Compliance ↔ SDLC ↔ PDLC bridge

This document maps **Compliance** practices to the two lifecycle frameworks and contrasts Compliance with **Security**:

Compliance ↔ SDLC ↔ PDLC bridge

Purpose

This document maps Compliance practices to the two lifecycle frameworks and contrasts Compliance with Security:

  • PDLC — "Are we building the right product?" (including for the right markets and user segments)
  • SDLC — "Are we building the product right?"
  • Compliance — "Does the product meet regulatory and legal obligations?"
  • Security — "Is the product safe from unauthorized access, breaches, and attacks?" (see Security ↔ SDLC ↔ PDLC bridge)

Compliance is front-loaded in PDLC (P3 scoping — jurisdictions, data categories, certifications) and continuous through SDLC (A–F) and product operations (P5), with strong sunset obligations (P6 — deletion, records, transfer wind-down).

Canonical sources: COMPLIANCE.md (this package) · Product development lifecycle (PDLC) · Software development lifecycle (SDLC) · SECURITY.md · blueprints/BRIDGES.md.


Document map

Section Contents
Purpose Why this bridge exists; Compliance vs Security vs lifecycles
Comparison table Compliance vs Security vs SDLC vs PDLC
When one is missing Consequences when any lens is absent
Compliance across the lifecycle P1–P6 and A–F mapping
Role mapping Ownership and collaboration
Artifact flow Handoffs between Compliance, Security, SDLC, and PDLC
Calibration By regulatory context
Anti-patterns Afterthought, checkbox, gold-plating
Worked example Health data feature under GDPR + HIPAA
Related reading Package and sibling docs

Comparison table

Dimension Compliance Security SDLC PDLC
Core question Does the product meet regulatory and legal obligations? Is the product safe from unauthorized access, breaches, and attacks? How do we build this correctly? Should we build this; does it create the right outcomes in the right markets?
Scope Privacy, accessibility, sector rules (health, finance), AI governance, minors, certifications, vendor assurances, evidence Threat modeling, vuln management, crypto, IAM, security testing, incident response, supply chain security Requirements → design → implementation → verification → release (AF) Problem discovery → validation → strategy → launch → growth → sunset (P1P6)
Primary owner Legal/privacy/compliance leads; DPO where appointed; engineering implements controls Security / AppSec; CISO org-wide Delivery team; Owner / Implementer per SDLC Product leadership / product trio
Timeline Continuous — law, contracts, and audits evolve; controls must stay aligned Continuous — threats and CVEs evolve Iteration / release cadence Product lifetime
Success metric Audit results, regulatory inquiries closed, rights SLAs, accessibility conformance, certification maintenance Vuln SLAs, incident metrics, penetration test outcomes, security gate pass rate Quality, velocity, defect escape Adoption, revenue, outcome KPIs, market expansion
Key artifacts ROPA, DPIAs, VPAT/ACR, control matrix, evidence packs, DPAs/BAAs, AI documentation Threat models, pentest reports, SBOM, security requirements Specs, code, tests, release notes Strategy, experiments, roadmap
Risk focus Legal/regulatory exposure, fines, market access, contractual breach, class actions (jurisdiction-dependent) Adversarial exploitation, confidentiality/integrity/availability Technical and delivery risk Market and outcome risk
Failure mode Fines, stop-processing orders, delisting from enterprise sales, inaccessible product, forced rework Breach, ransomware, account takeover Late or brittle delivery Right execution of the wrong or unlawful thing

When one is missing

Scenario What happens
Compliance without SDLC Policies and registers exist, but implementation drifts — evidence does not match production; rights requests fail in edge systems.
Compliance without PDLC Controls are built for a product nobody should have shipped in that market — efficient execution of a non-viable or unlawful strategy.
SDLC without Compliance Fast shipping of non-conforming software — accessibility gaps, unlawful processing, missing breach or vendor workflows.
PDLC without Compliance Roadmap commits to jurisdictions or data uses without scoping — late redesign, blocked launch, or post-launch enforcement.
Security without Compliance Strong technical protection but missing legal mechanisms — e.g., retention beyond lawful periods, or inaccessible security UX blocking users with disabilities.
Compliance without Security Paper conformance while systems remain exploitable — breach destroys trust and triggers both security incident and regulatory notification.
All lenses practiced Strategy picks viable markets; delivery embeds controls and evidence; threats are managed alongside obligations.

