Running TEA for Enterprise Projects
Running TEA for Enterprise Projects
Section titled “Running TEA for Enterprise Projects”Use TEA on enterprise projects with compliance, security, audit, and regulatory requirements. This guide covers NFR assessment, audit trails, and evidence collection.
When to Use This
Section titled “When to Use This”- Enterprise track projects (not Quick Flow or simple BMad Method)
- Compliance requirements (SOC 2, HIPAA, GDPR, etc.)
- Security-critical applications (finance, healthcare, government)
- Audit trail requirements
- Strict NFR thresholds (performance, security, reliability)
Prerequisites
Section titled “Prerequisites”- BMad Method installed (Enterprise track selected)
- TEA agent available
- Compliance requirements documented
- Stakeholders identified (who approves gates)
Enterprise-Specific TEA Workflows
Section titled “Enterprise-Specific TEA Workflows”NFR Assessment (nfr-assess)
Section titled “NFR Assessment (nfr-assess)”Purpose: Validate non-functional requirements with evidence.
When: Phase 2 (early) and Release Gate
Why Enterprise Needs This:
- Compliance mandates specific thresholds
- Audit trails required for certification
- Security requirements are non-negotiable
- Performance SLAs are contractual
Example:
nfr-assess
Categories: Security, Performance, Reliability, Maintainability
Security thresholds:- Zero critical vulnerabilities (required by SOC 2)- All endpoints require authentication- Data encrypted at rest (FIPS 140-2)- Audit logging on all data access
Evidence:- Security scan: reports/nessus-scan.pdf- Penetration test: reports/pentest-2026-01.pdf- Compliance audit: reports/soc2-evidence.zipOutput: NFR assessment with PASS/CONCERNS/FAIL for each category.
Trace with Audit Evidence (trace)
Section titled “Trace with Audit Evidence (trace)”Purpose: Requirements traceability with audit trail.
When: Phase 2 (baseline), Phase 4 (refresh), Release Gate
Why Enterprise Needs This:
- Auditors require requirements-to-test mapping
- Compliance certifications need traceability
- Regulatory bodies want evidence
Example:
trace Phase 1
Requirements: PRD.md (with compliance requirements)Test location: tests/
Output: traceability-matrix.md with:- Requirement-to-test mapping- Compliance requirement coverage- Gap prioritization- RecommendationsFor Release Gate:
trace Phase 2
Generate gate-decision-{gate_type}-{story_id}.md with:- Evidence references- Approver signatures- Compliance checklist- Decision rationaleTest Design with Compliance Focus (test-design)
Section titled “Test Design with Compliance Focus (test-design)”Purpose: Risk assessment with compliance and security focus.
When: Phase 3 (system-level), Phase 4 (epic-level)
Why Enterprise Needs This:
- Security architecture alignment required
- Compliance requirements must be testable
- Performance requirements are contractual
Example:
test-design
Mode: System-level
Focus areas:- Security architecture (authentication, authorization, encryption)- Performance requirements (SLA: P99 <200ms)- Compliance (HIPAA PHI handling, audit logging)
Output: TWO documents (system-level):- `test-design-architecture.md`: Security gaps, compliance requirements, performance SLOs for Architecture team- `test-design-qa.md`: Security testing strategy, compliance test mapping, performance testing plan for QA team- Audit logging validationEnterprise TEA Lifecycle
Section titled “Enterprise TEA Lifecycle”Phase 1: Discovery (Optional but Recommended)
Section titled “Phase 1: Discovery (Optional but Recommended)”Research compliance requirements:
Analyst: research
Topics:- Industry compliance (SOC 2, HIPAA, GDPR)- Security standards (OWASP Top 10)- Performance benchmarks (industry P99)Phase 2: Planning (Required)
Section titled “Phase 2: Planning (Required)”1. Define NFRs early:
PM: prd
Include in PRD:- Security requirements (authentication, encryption)- Performance SLAs (response time, throughput)- Reliability targets (uptime, RTO, RPO)- Compliance mandates (data retention, audit logs)2. Assess NFRs:
TEA: nfr-assess
Categories: All (Security, Performance, Reliability, Maintainability)
Output: nfr-assessment.md- NFR requirements documented- Acceptance criteria defined- Test strategy planned3. Baseline (brownfield only):
TEA: trace Phase 1
Establish baseline coverage before new workPhase 3: Solutioning (Required)
Section titled “Phase 3: Solutioning (Required)”1. Architecture with testability review:
Architect: architecture
TEA: test-design (system-level)
