ACI · TN-004 · Technical Note
Domain D-3 · D-4 · Version 1.0 · 2026
Open Working Draft
Subject to revision
aethercontinuity.org

Decision-Critical System Scoping Tool

Criteria for Determining Which Public Sector Systems Require D1–D4 Audit Control

Päätöksentekokriittisyyden luokittelutyökalu: perusteet julkisen sektorin järjestelmien D1–D4-auditoinnin piiriin asettamiselle

Cite as — Aether Continuity Institute (ACI). (2026). Decision-Critical System Scoping Tool: Criteria for Determining Which Public Sector Systems Require D1–D4 Audit Control. ACI Technical Note No. 004, v1.0. Available at: https://aethercontinuity.org
Theoretical basis — WP-003 (Institutional Termination Time), WP-011 §08 (Revised Core Mechanism). This note operationalises the Q-4 open question from TN-003: defining the boundary between decision-critical and non-decision-critical in public sector digital architecture.
Cross-references — WP-003 · WP-006 · WP-011 · TN-003 (D1–D4 Architectural Audit Metrics) · DA-006 (Labour Market Allocation Diagnostic)
§ 01

Purpose and Scope

Note on scope

This note specifies the classification criteria for determining which public sector digital systems fall within the D1–D4 audit control requirement established in TN-003. It does not assess any specific system or recommend specific procurement exclusions. It provides a replicable scoping methodology applicable to any jurisdiction evaluating its D1–D4 audit scope.

The scoping tool is designed to be applied before procurement decisions, not after. Its purpose is to establish, at the architecture design stage, whether a system's failure under compound stress conditions would constitute an Institutional Termination Time event in the sense of WP-003.

TN-003 Q-4 identifies the boundary problem: not all public sector systems require D1–D4 compliance. Applying the full TN-003 audit framework universally produces two failure modes with opposite costs. Over-scoping makes the framework administratively unworkable — every system becomes "critical" and the framework loses discriminative power. Under-scoping leaves genuinely decision-critical systems under standard ICT governance, producing NIS2-compliant but structurally vulnerable infrastructure.

The scoping question is not: is this system important? The scoping question is: does loss of this system under compound stress conditions terminate, paralyse, or permanently compromise the institution's decision-making capacity or the accountability trail for decisions already made?

Importance and decision-criticality are not the same property. A payroll system may be important; its loss does not terminate institutional decision capacity. An authentication layer for classified executive communications may serve few users; its loss terminates decision capacity immediately and irreversibly for those functions.

§ 02

Why Scope Matters: The Two Scoping Errors

The two scoping errors have asymmetric consequences. Understanding their structure is necessary before applying the classification criteria.

Error A Over-securitisation

Too many systems are classified as decision-critical. D1–D4 audit requirements are imposed on systems whose loss would be disruptive but not institutionally terminal. Consequences: high procurement cost, slow procurement cycles, administrative resistance, and eventual framework abandonment as the compliance burden exceeds political tolerance. The framework retains formal existence but loses operative effect — a nominal standard in the sense of WP-011 §04.

Error B False normality

Genuinely decision-critical systems remain under standard ICT governance. The system satisfies NIS2 process requirements, holds security certifications, and is managed by a reputable provider. Under compound stress, the D1–D4 endurance properties are absent. The institution is fully compliant and structurally exposed simultaneously — the Architectural Specificity Gap in operational form.

The scoping tool is the mechanism that holds these two errors apart. Its discriminative power depends entirely on the precision of the decision-criticality criteria — which is why the criteria must be expressed in structural terms, not in terms of operational importance, strategic value, or political sensitivity.

§ 03

Tier Classification

Three tiers are defined. Tier assignment determines audit requirement, not organisational priority. A Tier C system may be operationally important; it is not subject to D1–D4 audit control because its loss does not satisfy the termination criteria.

Tier A Decision-Critical

A system is Tier A if its loss under compound stress satisfies at least one of the following terminal conditions:

TC-1 Decision termination: loss prevents a legally or operationally authorised decision-maker from issuing, recording, or transmitting a binding decision for the duration of the stress event.

