Scaling
The platform works. Barely. And it's starting to crack.
You're probably here if...
- The platform works for the first five teams. Onboarding the sixth is when the cracks show.
- Teams interpret the golden paths differently. Drift is growing and nobody's tracking it.
- Security and compliance are still bolted on at the end, an audit exercise, not a built-in property.
- Cloud costs are rising. Nobody can tell you which team is responsible for which spend.
- You measure deployment frequency. You don't measure whether developers actually like using the platform.
- Shadow IT is back. Teams are building workarounds because the platform can't keep up with demand.
What Level 4 looks like
Here's what changes when you get there.
Developers work inside guardrails that protect them, not gates that block them. Security scanning, cost tagging, and compliance checks happen automatically. Nobody notices because nothing breaks.
The platform team runs a measured operation: roadmap, user research, platform SLOs. They know their developer NPS score and they have a plan to improve it.
Cloud spend is owned by teams, not absorbed centrally. Policy violations don't reach production. The platform is a documented competitive advantage, not a cost centre that nobody can explain.
The journey
The platform works. Now make it work at scale without it falling apart.
These are the capabilities to build. Each one moves you forward. None require a complete platform rewrite, so start where the pain is highest.
Policy as Code
Security, compliance, and operational policies expressed as code and enforced automatically at deployment time, not by a manual review that runs once a quarter.
Manual policy enforcement doesn't survive at scale. As teams multiply, the compliance gap grows faster than any team can review it. One public storage bucket, one container running as root, one missing cost tag, and you find out in an audit, not a pipeline.
List your top 10 policy requirements (no public buckets, non-root containers, required cost tags are a good start). Implement them as OPA or Kyverno policies in your Kubernetes admission chain or as Terraform validation rules. Roll out in warn mode first, enforce mode once teams have had time to fix violations.
FinOps & Cost Visibility
Every team can see the cloud costs their services generate and is accountable for managing them.
Invisible costs are unmanaged costs. When engineering teams can't see what they're spending, they have no reason to optimise. Finance absorbs the bill, engineers don't change their behaviour, and costs compound. FinOps moves cloud spend from a centralised mystery to a shared engineering responsibility.
Start with tagging: every resource tagged by team, service, and environment. Surface per-team cost dashboards in your IDP. Set budget alerts. Run monthly FinOps reviews. Make cloud cost part of service ownership, not an ops team problem.
Platform as Product
Running the platform team with a genuine product mindset: a public roadmap, regular conversations with developer teams, and a backlog prioritised by impact, not by whoever shouts loudest.
Platform teams that don't treat developers as customers build the wrong things. They optimise for what's technically interesting, not what removes actual friction. A product mindset forces the discipline of listening, prioritising, and shipping things that matter.
Set up quarterly planning. Publish a roadmap, even internally. Run monthly developer satisfaction surveys (the SPACE framework is a practical starting point). Hold regular office hours. Create a platform user group where developers can give feedback. Measure platform NPS and track it over time.
Developer Experience Metrics
Quantitative and qualitative measures of how developers actually experience the platform, used to prioritise improvements and prove that the work is making a difference.
Without measurement, the platform team is guessing. They think they're improving things; developers think nothing has changed. DX metrics give both sides shared facts to work from and give the platform team the evidence they need to justify their roadmap.
Implement DORA metrics: deployment frequency, lead time for changes, change failure rate, and MTTR. Add a developer satisfaction survey (quarterly, eNPS format). Instrument your IDP for feature usage. Review all metrics in your monthly platform retrospective, not just the engineering ones.
Supply Chain Security
Visibility and control over the software components, container images, and third-party dependencies flowing through your build and deployment pipelines.
At scale, your attack surface is no longer just your own code. SolarWinds and Log4Shell weren't bugs in first-party software. They were in dependencies that thousands of organisations trusted without scrutiny. Systematic supply chain security is now a baseline expectation, not an advanced practice.
Generate SBOMs for all production services. Implement container image signing and verification. Add dependency vulnerability scanning to all pipelines. Define a policy for acceptable vulnerability severity and enforce it as a deployment gate, not a weekly report nobody reads.
Europe's platform engineering consultancy
Want to move faster? That's what we're here for.
This roadmap is built from Zure's experience running platform engineering engagements across Europe. We know where teams get stuck because we've helped them get unstuck. If you want expert delivery alongside the roadmap, not instead of it, talk to us.