Focus:- Security architecture testability- Performance testing strategy- Compliance requirement mapping2. Test infrastructure:
TEA: framework
Requirements:- Separate test environments (dev, staging, prod-mirror)- Secure test data handling (PHI, PII)- Audit logging in tests3. CI/CD with compliance:
TEA: ci
Requirements:- Secrets management (Vault, AWS Secrets Manager)- Test isolation (no cross-contamination)- Artifact retention (compliance audit trail)- Access controls (who can run production tests)Phase 4: Implementation (Required)
Section titled “Phase 4: Implementation (Required)”Per epic:
1. TEA: test-design (epic-level) Focus: Compliance, security, performance for THIS epic
2. TEA: atdd (optional) Generate tests including security/compliance scenarios
3. DEV: Implement story
4. TEA: automate Expand coverage including compliance edge cases
5. TEA: test-review Audit quality (score >80 per epic, rises to >85 at release)
6. TEA: trace Phase 1 Refresh coverage, verify compliance requirements testedRelease Gate (Required)
Section titled “Release Gate (Required)”1. Final NFR assessment:
TEA: nfr-assess
All categories (if not done earlier)Latest evidence (performance tests, security scans)2. Final quality audit:
TEA: test-review tests/
Full suite reviewQuality target: >85 for enterprise3. Gate decision:
TEA: trace Phase 2
Evidence required:- traceability-matrix.md (from Phase 1)- test-review.md (from quality audit)- nfr-assessment.md (from NFR assessment)- Test execution results (must have test results available)
Decision: PASS/CONCERNS/FAIL/WAIVED
Archive all artifacts for compliance auditNote: Phase 2 requires test execution results. If results aren’t available, Phase 2 will be skipped.
4. Archive for audit:
Archive:- All test results- Coverage reports- NFR assessments- Gate decisions- Approver signatures
Retention: Per compliance requirements (7 years for HIPAA)Enterprise-Specific Requirements
Section titled “Enterprise-Specific Requirements”Evidence Collection
Section titled “Evidence Collection”Required artifacts:
- Requirements traceability matrix
- Test execution results (with timestamps)
- NFR assessment reports
- Security scan results
- Performance test results
- Gate decision records
- Approver signatures
Storage:
compliance/├── 2026-Q1/│ ├── release-1.2.0/│ │ ├── traceability-matrix.md│ │ ├── test-review.md│ │ ├── nfr-assessment.md│ │ ├── gate-decision-release-v1.2.0.md│ │ ├── test-results/│ │ ├── security-scans/│ │ └── approvals.pdfRetention: 7 years (HIPAA), 3 years (SOC 2), per your compliance needs
Approver Workflows
Section titled “Approver Workflows”Multi-level approval required:
## Gate Approvals Required
### Technical Approval- [ ] QA Lead - Test coverage adequate- [ ] Tech Lead - Technical quality acceptable- [ ] Security Lead - Security requirements met
### Business Approval- [ ] Product Manager - Business requirements met- [ ] Compliance Officer - Regulatory requirements met
### Executive Approval (for major releases)- [ ] VP Engineering - Overall quality acceptable- [ ] CTO - Architecture approved for productionCompliance Checklists
Section titled “Compliance Checklists”SOC 2 Example:
## SOC 2 Compliance Checklist
### Access Controls- [ ] All API endpoints require authentication- [ ] Authorization tested for all protected resources- [ ] Session management secure (token expiration tested)
### Audit Logging- [ ] All data access logged- [ ] Logs immutable (append-only)- [ ] Log retention policy enforced
### Data Protection- [ ] Data encrypted at rest (tested)- [ ] Data encrypted in transit (HTTPS enforced)- [ ] PII handling compliant (masking tested)
### Testing Evidence- [ ] Test coverage >80% (verified)- [ ] Security tests passing (100%)- [ ] Traceability matrix completeHIPAA Example:
## HIPAA Compliance Checklist
### PHI Protection- [ ] PHI encrypted at rest (AES-256)- [ ] PHI encrypted in transit (TLS 1.3)- [ ] PHI access logged (audit trail)
### Access Controls- [ ] Role-based access control (RBAC tested)- [ ] Minimum necessary access (tested)- [ ] Authentication strong (MFA tested)
### Breach Notification- [ ] Breach detection tested- [ ] Notification workflow tested- [ ] Incident response plan testedEnterprise Tips
Section titled “Enterprise Tips”Start with Security
Section titled “Start with Security”Priority 1: Security requirements
1. Document all security requirements2. Generate security tests with `atdd`3. Run security test suite4. Pass security audit BEFORE moving forwardWhy: Security failures block everything in enterprise.
