Core Idea
The risk storming process is a structured three-phase workflow (identification, consensus, mitigation) that guides teams through systematically discovering, validating, and addressing architectural risks in collaborative workshop sessions.
Process vs Technique: While Risk-Storming defines the collaborative technique itself, the risk storming process provides the specific facilitation steps and workflow that make these sessions effective:
- Without clear process: Sessions devolve into unfocused brainstorming or get dominated by the loudest voices
- With structured process: Ensures comprehensive risk coverage, democratic participation, and actionable outcomes
Three-Phase Process
The process consists of three distinct phases, each with specific objectives and facilitation techniques:
Phase 1: Individual Identification (Silent Brainstorming)
Activity: Participants individually and silently identify potential risks:
- Use sticky notes or digital collaboration tools
- Each person considers: “What could go wrong with this architectural approach?”
Why silent and individual?:
- Prevents groupthink
- Ensures quieter team members contribute their perspectives before discussion begins
Risk dimensions to consider:
- Technical failures: Service timeouts, data corruption
- Operational concerns: Deployment complexity, monitoring gaps, performance degradation
- Organizational challenges: Skill gaps, communication overhead, team dependencies
- Business impacts: Scalability limits, vendor lock-in, maintenance costs
Facilitation:
- Time limit: Typically 10-15 minutes
- Encourage participants to think broadly across categories rather than self-censoring early ideas
Phase 2: Consensus Building (Group Evaluation)
Activity: Team collectively reviews all identified risks, one by one
Discussion questions for each risk:
- Is this a genuine concern?
- How likely is it?
- What would the impact be if it occurred?
Goal: Validate risks and establish shared understanding, not solve them yet
Priority signals:
- Risks that multiple people independently identified receive particular attention
- Signals a broadly-recognized concern
Output:
- Facilitator helps group plot validated risks on a Risk-Matrix (probability vs. impact)
- Creates visual prioritization framework
- Low-probability, low-impact risks: Acknowledged and set aside
- High-probability or high-impact risks: Move forward to mitigation planning
Phase 3: Mitigation Planning (Risk Response Strategies)
Activity: For highest-priority risks identified in phase 2, develop specific mitigation strategies
Four response categories:
- Accept: Acknowledge the risk but take no action if probability and impact are sufficiently low
- Avoid: Change the architectural approach to eliminate the risk entirely
- Mitigate: Reduce either likelihood or impact through:
- Architectural guardrails
- Redundancy
- Monitoring
- Design changes
- Transfer: Shift risk through architectural decisions like:
- Vendor selection
- Insurance
- Service-level agreements
Documentation:
- Each high-priority risk receives a documented mitigation plan:
- Specific actions
- Owners
- Success criteria
- Mitigation plans often become part of Architecture-Decision-Records for the architectural decision being evaluated
Session Logistics:
- Duration: Typically 60-90 minutes for a significant architectural decision
- Facilitator role (critical):
- Maintaining time discipline
- Ensuring balanced participation
- Preventing premature solution-jumping in phases 1-2
- Driving toward concrete action items in phase 3
Why This Matters
A clear process transforms risk storming from a vague “let’s discuss risks” meeting into a structured discovery activity with measurable outputs. Teams that follow this process consistently catch risks that would otherwise surface only in production, when mitigation costs have increased by orders of magnitude. The process also builds shared ownership—because risks were collaboratively identified and mitigation was collectively designed, the entire team commits to monitoring and responding to risks as the system evolves.
Related Concepts
- Risk-Storming — The overall collaborative risk assessment technique
- Risk-Matrix — Visual tool used in phase 2 for prioritizing risks
- Risk-Assessment-Framework — Broader systematic framework for evaluating architectural risk
- Architecture-Decision-Records — Documentation practice that captures risk assessments and mitigation plans
- Architecturally-Significant-Decisions — The types of decisions that warrant risk storming
- Architectural-Governance — Risk storming process supports governance through systematic risk evaluation
- Trade-Offs-and-Least-Worst-Architecture — Process helps teams explicitly understand trade-offs and risks
Sources
- Richards, Mark and Neal Ford (2020). Fundamentals of Software Architecture: An Engineering Approach. O’Reilly Media. ISBN: 978-1-492-04345-4.
- Chapter 20: Analyzing Architecture Risk
- Available: https://www.oreilly.com/library/view/fundamentals-of-software/9781492043447/
Note
This content was drafted with assistance from AI tools for research, organization, and initial content generation. All final content has been reviewed, fact-checked, and edited by the author to ensure accuracy and alignment with the author’s intentions and perspective.