TC-2 Execution termination: loss prevents the implementation of decisions already made — blocking the command, authentication, or authorisation pathway through which decisions are acted upon.

TC-3 Accountability termination: loss permanently destroys or renders inaccessible the audit trail required to verify, after the fact, who decided what, with what authority, and under what conditions.

Requirements: D1 · D2 · D3 · D4 full audit · TN-003 operative H-4b · procurement veto on non-compliance
Tier B Mission-Critical — not Decision-Critical

A system is Tier B if its loss causes significant operational disruption but does not satisfy TC-1, TC-2, or TC-3. The institution retains the ability to make, execute, and audit decisions, but service delivery to populations or internal administrative functions is degraded. Recovery is necessary but not immediate for institutional function.

Tier B systems require NIS2/CER compliance plus partial D1/D2 endurance assessment. They do not require the full TN-003 audit framework and are not subject to automatic procurement veto for D3/D4 non-compliance.

Requirements: NIS2 · CER · D1/D2 partial assessment · standard procurement governance
Tier C Administrative — Non-Critical

A system is Tier C if its loss produces administrative inconvenience or delays routine processes but has no effect on institutional decision capacity, service execution for critical populations, or audit trail integrity. Recovery can be deferred without institutional consequence during a compound stress event.

Requirements: standard ICT governance · standard information security · no D1–D4 mandate
§ 04

Five-Question Scoping Test

The following five questions operationalise the Tier A terminal conditions. A system is assigned Tier A if it answers Yes to Q-1 alone, or Yes to any three of five questions, or Yes to Q-1 plus Yes to Q-4 or Q-5. Any other combination indicates Tier B or C.

Q-1 Decision dependency
Is this system required for a legally or operationally authorised decision-maker to issue a binding decision?
Binding decisions include: executive orders, regulatory determinations, emergency declarations, procurement authorisations, and any decision whose legal effect depends on an authenticated, recorded act by an identified official. The question is not whether the system is normally used for such decisions — it is whether the decision cannot be made or recorded without the system under stress conditions when alternative channels are also degraded.
Yes alone → Tier A (TC-1). Yes is the highest-weight response in the test.
Q-2 Time sensitivity
Does loss of this system produce decision-relevant degradation within the 72-hour compound stress reference window?
Degradation is decision-relevant if it affects the ability to make, execute, or audit decisions — not merely to deliver services. The 72-hour window is the D1 reference duration from TN-003. A system whose loss produces decision degradation after 72 hours is Tier B in this dimension; degradation within 72 hours is a Tier A signal.
Yes contributes to Tier A threshold. Yes + Q-1 → Tier A confirmed.
Q-3 Identity dependency
Is authentication, authorisation, or identity verification for decision-critical functions dependent on this system or its external provider chain?
This question targets the D3 dimension. A system need not itself be a decision system to satisfy TC-1 via identity dependency: if its loss causes the authentication layer for decision systems to fail, the downstream effect is terminal in the TC-1 sense. The provider chain question is material: if the system depends on an external identity provider (cloud SSO, PKI authority) whose availability is not jurisdiction-controlled, the answer is Yes even if the system itself is locally hosted.
Yes contributes to Tier A threshold. Yes + Q-1 → Tier A (TC-1 via D3 pathway).
Q-4 Audit dependency
Would loss of this system permanently destroy or render inaccessible the audit trail required to verify decisions made during the stress event?
This question targets TC-3 directly. Permanent loss is the key qualifier: if the audit trail can be reconstructed from other sources within a reasonable post-event period, the loss is disruptive but not terminal. If the trail is irretrievably gone — because logs were held exclusively in the failed system, or because the cryptographic integrity chain is broken — TC-3 is satisfied. "Decisions made during the stress event" includes decisions made in the period before the system failed, if those logs were held in the failed system.
Yes contributes to Tier A threshold. Yes + Q-1 → Tier A (TC-3 pathway).
Q-5 Compound stress amplification
Does loss of this system increase the failure probability or degradation severity of other systems that satisfy Q-1, Q-3, or Q-4?
This question captures cascade dependencies. A system may not itself be decision-critical by TC-1 through TC-3, but its failure may remove a load-bearing dependency that causes directly decision-critical systems to fail. Cascade effects are structurally similar to the compound stress amplification mechanism in WP-004 Variable I. A Yes answer here makes the system decision-critical by structural position even if not by function — its loss triggers downstream terminal conditions.
Yes + Q-1 → Tier A (cascade pathway). Yes alone with two other Yes answers → Tier A.
Scoping rule summary

