Architecture Beyond Code
Knowledge, Policy, and Intent as First-Class Architectural Concerns
1. Introduction
The first article established a lifecycle thesis: the durable object in modern software production is increasingly the verified behavior, not the static code artifact. This second article asks what follows for architecture. If behavior is generated, regenerated, and governed from intent, knowledge, policy, and data, then architecture cannot be limited to the arrangement of services and deployment units. It must also explicitly structure the planes from which that behavior is derived and through which it is constrained.
Software architecture has historically excelled at decomposition. It tells organizations how to separate presentation from business logic, services from data stores, workloads from platforms, synchronous from asynchronous communication. These remain foundational skills. But when AI systems are introduced, architectural failures often come from a different source: ambiguous domain knowledge, unenforced policy, unstable specifications, or ungrounded retrieval. Those are not mere implementation defects. They are architectural defects.
The argument of this essay is therefore narrower and stronger than a generic claim that "architecture matters." It is this: in AI-native systems, knowledge, policy, and intent must be designed as first-class architectural concerns because they increasingly determine what behavior can be generated, trusted, and adapted over time.
2. The Classical Architecture Frame
Classical software architecture organized around code-bearing structures. A system was decomposed into layers, components, services, APIs, databases, message buses, and deployment environments. Questions of scalability, reliability, cohesion, coupling, and operational resilience all attached naturally to these structures.
This frame was appropriate because code was the main durable artifact. Requirements were translated into design, and design into code. Policy was often treated as security configuration. Knowledge was scattered across documentation, data dictionaries, and the expertise of long-tenured staff. Intent appeared early in the process as a requirements deliverable and then receded into the background after implementation began.
That arrangement now creates fragility. When systems generate or adapt behavior dynamically, they need machine-tractable access to the meaning of the domain, the constraints of operation, and the specifications that define success. A service topology without these supporting structures may be elegant yet still unreliable because the system has no trustworthy substrate from which to generate behavior.
3. Policy as Architecture
Policy is the most mature of the three emerging concerns because security and compliance forced its separation earlier than most other disciplines. The crucial architectural insight was that the logic of "what is allowed" should not be embedded invisibly in every service. It should be externalized, versioned, tested, and enforced through explicit control points.
This logic became formalized in policy architectures such as PAP, PDP, PEP, and PIP: policy administration, policy decision, policy enforcement, and policy information. In modern cloud-native environments, policy-as-code and engines such as Open Policy Agent have made this pattern practical at scale. The architectural meaning of this move is significant. Policy is not just a document or a compliance checklist; it is an executable decision layer with its own repositories, decision points, audit logs, and operational lifecycle.
In AI-native systems, policy takes on additional significance. Generated behavior must be bounded at runtime, not merely reviewed at design time. If a model synthesizes code, chooses tools, retrieves data, or composes actions, policy must govern scope, access, acceptable outputs, and escalation conditions. An architecture that treats policy as a sidecar rather than a structural plane will fail exactly where AI systems need the strongest control.
4. Knowledge as Architecture
Knowledge has a deeper intellectual lineage but a more uneven history in software practice. Enterprise systems have always depended on domain meaning: what counts as a customer, how a product is classified, which exceptions matter, what rules govern a transaction. Yet this knowledge has often been stored indirectly, encoded in table names, scattered through business rules, or preserved in human memory.
The rise of ontology work, knowledge engineering, domain-driven design, enterprise knowledge graphs, semantic layers, and retrieval-augmented generation changes that situation. These approaches all treat domain meaning as something that can be formalized, curated, queried, and reused. In architectural terms, the knowledge layer becomes the place where canonical definitions, relationships, provenance, and retrieval structures are organized for operational use.
This matters because generation without grounding produces plausible but unreliable behavior. A model that relies only on parametric memory and ad hoc prompting cannot consistently distinguish canonical enterprise meaning from incidental text. By contrast, a real knowledge plane provides ontology-backed structure, curated source material, lineage, and retrieval pathways that can be traced and audited. In the AI-native stack, knowledge is no longer just documentation about the system. It becomes part of the system.
5. Intent as Architecture
Intent is the least mature but potentially the most transformative of the three concerns. Intent is not merely a user story, a ticket, or a business request. It is a structured expression of what the system is supposed to achieve, under what constraints, and with what criteria of success. Once software can be regenerated from specifications, the quality of intent becomes a direct determinant of runtime behavior.
Several traditions point in this direction. Intent specifications in safety-critical systems emphasized the importance of preserving rationale and hierarchy, not merely functional behavior. Intent-based networking showed how declarative goals could be translated, activated, assured, and optimized through a closed loop. Declarative infrastructure and GitOps demonstrated that desired state can become an operational control surface rather than a prose artifact.
The architectural implication is straightforward. Intent must be stored, versioned, reviewed, signed off, and reconciled against reality. If a system's behavior drifts, the response should not always be an implementation patch. It may require a refined specification, a clarified business rule, or a corrected acceptance criterion. Architectures that lack an explicit intent plane struggle to answer a simple question: what authoritative artifact says what the system is meant to do?
6. The KPI Reference Architecture
The Knowledge–Policy–Intent reference architecture treats knowledge, policy, and intent as peer concerns to services and data rather than as background documentation.
