Framework

The Operating Model Question Regulated Industries Keep Getting Wrong

Most organizations choose between product speed and compliance control. The ones that win have stopped treating this as a binary.

February 12, 2026 12 min read Ryan Pehrson
The Operating Model Question Regulated Industries Keep Getting Wrong

Key Takeaways

  • The product-versus-platform tension in regulated industries is a false choice — the organizations that resolve it build compliance into the platform rather than bolting it onto the product
  • DORA metrics exist for regulated industries too. Standard Bank's 700-to-30-day release cycle is a compliance architecture story, not just a DevOps story
  • Platform-as-product thinking changes who the platform team's customer is. That shift in accountability changes everything about how platforms get built

A global bank I advised had two parallel transformation programs running simultaneously. One was a product modernization — cross-functional teams organized around customer journeys, empowered to ship rapidly. The other was a compliance platform initiative — centralized engineering responsible for controls, auditability, and regulatory reporting. Twelve months in, neither program was delivering. The product teams were moving fast, but their releases were being held by manual compliance reviews that took weeks. The platform team was building infrastructure, but the product teams weren’t adopting it because it was too rigid to accommodate their use cases.

When I mapped the problem, the diagnosis was straightforward: both programs had been designed as if they were independent. Nobody had answered the foundational question — what is the relationship between these two systems? — before building either one.

This is not a story about poor execution. Both teams were technically capable and committed. The failure was organizational architecture. And it is the default failure mode in regulated industries pursuing digital transformation.

The False Binary That Shapes the Wrong Conversation

The question regulated organizations typically ask is some version of: how fast can we move while remaining compliant? The framing treats speed and compliance as competing forces on a single dial. Turn it toward speed, and you accept compliance risk. Turn it toward control, and you sacrifice delivery velocity. Most transformation programs optimize for a point on this dial rather than questioning whether the dial is the right instrument.

The organizations that consistently outperform their peers have answered a different question: how do we design the system so that compliance accelerates delivery rather than gating it? The answer requires a specific operating model — and more importantly, a specific architecture for the relationship between product teams and platform capabilities.

This distinction between operating model and technology architecture matters. An organization can deploy Kubernetes, adopt SAFe, and stand up a DevSecOps toolchain and still operate with the same fundamental tension. The technology is a component of the answer. It is not the answer.

Three Operating Postures and Why Two of Them Fail

The organizations I advise tend to fall into one of three structural orientations when it comes to product and platform. Understanding which posture an organization occupies explains a great deal about why its transformation programs succeed or stall.

The Product-First posture organizes around customer-facing outcomes. Teams are cross-functional, empowered, and oriented toward delivery speed. This model drives strong product intuition and rapid iteration. In unregulated markets, it is often the winning structure. In regulated industries, it creates a compounding liability: compliance becomes a per-team responsibility, which means it is inconsistently applied, poorly documented, and expensive to audit. The compliance burden doesn’t go away — it gets distributed across every product team that now has to carry it individually, with neither the expertise nor the tooling to do it well.

The Platform-First posture centralizes infrastructure and controls into a shared team. This produces consistency and auditability. What it produces less reliably is adoption. Platform teams organized around control tend to design for risk reduction rather than developer experience. They build guardrails that product teams experience as walls. The outcome is familiar: shadow IT, exceptions processes, and product teams doing end-runs around the platform to maintain delivery velocity. The platform technically exists. The compliance benefits it was supposed to create do not materialize because nobody is using it as intended.

The Blended posture — which is the one that works — is structurally different from a compromise between the first two. It is not a product-first organization with a compliance function bolted on, nor a platform-first organization that has been asked to be friendlier. The fundamental design principle is this: the platform provides the floor, not the ceiling. Compliance requirements, security controls, and audit capabilities are embedded in shared infrastructure that product teams consume as self-service components. Product teams build within those constraints instead of routing around them. The compliance surface area shrinks because it lives in one place instead of replicated inconsistently across dozens of teams.

What “Compliance as Architecture” Actually Means

The phrase gets used loosely, so it is worth being precise. Compliance embedded in architecture means that the compliant path is also the fastest path — not the path that requires the most coordination, the most paperwork, or the most manual review. When compliance is a gate at the end of a process, it creates the incentive to defer or circumvent it. When compliance is a property of the components being assembled, it becomes invisible infrastructure.