Compliance across the lifecycle

Phase Compliance role Key activities Outputs
P1 Discover Obligations explorer Scan jurisdictions, user types (children, employees), sensitive data in problem space Draft applicability matrix, stakeholder map for legal/privacy
P2 Validate Constraint tester Prototype flows for consent, notices, accessibility; test if value prop survives minimization Validation learnings, “compliance feasible” hypotheses
P3 Strategize Regulatory scoper Fix target markets; certification needs (SOC 2, ISO); vendor strategy; AI risk class Compliance scope doc, budget for audits/legal, roadmap constraints
A Discover Requirements analyst (compliance) Elicit lawful basis, retention, rights, accessibility acceptance criteria Compliance-related user stories, legal non-functionals
B Specify Control designer Specify data categories, flows, subprocessors; accessibility criteria per epic Updated specs, DPIA trigger assessment
C Design Architectural compliance Privacy boundaries, residency, audit logs, segregation of duties, accessible component patterns Architecture decision records (compliance), threat+privacy combined reviews
D Build Implementer Policy-as-code gates; consent/version APIs; retention jobs; secure configs per both security and privacy Implemented controls, CI evidence hooks
E Verify Assurance Accessibility audit (auto+manual), control testing, DPIA closure actions Test reports, evidence for samples
F Release Release evidence owner Final evidence pack slice; subprocessors list accuracy; accessibility statement scope Release compliance checklist, updated external docs
P4 Launch Go-to-market compliance Marketing claims vs. reality; enterprise questionnaires; support scripts for rights/breaches Launch comms review, support runbooks
P5 Grow Continuous compliance Regulatory change management; re-certification; new vendor onboarding; model drift monitoring (AI) Change log, annual evidence cycles
P6 Sunset Decommission compliance Data deletion certificates; archive legal holds; contract terminations; user comms Sunset attestations, BA/DPA closure

Role mapping

Phase(s) Compliance stance PDLC accountability SDLC accountability Typical partners
P1–P2 Explore and validate constraints PM, discovery Spikes feeding A Legal, privacy, accessibility
P3 Scope laws and certifications PM, strategy Owner (cost/feasibility) Legal, DPO, CISO
A–B Translate law into requirements PM prioritization Owner, BA Privacy engineer, legal
C Design-time proof Architecture alignment Implementer, architect Security, data engineering
D–E Build and verify Implementer, QA AppSec, a11y specialist
F Evidence and release GTM accuracy Owner go/no-go Compliance ops, RevOps
P4–P5 Launch and operate PM, support, analytics SRE, on-call Legal, communications
P6 Wind-down PM, legal Implementer (deletion) Records management

Artifact flow

PDLC / SDLC → Compliance (inputs)

Source Compliance usage
Market and persona choices (P1–P3) Determine children’s rules, employment algorithms, health/finance triggers
Data flows and features (B–C) DPIA/PIA, PCI scope, HIPAA PHI boundaries
Vendor selections (C, P3) DPAs, BAAs, AI supplier terms, subprocessor registers
Security artifacts (C–E) Input to transfer risk analysis, breach assessment, ISO/SOC control mapping

Compliance → SDLC (outputs)

Compliance artifact SDLC usage
Lawful basis + purpose statements (A–B) Acceptance criteria, analytics constraints
Control matrix (B–C) Non-functional requirements, IaC policies
Accessibility criteria (B–E) Definition of Done, regression tests
Evidence requirements (E–F) Ticket metadata, log retention configs, export jobs

Compliance → PDLC (feedback)

Signal PDLC usage
Certification gaps P3 reprioritization — defer enterprise segment until Type II
Rights backlog / complaints P5 product fixes; P3 scope reduction
Regulatory guidance updates Roadmap adjustments, kill switches for features

Security ↔ Compliance (shared boundary)

Shared topic Security emphasis Compliance emphasis
Encryption Strong crypto, key hygiene Lawful transfers, adequacy, contractual encryption clauses
Logging Detection and forensics Retention limits, lawful access, transparency reports
Access control Prevent abuse and lateral movement Minimization, SoD, ISO/SOC evidence
Incidents Containment and eradication Breach assessment, notifications, regulator comms

