3[BU 1 Delivery Team]
        H4[BU 2 Delivery Team]
        H1 --> H2
        H1 --> H3
        H1 --> H4
        H2 --> H3
        H2 --> H4
    end
ModelStrengthsWeaknessesBest For
CentralizedConsistent standards, no duplication, strong governanceBottleneck, slow response, disconnected from businessSmall to medium orgs with one Salesforce instance
FederatedBusiness unit autonomy, fast delivery, local expertiseInconsistent standards, duplication of effort, driftLarge enterprises with independent business units
HybridBalanced control and agility, shared standards with local deliveryComplex to operate, requires strong leadershipLarge enterprises needing consistency with business agility

CTA Recommendation Pattern

In most CTA scenarios, the Hybrid CoE is the right answer because it balances governance with delivery speed. Central team owns architecture, standards, and shared services. Business unit teams own delivery. The review board values this nuanced recommendation over a one-size-fits-all answer.

Governance Framework Overview

The governance framework is the structural backbone that connects strategic direction, architectural standards, change control, and operational delivery.

flowchart TD
    subgraph Strategic["Strategic Layer"]
        EXEC[Executive Sponsor<br/>Strategic Direction]
        COE[Center of Excellence<br/>Standards & Best Practices]
    end

    subgraph Architecture["Architecture Layer"]
        ARB_G[Architecture Review Board<br/>Design Decisions]
        ADR[Architecture Decision Records<br/>Decision Documentation]
        STANDARDS[Technical Standards<br/>Naming, Code, Security]
    end

    subgraph Change["Change Control Layer"]
        CAB_G[Change Advisory Board<br/>Deployment Approvals]
        CR[Change Register<br/>Tracking & Audit]
        RISK[Risk Register<br/>Risk Tracking]
    end

    subgraph Delivery["Delivery Layer"]
        TEAMS[Delivery Teams<br/>Build & Test]
        PIPELINE[CI/CD Pipeline<br/>Automated Checks]
        ENVS[Environment Strategy<br/>Dev to Prod]
    end

    EXEC --> COE
    COE --> ARB_G
    ARB_G --> ADR
    ARB_G --> STANDARDS
    COE --> CAB_G
    CAB_G --> CR
    CAB_G --> RISK
    STANDARDS --> TEAMS
    CAB_G --> PIPELINE
    PIPELINE --> ENVS

    style EXEC fill:#1a535c,stroke:#0d3b44,color:#fff
    style COE fill:#1a535c,stroke:#0d3b44,color:#fff
    style ARB_G fill:#2d6a4f,stroke:#1b4332,color:#fff
    style CAB_G fill:#4ecdc4,stroke:#3ab5ad,color:#000
    style TEAMS fill:#f4a261,stroke:#d4823e,color:#000
    style PIPELINE fill:#f4a261,stroke:#d4823e,color:#000

Architecture Decision Records (ADRs)

ADRs document the rationale behind significant architectural decisions. They are lightweight but invaluable.

ADR Template

# ADR-{NUMBER}: {Title}
## Status
Proposed | Accepted | Deprecated | Superseded
## Context
What is the issue that we're seeing that is motivating this decision?
## Decision
What is the change that we're proposing and/or doing?
## Consequences
What becomes easier or more difficult to do because of this change?
## Alternatives Considered
What other options were evaluated and why were they rejected?

When to Write an ADR

  • Choosing between platform approaches (Flow vs Apex for a major automation)
  • Selecting an AppExchange package
  • Designing an integration pattern
  • Choosing a data model approach
  • Changing the development or deployment process
  • Adopting a new technology or tool

Standards and Policies

Technical Standards to Define

Standard AreaWhat to DefineExample
Naming conventionsObjects, fields, classes, flowsAccount_Territory_Assignment_Flow, AccountService.cls
Code standardsApex style guide, LWC patternsApex Enterprise Patterns, ESLint config
Automation standardsOne flow per object, error handlingMaster flow pattern, fault path template
Integration standardsNamed Credentials, error handlingCircuit breaker pattern, retry policy
Security standardsFLS/CRUD enforcement, sharing modelAlways check CRUD in Apex, no without sharing
Data standardsRequired fields, picklist valuesData dictionary, picklist governance
Testing standardsCoverage targets, assertion rules85% coverage, meaningful assertions

Policy Examples

Deployment Policy:

  • All production deployments require successful UAT sign-off
  • Deployment windows: Tuesdays and Thursdays, 6 PM - 10 PM (off-peak)
  • Emergency deployments require CAB chair approval
  • All deployments must include a rollback plan

Data Policy:

  • No production data in development sandboxes without masking
  • PII fields must be encrypted in transit and at rest
  • Data retention policies must be documented per object
  • Bulk data operations require ARB notification

Compliance Considerations

Regulatory Frameworks

FrameworkKey Requirements for SalesforceAffected Industries
GDPRRight to be forgotten, data portability, consent managementAny org with EU data subjects
HIPAAPHI encryption, access controls, audit logging. Salesforce offers a Business Associate Agreement (BAA) for Shield and Health Cloud — required before storing PHI.Healthcare, health insurance
SOXFinancial controls, audit trails, segregation of dutiesPublic companies
PCI-DSSCardholder data protection, access controlsPayment processing
CCPAConsumer data rights, opt-out mechanisms. Implement via Privacy Center for opt-out/do-not-sell workflows, Data Subject Access Requests (DSARs) for consumer data requests, and automated data deletion workflows. Similar to GDPR but opt-out (not opt-in) model.Any org with CA consumers
FedRAMPGovernment cloud requirementsGovernment contractors

Compliance Implementation in Salesforce

RequirementSalesforce Solution
Data encryptionShield Platform Encryption
Audit loggingShield Event Monitoring, Field Audit Trail
Access controlsProfiles, Permission Sets, sharing rules
Data retentionArchival strategy, Big Objects
Right to be forgottenData deletion processes, anonymization
Segregation of dutiesProfile restrictions, approval processes
Compliance reportingEvent Monitoring, custom audit objects

Compliance is Non-Negotiable

In a CTA scenario, if the customer is in a regulated industry, compliance requirements override all other architectural preferences. Do not recommend a technically superior solution that violates compliance. Document compliance requirements as architectural constraints and design within them.

Data Governance

Data Governance Framework

ComponentDescriptionOwner
Data DictionaryDefinitive list of all objects, fields, and their business meaningData Architect
Data Quality RulesValidation rules, duplicate rules, data cleansing processesAdmin Lead
Data OwnershipWhich business unit owns each data domainBusiness Owners
Data RetentionHow long data is kept and when it is archived or deletedCompliance + Business
Data AccessWho can see, edit, and delete each data domainSecurity Architect
Data LineageWhere data comes from and where it flowsIntegration Architect

Metadata Governance

  • Track all metadata changes in source control (not just code — Flows, objects, fields too)
  • Review metadata changes before deployment (declarative changes need review too)
  • Monitor metadata growth — track custom object count, field count, automation count
  • Clean up unused metadata regularly — inactive flows, unused fields, orphaned classes

Sources