How the Frameworks Connect¶
Four frameworks. One platform. Each answers a different question for a different audience — and none works fully without the others.
The Four Frameworks at a Glance¶
| Framework | Core Question | Primary Audience | Character |
|---|---|---|---|
| BOLT | How do business and IT build together? | CIO · CTO · CFO · Business Leaders | Operating model — who owns what, at what tier |
| SCALE-OPS | How do we govern and operate the platform at scale? | Admin · CoE Lead · Platform Lead | Platform governance — 8 capabilities for running the platform |
| DIALOGE | What are the building blocks of a solution? | Solution Maker · Solution Engineer | Solution architecture — 7 pillars for building well |
| SHIELD | How do we protect the solution and platform? | CISO · Security Org | Security model — 6 pillars across the full security surface |
How They Relate — The Layered Model¶
Think of the four frameworks as concentric layers around a Power Platform solution:
BOLT is the outermost layer — defining the operating model. Who is building? At what tier of complexity? With what level of IT involvement? BOLT determines the delivery context before a single component is designed.
SCALE-OPS is the platform layer — the governed infrastructure that solutions run on. Environments, DLP policies, ALM pipelines, CoE tooling, and capacity management. SCALE-OPS creates the conditions that make BOLT possible.
DIALOGE is the solution layer — the seven building blocks that every solution is made of. Data, integration, AI, logic, operations, go-live, and experience. DIALOGE defines how to build well within the platform that SCALE-OPS operates.
SHIELD wraps around everything — the security model that protects the solution, the platform, and the data across all layers. SHIELD operates at every level simultaneously: identity (Sight), data (Harden), application (Inspect), compliance (Enforce), infrastructure (Lockdown), and threat response (Defend).
The Connection Map¶
BOLT ↔ DIALOGE (Solution Level)¶
BOLT defines who owns the solution and how it flows through the delivery tiers. DIALOGE defines what the solution is made of and how to build it well.
| BOLT Concept | DIALOGE Connection |
|---|---|
| Tier assignment (complexity) | DIALOGE maturity levels — higher tiers need higher maturity across pillars |
| Guardrail 5 — Platform-native at Tier 1–2 | DIALOGE Logic — which logic mechanisms are appropriate at each tier |
| Tier 3–4 architecture review | DIALOGE Data, Integration, Go-Live — the pillars reviewed at architecture assessment |
| Business team solution ownership | DIALOGE Operations — the operational model the owning team must maintain |
BOLT ↔ SCALE-OPS (Platform Level)¶
BOLT defines how business teams engage with the platform. SCALE-OPS defines how the platform is operated and governed for them.
| BOLT Concept | SCALE-OPS Connection |
|---|---|
| Dedicated workspaces per tier | SCALE-OPS Containment — environment strategy and isolation |
| Approved connector library | SCALE-OPS Containment — DLP policy management |
| Platform Team responsibilities | SCALE-OPS Stewardship — admin roles and governance model |
| Citizen developer enablement | SCALE-OPS Enablement — training, community, onboarding |
| CoE telemetry and monitoring | SCALE-OPS Operations — platform health and visibility |
BOLT ↔ SHIELD (Security Level)¶
BOLT's Trusted Enablement pillar (T) defines the security governance model for citizen development. SHIELD defines the detailed security controls that Trusted Enablement is built on.
| BOLT Concept | SHIELD Connection |
|---|---|
| Security pre-approvals | SHIELD Enforce — the evidence and process for maintaining pre-approvals |
| Connector approval process | SHIELD Inspect — the security review for new connectors |
| Data classification boundary | SHIELD Harden — the classification framework and DLP design |
| Tier 3–4 mandatory security sign-off | SHIELD Inspect — the full security review process |
| Platform accreditation | SHIELD Enforce + Lockdown — the controls that underpin accreditation |
DIALOGE ↔ SHIELD (Solution Security)¶
DIALOGE defines how to build. SHIELD defines how to build securely.
| DIALOGE Pillar | SHIELD Connection |
|---|---|
| D — Data (security model) | SHIELD Harden — data classification, RLS, CLS, encryption |
| I — Integration (connector governance) | SHIELD Inspect — connector review and approval |
| A — AI (AI governance) | SHIELD Harden — data sent to AI models; Enforce — AI audit trail |
| G — Go-Live (deployment gate) | SHIELD Inspect — the security review that fires before production |
| O — Operations (monitoring) | SHIELD Defend — security monitoring and incident response |
DIALOGE ↔ SCALE-OPS (Solution on Platform)¶
DIALOGE covers solution-level concerns. SCALE-OPS covers platform-level concerns. The boundary matters.
| Concern | DIALOGE Owns | SCALE-OPS Owns |
|---|---|---|
| ALM | Solution packaging, versioning, Git integration | Pipeline infrastructure, Build Tools setup |
| Monitoring | Application Insights, flow monitoring per solution | CoE toolkit, tenant monitoring, service health |
| Operations | Solution support model, incident management, retirement | Platform capacity, environment health, licence management |
| DLP | Solution compliance with DLP policy | DLP policy design, deployment, and enforcement |
SCALE-OPS ↔ SHIELD (Platform Security)¶
SCALE-OPS runs the platform. SHIELD secures it.
| Concern | SCALE-OPS Owns | SHIELD Owns |
|---|---|---|
| Environment strategy | Environment provisioning and lifecycle | Environment isolation and security boundary |
| DLP policies | Policy deployment and management | Policy security rationale and design |
| Admin access | Admin role assignment and operations | Least privilege, access reviews, PIM |
| Monitoring | Platform health and capacity | Threat detection and security anomalies |
| Business continuity | Disaster recovery and backup | Incident response and forensics |
The One-Sentence Summary¶
BOLT asks: Who owns this, and how does it get delivered? SCALE-OPS asks: How do we run the platform it runs on? DIALOGE asks: How do we build it well? SHIELD asks: How do we keep it secure?
A solution built well against DIALOGE, secured against SHIELD, deployed on a platform governed by SCALE-OPS, and delivered through a business-IT partnership defined by BOLT — that is what enterprise-grade Power Platform looks like.
Part of powerplatform.wiki Last updated: March 2026