Tier A: Q-1 alone; or any three of five; or Q-1 + (Q-4 or Q-5).

Tier B: Q-2 or Q-3 alone without Q-1; or exactly two Yes answers without Q-1. Q-4 alone — without Q-1 or a three-question convergence — indicates elevated review but does not trigger Tier A. Audit trail loss is terminal only when decision-critical functions (Q-1) are at stake; standalone audit dependency without decision dependency is a serious governance risk but not an ITT condition.

Tier C: Zero or one Yes answer with no Q-1. Standard governance applies.

§ 05

Finland Reference Cases

The following examples apply the scoping test to system categories typical of Finnish public sector digital architecture. These are structural observations, not assessments of specific systems. Actual classification requires the scoping test to be applied to the specific technical and operational configuration of each system.

System categoryQ-1Q-2Q-3Q-4Q-5Probable tier
Government executive authentication layer (suomi.fi identity, strong authentication for ministerial systems) YesYesYesYesYes Tier A — TC-1, TC-3 via D3 cascade
Cabinet decision documentation and registry (secure communications for government decisions) YesYesYesYesNo Tier A — TC-1, TC-3 direct
Critical infrastructure command authorisation (system through which emergency powers are issued and authenticated) YesYesYesYesYes Tier A — TC-1, TC-2
Wellbeing area critical operational situational picture (system guiding immediate resource allocation decisions) YesYesNoNoYes Tier A — three Yes including Q-1
State payment execution system (core layer — loss blocks implementation of authorised decisions) YesYesNoYesNo Tier A — TC-2, TC-3 partial
Public service case management systems (permit processing, benefits administration) NoYesNoNoNo Tier B — operationally significant, not terminal
HR and personnel administration systems NoNoNoNoNo Tier C — administrative, no decision dependency
Internal intranets, communication portals, non-critical reporting tools NoNoNoNoNo Tier C

The authentication layer (row 1) illustrates the cascade dependency mechanism: it is not itself a decision system, but its loss terminates Q-1 systems downstream. This is the Q-5 amplification pathway — the system is Tier A by structural position, not by direct function.

§ 06

RKOM Governance Interface

The scoping tool is the entry point for the institutional governance mechanism that WP-011 requires for operative H-4b. Without a defined scope, an H-4b enforcement mechanism either lacks a target (nominal) or expands without boundary (operationally unworkable). The Tier A/B/C classification provides the scope boundary.

System identified for procurement or renewal
        │
        ▼
Scoping test applied (Q-1 through Q-5)
        │
        ├─ Tier C → Standard ICT governance proceeds
        │
        ├─ Tier B → NIS2/CER + partial D1/D2 assessment required
        │
        └─ Tier A → TN-003 D1–D4 full audit required
                        │
                        ├─ Audit PASS → procurement proceeds
                        │
                        └─ Audit FAIL → procurement blocked
                                │
                                └─ Override requires:
                                   explicit government-level decision
                                   named accountable authority
                                   documented risk acceptance
                                   time-bounded remediation plan

The override pathway is structurally necessary. There will be cases where a Tier A system cannot satisfy D1–D4 requirements within procurement timelines — because H-3(t) is below threshold (TN-003 §05 Q-4), because no compliant supplier exists, or because transition costs are prohibitive in the short term. The override mechanism allows government-level political decision to accept documented architectural risk explicitly, rather than allowing nominal compliance to obscure the gap.