6.1 Intent Plane
The intent plane stores structured specifications, acceptance criteria, declared outcomes, bounded scopes, and accountable approvals. It is the plane from which regeneration can legitimately begin. Without it, the system must infer purpose from scattered prose and operational precedent.
6.2 Knowledge Plane
The knowledge plane contains canonical semantics, domain models, ontologies, knowledge graphs, retrieval indices, provenance metadata, and data contracts. Its role is to ground generation and support explainable reasoning over domain meaning.
6.3 Synthesis and Verification Plane
Between these higher-order concerns and the classical runtime sits the synthesis and verification plane. This is where generators, toolchains, evaluators, test harnesses, simulations, and assurance dossiers operate. It is the conversion layer through which intent and knowledge become candidate artifacts and through which evidence of trust is assembled.
6.4 Services and Data Plane
The services and data plane remains essential. APIs, workflows, microservices, databases, streams, and caches still carry the operational load of production systems. The difference is conceptual: they are no longer the only meaningful center of architecture. Increasingly, they are the runtime substrate that higher-level planes constrain and regenerate.
6.5 Policy Plane
The policy plane enforces what is allowed across the system. It governs access, usage constraints, deployment conditions, model behavior boundaries, auditability requirements, and escalation thresholds. In robust designs, policy is invoked at decision points rather than assumed after the fact.
This architecture does not replace classical architecture. It extends it. The point is not to diminish operational concerns, but to admit that in AI-native systems the informational and governance substrate is now part of the architectural core.
7. Design Implications and Anti-Patterns
When these planes are missing or weak, predictable anti-patterns emerge.
- The vector dump: documents are embedded into a store and mislabeled as a knowledge architecture, even though there is no curation, ontology, provenance discipline, or canonical semantics.
- Policy as decoration: policies exist in repositories or slide decks but are not actually enforced at consequential runtime decision points.
- Intent as commentary: desired outcomes live in tickets or presentations, while the system operates without a machine-tractable specification of success.
- Generator monoculture: the same generation strategy produces both artifacts and tests, allowing blind spots to reproduce themselves.
- Closed loop without bounds: telemetry-driven adaptation is permitted without clear scope boundaries, approval thresholds, or rollback rules.
The positive implication is that architects must broaden their design vocabulary. Service decomposition, resilience patterns, and platform concerns remain necessary. But so do ontology evolution, policy-plane placement, intent versioning, retrieval topology, assurance independence, and governance traceability.
8. The Architect's Changing Role
This broader design surface changes the work of architects. The most important decomposition questions are no longer limited to "what should be a service?" They increasingly include "what is a bounded knowledge domain?", "what scopes of intent can be independently approved and regenerated?", and "where must policy be enforced to constrain consequential behavior?"
Architects also become stewards of traceability. A mature AI-native architecture should allow a reviewer to traverse from observed behavior back to the governing policy, consulted knowledge, declared intent, generated artifacts, and verification evidence. That requirement is architectural, not merely procedural.
This is the key expansion of the first article's thesis. If the lifecycle is now about turning intent into verified behavior, architecture is the means by which intent, knowledge, and policy are made durable, accessible, inspectable, and governable enough for that lifecycle to function.
9. Conclusion
The first article argued that the lifecycle of software must be reframed around verified behavior rather than code release alone. This second article extends that claim into architecture. If behavior is increasingly synthesized from intent, grounded in knowledge, and bounded by policy, then those three concerns cannot remain peripheral. They must become explicit architectural planes with their own artifacts, ownership models, and governance mechanisms.
This argument sets up the trilogy's final move. The third article asks what happens when this lifecycle-and-architecture shift is projected beyond the enterprise boundary. If software becomes governed behavior and architecture becomes structured around intent, knowledge, and policy, then customer interactions themselves may be reorganized around explicit negotiation between customer agents and enterprise service agents.
Bibliography
- Dehghani, Zhamak. Data Mesh: Delivering Data-Driven Value at Scale. O'Reilly Media, 2022.
- Evans, Eric. Domain-Driven Design: Tackling Complexity in the Heart of Software. Addison-Wesley, 2003.
- Gruber, Thomas R. "Toward Principles for the Design of Ontologies Used for Knowledge Sharing." International Journal of Human-Computer Studies, vol. 43, no. 5–6, 1995, pp. 907–928.
- Lewis, Patrick, et al. "Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks." Advances in Neural Information Processing Systems 33, 2020.
- Leveson, Nancy G. "Intent Specifications: An Approach to Building Human-Centered Specifications." IEEE Transactions on Software Engineering, vol. 26, no. 1, 2000, pp. 15–35.
- Moffett, Jonathan D., and Morris S. Sloman. "Policy Hierarchies for Distributed Systems Management." IEEE Journal on Selected Areas in Communications, vol. 11, no. 9, 1993, pp. 1404–1414.
- OASIS. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard, 2013.
- Open Policy Agent. "Open Policy Agent." Cloud Native Computing Foundation project materials.
- Sloman, Morris. "Policy Driven Management for Distributed Systems." Journal of Network and Systems Management, vol. 2, no. 4, 1994, pp. 333–360.