Calibration

By regulatory context

Context Compliance emphasis
Unregulated consumer SaaS Baseline privacy notices; WCAG AA for broad reach; optional SOC 2 for sales
GDPR / UK / EEA Lawful basis, ROPA, DPIAs, transfers, 72h breach playbook, DPO interface, UK Children’s Code if applicable
Healthcare (US HIPAA-class) PHI inventory, BAAs, minimum necessary, technical safeguards, breach rule
Financial (payments) PCI scope reduction, SAQ path, ASV, segmentation evidence
Financial (public company SOX-relevant systems) ITGC, change tickets, access reviews, audit trail integrity
Government / highly regulated procurement Accessibility (508 / EN 301 549), data residency, certification schemes
AI-heavy / hiring / credit-adjacent EU AI Act class, NYC LL144-style audits, disparate impact analysis where legally relevant

Anti-patterns

Anti-pattern Description Fix
Compliance as afterthought Legal engaged two weeks before launch; DPIA written to justify a fait accompli Involve compliance in P3 and A; gate feasibility on obligations
Checkbox compliance Controls chosen to “pass audit” without operational truth — screenshots staged, configs reverted Map controls to actual processes; continuous monitoring; ownership by named roles
Gold-plating Excessive process for low-risk features — same DPIA depth for every CRUD field Proportionality; tiered assessments; risk-based sampling
Legal-only compliance Policies updated but engineering never implements Joint OKRs; compliance engineers embedded; CI policy gates
Security substitutes for privacy “We encrypt therefore GDPR done” Rights, basis, minimization, transfers, and UX are separate workstreams
Accessibility last Overlay widgets; fixing only automated scan errors Manual keyboard/screen reader testing; design-system defaults; VPAT scoped honestly

Worked example

Scenario: Launching a health data feature (symptom tracking + optional sharing with a clinician portal) for EU and US users.

Step Lifecycle What happens
1 P3 Compliance scopes GDPR + HIPAA (US clinician flow). Decides PHI subset, BAA with clinic integration vendor, need for DPIA (special category health data under GDPR). Accessibility AA committed for patient-facing UI.
2 A Requirements: lawful bases documented (consent vs. contract per flow), retention (e.g., delete after account closure with clinical hold exceptions), export for portability, breach escalation paths.
3 B Data map: mobile app → API → regional storage; clinician share = separate channel. DPIA documents risks, mitigations, residual risk sign-off. Security runs overlapping threat model for API and tokens.
4 C Architecture: EU residency option; encryption at rest and in transit; audit logs without excessive PHI in log lines; RBAC and SoD for support actions; accessible form components.
5 D Implement consent versioning, BAA-gated environments, automated checks (no public buckets, TLS policies). Feature flags for US vs EU behavior where required.
6 E Accessibility audit; penetration test on new endpoints; control test: erasure propagates to replicas and backups per policy; tabletop breach with Legal.
7 F Evidence: sampled logs, config exports, test reports, updated ROPA/subprocessors, privacy notice + accessibility statement scope.
8 P4 Marketing claims reviewed; support trained on rights requests and clinical data corrections.
9 P5 Monitor regulatory updates; periodic vendor reassessment; recertification tasks if ISO/SOC in scope.
10 P6 If feature retired: delete PHI/health data per schedule; retain only legal hold subsets; revoke vendor access.

Doc Why
COMPLIANCE.md Principles, domains, certification, compliance-as-code
Compliance Package overview and cross-family relationships
Compliance frameworks (index) Framework index
../security/SECURITY.md Threat-driven controls and S-SDLC
Security ↔ SDLC ↔ PDLC bridge Security lifecycle mapping
Compliance frameworks (redirect) Security package’s framework summaries (technical control angle)
Software development lifecycle (SDLC) Phases A–F
Product development lifecycle (PDLC) Phases P1–P6
UX / UI Design ↔ SDLC ↔ PDLC bridge Accessibility and consent UX alignment

Keep project-specific compliance documentation in docs/security/compliance/, DPIAs in docs/security/, and compliance decisions in docs/adr/, not in this file.

Canonical source

Edit https://github.com/autowww/blueprints/blob/main/disciplines/compliance/COMP-SDLC-PDLC-BRIDGE.md first; regenerate with docs/build-handbook.py.