The named accountable authority requirement is the H-4a/H-4b interface. When operative H-4b cannot be established through procurement enforcement (Property 3 of TN-003 §04), the override mechanism converts the architectural gap into a political liability: a named individual or body has explicitly accepted documented risk on behalf of the institution. This does not resolve the technical exposure — it ensures that the exposure is not invisible. The named authority bears personal or institutional accountability if the documented risk materialises. This is the mechanism through which H-4a (political attributability) can function as a partial substitute for H-4b under conditions where operative H-4b is temporarily unachievable.

RKOM scope boundary

An RKOM or equivalent resilience oversight function applying this scoping tool should expect that Tier A systems will constitute a small fraction of total public sector digital systems — likely under 5% by count, but representing the systems whose failure under compound stress would produce the WP-003 Institutional Termination Time condition. The scoping tool's value is precisely that it concentrates enforcement resources on this small fraction rather than distributing them across the full ICT estate.

§ 07

Open Questions

Q-1

Dynamic reclassification. System architecture changes over time. A system initially classified as Tier C may become Tier A if other systems are deprecated and their decision-critical functions migrate to it. The scoping tool specifies criteria for classification at a point in time; a governance mechanism for periodic reclassification is outside the scope of this note and has not been specified in the ACI series.

Q-2

Provider dependency inheritance. Q-3 asks whether identity dependency extends through the external provider chain. The full chain may be several layers deep — a locally hosted system may authenticate through a cloud identity provider, which authenticates through a third-party certificate authority, which relies on a root certificate managed by a foreign entity. The scoping test treats the answer as Yes if any link in the chain is not jurisdiction-controlled. Tracing the full chain in practice may require technical analysis not available at procurement design stage.

Q-3

Municipal and regional boundary. The reference cases in §05 focus on central government. The scoping criteria are structurally identical at municipal and wellbeing area level — a municipal authentication layer serving emergency services satisfies TC-1 for municipal decision capacity. Whether the same D1–D4 audit mandate applies to municipal Tier A systems, or whether a proportionality adjustment is warranted for smaller institutions, is a governance design question not resolved in this note.

Q-4

Interaction with DA-006 Labour Continuity Reserve. DA-006 identifies that decision-critical public sector functions face a structural workforce risk from the atrophy of experienced personnel — the L-4 segmentation finding. A Tier A system with adequate D1–D4 architectural compliance may still fail if the human operators required to run it under stress conditions are unavailable. The intersection of the TN-004 technical scoping tool and the DA-006 workforce reserve diagnostic has not been addressed in the ACI series.

Viitteet

Cross-references

WP-003
Institutional Termination Time. The TC-1 through TC-3 terminal conditions in §03 derive from the ITT framework. A system whose loss produces a TC-1 event terminates the institution's decision capacity in the sense WP-003 defines.
TN-003
D1–D4 Architectural Audit Metrics. Primary companion note. TN-004 answers TN-003 Q-4: which systems fall within the D1–D4 audit scope. Tier A classification in TN-004 triggers the full TN-003 audit requirement.
WP-011
Institutional System-4 Architecture. The RKOM governance interface in §06 is the H-4b enforcement mechanism WP-011 identifies as the missing operative component. TN-004 provides the scope boundary that makes that mechanism workable rather than boundless.
WP-006
Continuity Computing. D1–D4 definitions. The Q-2 72-hour reference window derives from the D1 power endurance parameter in WP-006 §07.
DA-006
Labour Market Allocation Diagnostic. Q-4 open question above identifies the unresolved intersection between TN-004 technical scoping and the DA-006 Labour Continuity Reserve finding: a technically compliant Tier A system may still fail if the workforce to operate it under stress is unavailable.
WP-004
Recovery Capacity Invariants. Q-5 (compound stress amplification) maps to WP-004 Variable I (Variation): cascade failure through dependency chains reduces the institution's range of available responses under stress.