Skip to main content

What do you think of this service? Your feedback will help us to improve it.

Author: Local Digital

Last updated: 2025-05-07

Create an architecture map: step by step

A guide to completing an architecture diagram for the CAF for local government.

Use the information gathered in your architecture mapping workbook (.xlsx, 113KB) to create diagrams that accurately represent your council’s critical system architecture.

We recommend you map up to three critical systems. You might want to create a separate diagram for each system – these can be easier to produce and understand than one larger diagram.

Architecture diagrams should include all physical sites and cloud infrastructure needed for a critical system to function.

Your independent assurer needs to have visibility of all systems that make up each critical system to establish what is in scope, what has been excluded and your justification.

This step by step guide shows one way to create an architecture map. You can also see a worked example in the example architecture mapping workbook (.xlsx, 744KB).

1. Choose a tool to create your map

Identify a tool to produce your architecture diagrams that meets your council’s security requirements. You might already have an approved tool that you use. For example Microsoft Visio, draw.io or Lucidchart.

Make sure you choose a format that can be easily read by and shared with an independent assurer.

2. Create a new file

Create a new file and make sure you store it in a secure location.

Find out more about storing information securely.

3. Add your sites

For each architecture map of your critical system, think about the high-level infrastructure areas.

Include all physical and cloud sites that host the infrastructure and systems needed for your critical system.

Example:
NE Council has two physical sites and an Azure Cloud environment.
This diagram displays the two sites plus connectivity to Azure over the internet.

4. Add your site connections

Think about how your sites are connected. Consider any firewalls.

Example:
NE Council has an MPLS connection between the two sites, and connectivity to Azure via the internet.
All access from any organisation passes through a firewall by default, so these have been added. The firewalls may be the same physically, but are shown logically to demonstrate the connectivity.

5. Add zones, networks or network segmentations

Think about the zones, VLANS, networks or network segmentations you have in place at each site.

Example:
Site 1 at NE Council has a DMZ and corporate LAN for external access, which is supported by the corporate firewall.
Site 2 has a walled garden and corporate LAN and access is controlled by a separate, dedicated firewall.
Azure has a single network.
The networks have been added to each site in this diagram. The corporate firewall supports the LAN and DMZ networks. It also shows that this council has a walled garden, and access is controlled by a separate dedicated firewall.

6. Add systems in place in each zone or network

Next, add any systems you have in place in each zone or network that support your critical system.

Example:
NE Council’s critical application servers are located in the corporate LAN at both sites.
Site 1 has a Netscaler in the DMZ.
Site 2 has database (DB) servers in the walled garden.
Internal users access the critical systems directly. External users access the systems via the Netscaler and Citrix.
This diagram includes the application and Citrix servers. Internal users access critical systems directly whereas remote users access the systems via the Netscaler and Citrix.

7. Add dependencies and infrastructure

Review where dependencies and infrastructure are located and add them to your diagram.

Example:
NE Council has on-premise active directory (AD) servers with Azure AD in the cloud. SFTP servers in the walled garden transfer files for backup to Azure. All servers are virtualised on VMware ESX at both sites. External users connect via VPN using the IPSEC protocol.
In this diagram, the key dependencies have been added and the route of the SFTP server traffic has been marked with a bold line. VMware ESX has been added at both sites.

8. Indicate systems your council has excluded

Clearly indicate on the map anything your council has excluded from your scope. Choose something that is easy for your independent assurer to understand. You could:

  • mark a boundary around the system
  • colour code your systems
  • grey out the areas that are out of scope

Annotate your map with any security implications of the cloud or commercial (third-party) systems that you plan to exclude.

In your workbook, explain why you have excluded a system.

Anything not marked as excluded will be considered as part of your CAF assessment.
In this diagram, an excluded system labelled 'third-party support' has been added. A different colour has been used to make it clear this is not in scope.

9. Annotate your diagram

Include a commentary to help your independent assurer to understand your architecture. This might include:

  • a description of the sites
  • number of users
  • important information about commercial (third-party) service providers
  • description of components – for example, active directory, data stores

Include a key or legend to explain how you have indicated important components and characteristics. For example, you might use different colours to highlight:

  • legacy systems
  • security information and event management (SIEM)
  • end user devices
  • data stores
  • network segmentation
  • parts of the architecture that are in scope or out scope of the CAF
This diagram has been annotated with a key and an explanation to give context to the independent assurer.

10. Anonymise your architecture map

These should be high level designs. Before you share these with an assurer, remove or anonymise sensitive information. This includes:

  • IP addresses and subnets
  • host names and FQDNs
  • credentials
  • port numbers
  • detailed configuration
  • virtual LAN IDs

11. Save your diagram in a shareable format

Save your diagram as a PDF, PNG or format that will be legible to your independent assurer.

Embed the diagram in your architecture mapping workbook, or upload the file to the same secure folder as your workbook ready to share with your assurer.

Repeat these steps for each critical system your council has decided is in scope.

Downloads

Download a worked example of an architecture map (.xlsx, 744KB)

Contact the CAF for local government team

Email us to ask a question or share feedback.

Sign up to UK Government Security

Subscribe to our newsletters to receive notifications when changes to strategy, policy, standards, and guidance are published on the website.

Sign up now