Business Capabilities

Map every capability to the services, decisions, and investments that support it.

Capability maps belong in a governed register, not on a PowerPoint slide that goes stale within weeks. HelixGate gives you an L0–L3 hierarchy with cross-module traceability, coverage analytics, and a complete audit trail.

L0–L3
Hierarchy depth
4
Modules linked
100%
Audit coverage
0
Records deletable
The Problem

Why capability maps fail — and what to do about it

Most capability maps start as PowerPoint slides and end as PDF artefacts no one trusts. They go stale because there is no governance process to keep them current. Capabilities are disconnected from the services that deliver them, the decisions that shape them, and the investments that fund them. The result: strategic planning built on guesswork.

Why they become shelfware

  • Static slides — no live connection to the service estate
  • No traceability — capabilities exist in isolation from ADRs and business cases
  • No coverage data — impossible to tell which capabilities are unsupported
  • No audit trail — changes are invisible and unattributed

HelixGate's governed approach

  • L0–L3 hierarchy — structured register spanning business and technology domains
  • Cross-module links — capabilities connected to services, ADRs, business cases, and AI systems
  • Coverage analytics — see which capabilities have service support and which are orphaned
  • Immutable audit trail — every change logged with actor, timestamp, and old/new values
Capabilities

Everything a governed capability register needs

🏗

L0–L3 hierarchy

Build a nested capability tree spanning four levels of depth. Separate business capabilities from technology capabilities with distinct domain types. Each capability gets an auto-generated reference (CAP-0001, CAP-0002…) for consistent cross-referencing.

🔗

Cross-module mapping

Link capabilities to the services that deliver them, the ADRs that govern them, the business cases that fund them, and the AI systems that depend on them. A verifiable chain from strategy to execution.

📊

Coverage analytics

Dashboard views showing the percentage of capabilities mapped to at least one service. Orphan detection highlights capabilities with no service support — revealing gaps in your technology estate that need attention before the next investment round.

🔄

Status lifecycle

Four governed statuses — Active, Planned, Deprecated, and Retired — with controlled transitions. Status changes are logged with justification. Filter and report on capabilities by lifecycle stage to understand your strategic posture at a glance.

🔒

Immutable audit trail

Every change to a capability record is captured with actor, timestamp, and old/new values. Audit entries cannot be modified or deleted. Provides instant evidence for SOC 2 and ISO 27001 auditors asking about your capability governance process.

📦

Bulk operations

Import capabilities from CSV to bootstrap or update your register at scale. Bulk entity mapping lets you link multiple capabilities to services, ADRs, or business cases in a single operation. Import history is logged for audit traceability.

Who It Serves

From the architecture office to the boardroom

Enterprise Architect

Strategy-to-execution traceability

See which capabilities are supported by which services, which are orphaned, and where investment gaps exist. Link capabilities to ADRs and EA principles so every architectural decision has strategic context.

CTO

Portfolio-level capability coverage

Coverage analytics show the health of your technology estate at a strategic level. Identify capabilities that are planned but unsupported, deprecated but still in use, or duplicated across business units. Board-ready exports on demand.

Compliance Officer

Governed register with full audit evidence

An immutable, timestamped record of every capability and every change. GBAC permissions ensure that only authorised users can create, modify, or administer capabilities. Satisfies auditor questions about asset management and change control.

Compliance-ready

A capability register that satisfies auditors.

SOC 2 and ISO 27001 require organisations to maintain an accurate inventory of information assets and demonstrate controlled change management. HelixGate's capability register provides that inventory in a form immediately usable as audit evidence — structured, timestamped, and owner-attributed. The immutable audit trail answers "who changed what and when" instantly. GBAC permissions enforce least-privilege access across view, manage, and admin operations.

SOC 2 ISO 27001 GDPR Immutable audit log GBAC permissions
Deep Dive

Technical detail for architecture and security teams

Hierarchy and domain model

Capabilities are organised into an L0–L3 tree with parent-child relationships. Each capability belongs to a domain type — Business or Technology — enabling filtered views by strategic concern. Auto-generated references (CAP-0001) provide stable identifiers for cross-system integration. The hierarchy supports restructuring without breaking existing cross-module links.

Permissions and access control

Three GBAC permission levels govern access: capability_view for read-only access, capability_manage for creating and editing capabilities and mappings, and capability_admin for lifecycle transitions and bulk operations. Permissions are enforced server-side and reflected in the UI. All access decisions are logged.

Related modules

Capabilities connected to your entire governance platform.

Get Started

Replace your PowerPoint capability maps with a governed register.

Import your existing capability data via CSV, see coverage analytics across your service estate, and get audit-ready exports — all in a single governed platform.