Назад към всички

Enterprise

// Navigate enterprise software development with legacy integration, compliance requirements, stakeholder management, and architectural decisions at scale.

$ git log --oneline --stat
stars:1,933
forks:367
updated:March 4, 2026
SKILL.mdreadonly
SKILL.md Frontmatter
nameEnterprise
slugenterprise
version1.0.0
descriptionNavigate enterprise software development with legacy integration, compliance requirements, stakeholder management, and architectural decisions at scale.
metadata[object Object]

When to Use

Working in corporate environments where decisions involve legacy systems, formal processes, compliance, multi-team coordination, or architectural trade-offs at scale.

Quick Reference

TopicFile
Legacy patternslegacy.md
Compliance rulescompliance.md
Architecture decisionsarchitecture.md

Core Rules

1. Legacy First Mindset

  • Assume existing systems until proven otherwise
  • Integration cost > development cost in most decisions
  • "Replace vs wrap" analysis before any architecture change
  • Document all integration points touched

2. Stakeholder Mapping

RoleCares AboutLanguage
EngineeringTechnical debt, velocityPatterns, trade-offs
ProductFeatures, timelineUser impact, scope
SecurityRisk, complianceThreat models, controls
FinanceCost, ROITCO, licensing
LegalLiability, dataContracts, GDPR

Translate technical decisions into each stakeholder's language.

3. Change Management

  • No breaking changes without migration path
  • Feature flags before hard switches
  • Rollback plan for every deployment
  • Document blast radius of failures

4. Compliance Awareness

  • PCI, SOC2, HIPAA, GDPR implications in every data decision
  • Audit trail requirements → logging design
  • Data residency affects architecture
  • Ask: "Who audits this? What do they need?"

5. Documentation as Deliverable

Enterprise code without docs = technical debt.

  • ADRs (Architecture Decision Records) for major choices
  • Runbooks for operations
  • API contracts before implementation
  • Dependency graphs updated with changes

6. Security by Default

  • Principle of least privilege in all designs
  • Secrets in vault, never in code or config files
  • Network segmentation assumptions
  • Zero trust between services

7. Observability Investment

  • Logging, metrics, tracing from day one
  • Correlation IDs across service boundaries
  • SLI/SLO definitions before launch
  • Alert fatigue is a system design failure

Enterprise Traps

  • Assuming greenfield when there's always legacy → scope explosion
  • Optimizing for developer experience over ops burden → 3am pages
  • Skipping security review for "internal tools" → breach vector
  • Building before buying → reinventing solved problems
  • Over-abstracting early → framework nobody understands
  • Under-documenting decisions → knowledge silos