Consider how this plays out in practice. A financial services firm operating with legacy compliance processes might have a two-week review cycle for any deployment touching customer data. Each review requires documentation packages assembled manually, handoffs between engineering and compliance teams, and sign-offs from multiple risk stakeholders. The bottleneck is not the regulator. The bottleneck is the architecture of the review process itself — designed for a world where compliance knowledge lived in specialists rather than in systems.

The same firm, with compliance embedded in infrastructure, can run automated control checks as part of the deployment pipeline. The audit trail is generated automatically because the deployment tooling generates it, not because a developer remembered to write it. The compliance team’s role shifts from reviewing artifacts to designing the controls that generate artifacts reliably. This is not an incremental improvement. It changes the structural relationship between delivery velocity and compliance assurance.

The Evidence Is Not Theoretical

The case for this operating model is not built on principles alone. The data from organizations that have made the shift is consistent enough to be instructive.

Standard Bank’s transformation is among the most documented examples in financial services. The bank operated with release cycles measured in hundreds of days — a cadence that reflected the complexity of its legacy compliance and change management processes rather than the underlying technical work. After restructuring around a platform engineering model with compliance embedded in the delivery pipeline, release cycles fell from over 700 days to approximately 30. That is not a marginal improvement. It represents a structural change in how compliance intersects with delivery — from a sequential gate to a parallel property. The same transformation produced roughly 77% reduction in IT costs and roughly 50% improvement in developer productivity, figures that become less surprising once you understand the model. When developers stop carrying the compliance burden manually, they can spend that time building.

Capital One made a harder bet. The decision to close all private data centers by 2020 — the first major U.S. bank to do so — was not a cost optimization move. It was a platform architecture decision that centralized security and compliance capabilities in cloud infrastructure where they could be managed consistently, rather than distributed across on-premises environments where consistency required expensive human coordination. The result: a technology organization of 10,000+ engineers with the delivery architecture of a technology company rather than a traditional bank.

In healthcare, City of Hope’s platform engineering initiative produced an 80% improvement in developer productivity alongside an 80% increase in release velocity, while maintaining HIPAA compliance — which makes sense once you understand the model. They achieved it by compressing pipeline build times from two and a half hours to thirty minutes through automation, and by embedding HIPAA controls in the platform rather than requiring teams to implement them independently.

The Pattern Underneath the Numbers

What these cases share is not a technology choice. Capital One, Standard Bank, and City of Hope made different technology choices. What they share is a structural decision about where compliance capability lives in the organization.

In each case, the transformation required building a platform team that operated with a product mindset — meaning the platform team’s primary accountability was to its internal customers, not to its own roadmap. A platform team that defines success by the number of services it builds will build services that satisfy its own engineering instincts. A platform team that defines success by developer adoption will build services that solve the problems developers actually have. The metrics are different. The incentives are different. And the result is structurally different: the first produces internal infrastructure that nobody uses, and the second produces infrastructure that the entire engineering organization actually uses.

The platform-as-product framing — treating internal developers as customers, with product management discipline applied to platform decisions — is the mechanism by which the blended operating model actually functions. Without it, the platform team defaults to Platform-First posture regardless of organizational intent.

What the DoD Got Right About Hostile Compliance Environments

The Department of Defense presents an extreme version of the challenge every regulated organization faces. Security and compliance requirements are not suggestions from an audit team — they are legal mandates with national security implications. The delivery velocity historically produced by those constraints was measured in months to years for software deployments that in commercial environments take days.

Platform One, the DoD’s enterprise DevSecOps initiative, represents an institutional answer to the same question regulated industries ask. The approach: pre-hardened container images with security controls embedded at the build level, not applied post-deployment. The compliance documentation is an output of the build process rather than an input to a separate review. Deployment timelines compressed from months to hours not because compliance requirements were relaxed, but because they were moved upstream in the architecture.

The lesson is not that government agencies have solved a problem commercial firms haven’t encountered. The lesson is that even in the most compliance-constrained environment imaginable, the path to delivery velocity runs through compliance architecture, not around it.

