nfr/

Non-Functional
Requirements

Performance, availability, scalability, and security NFR evaluation.

slow fast
5 topics in this section
nfr/maintainability/
Maintainability NFRs
The strategic guide for maintainability non-functional requirements — recognising that the team's measurable maintainability targets specified rather than left as adjectives in design documents, the explicit decomposition into modifiability and testability and analysability and reusability rather than treating maintainability as a single dimension, the lean-on-static-analysis-evidence approach that reads metrics from the codebase rather than asking developers how maintainable they feel the system is, the per-module rather than per-system targeting that respects the heterogeneous maintainability profile of every real codebase, the trajectory monitoring that distinguishes accumulating debt from absorbed-then-paid-down debt, and the budget-violation-as-architectural-signal interpretation that treats threshold breaches as work to schedule rather than scores to defend are what determine whether the team's maintainability posture stays calibrated with how much change-velocity the business needs from each module or whether the codebase silently accumulates debt for years before refactor cost becomes catastrophic.
nfr/performance/
Performance NFRs
The strategic guide for performance non-functional requirements — recognising that the team's percentile-based latency targets specified at P50 / P95 / P99 rather than averages that hide tail behaviour, the throughput targets stated at sustained-load conditions rather than peak-burst conditions that mask graceful-degradation failures, the resource-saturation budgets specified per system stage rather than aggregated end-to-end, the explicit articulation of trade-offs between latency and throughput and cost rather than averaging-them-away in a composite performance score, the load-pattern characterisation that distinguishes synchronous user-facing traffic from background-batch traffic, and the budget-violation-as-architectural-signal interpretation that treats threshold breaches as either work to schedule or targets to renegotiate are what determine whether the team's performance posture stays calibrated with what users actually experience or whether the system passes test-environment load tests while users see a degraded production system because the load-test profile never matched the actual production traffic shape.
nfr/reliability/
Reliability NFRs
The strategic guide for reliability non-functional requirements — recognising that the team's availability targets specified as service-level objectives with explicit error budgets rather than aspirational uptime numbers, the failure-mode catalogue that enumerates known ways the system can degrade and the response-pattern committed for each rather than treating failure as an unspecified emergent surprise, the recovery-objective targets stated as RTO and RPO with rationale rather than left as adjectives, the partial-availability and graceful-degradation envelopes that distinguish "fully working" from "core flows working" from "read-only mode" from "down," the explicit articulation of which dependencies are tightly coupled and which are degraded-tolerant rather than treating every dependency as equally critical, and the budget-violation-as-architectural-signal interpretation that treats SLO breaches as work to schedule or targets to renegotiate are what determine whether the team's reliability posture is calibrated against what users actually need from the system or whether the system pursues nine-nines availability for paths users use rarely while routinely failing on the paths users care about most.
nfr/security/
Security NFRs
The strategic guide for security non-functional requirements — recognising that the team's threats enumerated explicitly via threat-modelling rather than treating security as a uniform "make it secure" requirement, the controls specified per data classification rather than applied homogeneously across all data, the authentication-and-authorization targets stated as observable requirements (multi-factor enforcement coverage, session-lifetime ceilings, privilege-elevation audit completeness) rather than as adjectives, the audit-trail completeness requirements specified per regulated-action class with retention horizons matched to compliance regime, the secrets-management posture specified with rotation cadences and access-instrumentation rather than left to platform defaults, and the security-budget-violation interpretation that treats every audit failure or threat-model finding as architectural signal rather than as a defect to suppress are what determine whether the team's security posture is calibrated against actual threats facing the system or whether the system passes generic compliance checklists while remaining vulnerable to the specific adversary patterns that target its industry and data.
nfr/usability/
Usability NFRs
The strategic guide for usability non-functional requirements — recognising that the team's accessibility targets specified to WCAG conformance levels rather than left as goodwill statements, the learnability targets defined as time-to-first-success measurements rather than as design intuitions, the error-prevention-and-recovery requirements specified per high-risk action class with measurable confirmation patterns, the cognitive-load budgets specified in fields-per-screen and decisions-per-flow rather than discovered after release, the per-task user-flow targets for completion-rate and time-on-task rather than aggregated UX metrics that hide flow-specific failures, and the budget-violation interpretation that treats accessibility violations and task-completion failures as architectural signal rather than as design preferences are what determine whether the team's product is genuinely usable for the populations it serves or whether the team's internal design intuition diverges from external user behaviour because the requirements never made the gap measurable.