The Four Structural Moves That Separate the Organizations That Get This Right

Across the cases I’ve examined, four structural shifts appear consistently in the organizations that resolve the product-platform tension successfully. These are not a sequence of phases or a maturity model — they are simultaneous design decisions.

Standardize the foundation without standardizing everything. The organizations that succeed draw a clear line between what must be standardized (security controls, audit infrastructure, data residency, compliance reporting) and what should not be (product architecture, technology choices within compliant boundaries, team processes). Attempting to standardize everything produces a platform that nobody adopts. Standardizing nothing produces distributed compliance risk. The design question is: what is the minimum standardized surface area that provides meaningful compliance assurance without constraining product team autonomy?

Automate the compliance audit trail, not the compliance judgment. Automated controls catch what they are programmed to catch. They do not replace the judgment required to assess novel risk, interpret ambiguous regulatory guidance, or weigh tradeoffs. The organizations that use automation well deploy it for the repeatable, documentable, auditable compliance work — and they preserve human judgment for the interpretive work. Conflating the two in either direction produces problems: automating judgment leads to compliance theater, while keeping audit trail work manual destroys delivery velocity.

Build the platform team’s incentives around adoption, not output. This is a governance design decision as much as an organizational design decision. If platform teams are measured on services shipped, they optimize for services shipped. If they are measured on developer adoption and net promoter scores from internal customers, they optimize for usability and real problem-solving. The incentive structure determines the platform team’s effective customer.

Use DORA metrics as organizational diagnostic tools. Deployment frequency, lead time for changes, mean time to recovery, and change failure rate are not just DevOps metrics. In regulated industries, these metrics surface the exact friction points where compliance processes are creating delivery constraints. A change failure rate above 15% in a regulated environment typically indicates that quality controls are applied too late in the process — not that the controls are too strict. Deployment frequency below weekly at scale typically indicates that release governance is structured for batch review rather than continuous assurance. The metrics do not tell you how to fix the architecture. They tell you where to look.

The Conversation That Needs to Happen Before the Architecture Decision

The harder conversation — the one that determines whether the operating model change actually takes hold — is about accountability and governance.

Who owns the platform team’s roadmap? Who adjudicates when a product team’s requirements conflict with platform standardization? Who has the authority to mandate platform adoption versus allowing product teams to maintain their own tooling? These questions sound organizational, and they are. But they are also architecture questions, because the answers determine the actual compliance surface area of the organization.

I’ve seen well-designed platform engineering programs stall because these accountability questions were left unresolved. The technical implementation was sound. The governance model was ambiguous. Product teams defaulted to their existing tooling because there was no clear mechanism to require adoption, and the platform team lacked the authority to enforce it. The compliance benefits of the consolidated architecture never materialized because the architecture was never actually consolidated.

The organizations that navigate this successfully treat the governance design as a deliverable in its own right — not an afterthought to be resolved during implementation, but a foundational decision that shapes the technical architecture from the start.

Resolving the Tension

The regulated industries that have made the most progress on this question share a common realization: the product-versus-platform framing was never accurate. It was a symptom of a governance model that hadn’t decided who owned the compliance surface area and an architecture model that treated compliance as a property of the deployment process rather than the platform itself.

The organizations that resolve the tension do not move faster by taking on compliance risk. They move faster because they have reduced the transaction costs of compliance — the manual reviews, the documentation assembly, the coordination overhead, the inconsistent implementation across teams — by building compliance into shared infrastructure that operates at the speed of the delivery pipeline rather than the speed of human review cycles.

This is what the bank I described at the opening eventually understood. The two parallel programs were not independent. They were describing two halves of the same operating model, running in opposite directions. When the organization stopped treating them as separate and started designing the relationship between them — what the platform would provide, what autonomy the product teams would have within those constraints, how compliance accountability would flow — the delivery velocity followed.

The question was never how fast you can move while staying compliant. The question was always what architecture makes compliance a structural property of how you move.

Share
Ryan Pehrson
Ryan Pehrson
Founder & Managing Principal, Pharynos

Ryan advises organizations on strategy, technology, and transformation. He founded Pharynós to bring top-tier advisory rigor to leaders navigating digital change.

LinkedIn

Want to Discuss This Topic?

Schedule a Conversation