Example: RBAC Testing
Vanilla Playwright:
test('should enforce role-based access', async ({ request }) => { // Login as regular user const userResp = await request.post('/api/auth/login', { data: { email: 'user@example.com', password: 'pass' } }); const { token: userToken } = await userResp.json();
// Try to access admin endpoint const adminResp = await request.get('/api/admin/users', { headers: { Authorization: `Bearer ${userToken}` } });
expect(adminResp.status()).toBe(403); // Forbidden});With Playwright Utils (Cleaner, Reusable):
import { test as base, expect } from '@playwright/test';import { test as apiRequestFixture } from '@seontechnologies/playwright-utils/api-request/fixtures';import { createAuthFixtures } from '@seontechnologies/playwright-utils/auth-session';import { mergeTests } from '@playwright/test';
const authFixtureTest = base.extend(createAuthFixtures());export const testWithAuth = mergeTests(apiRequestFixture, authFixtureTest);
testWithAuth('should enforce role-based access', async ({ apiRequest, authToken }) => { // Auth token from fixture (configured for 'user' role) const { status } = await apiRequest({ method: 'GET', path: '/api/admin/users', // Admin endpoint headers: { Authorization: `Bearer ${authToken}` } });
expect(status).toBe(403); // Regular user denied});
testWithAuth('admin can access admin endpoint', async ({ apiRequest, authToken, authOptions }) => { // Override to admin role authOptions.userIdentifier = 'admin';
const { status, body } = await apiRequest({ method: 'GET', path: '/api/admin/users', headers: { Authorization: `Bearer ${authToken}` } });
expect(status).toBe(200); // Admin allowed expect(body).toBeInstanceOf(Array);});Note: Auth-session requires provider setup in global-setup.ts. See auth-session configuration.
Playwright Utils Benefits for Compliance:
- Multi-user auth testing (regular, admin, etc.)
- Token persistence (faster test execution)
- Consistent auth patterns (audit trail)
- Automatic cleanup
Set Higher Quality Thresholds
Section titled “Set Higher Quality Thresholds”Enterprise quality targets:
- Test coverage: >85% (vs 80% for non-enterprise)
- Quality score: >85 (vs 75 for non-enterprise)
- P0 coverage: 100% (non-negotiable)
- P1 coverage: >95% (vs 90% for non-enterprise)
Rationale: Enterprise systems affect more users, higher stakes.
Document Everything
Section titled “Document Everything”Auditors need:
- Why decisions were made (rationale)
- Who approved (signatures)
- When (timestamps)
- What evidence (test results, scan reports)
Use TEA’s structured outputs:
- Reports have timestamps
- Decisions have rationale
- Evidence is referenced
- Audit trail is automatic
Budget for Compliance Testing
Section titled “Budget for Compliance Testing”Enterprise testing costs more:
- Penetration testing: $10k-50k
- Security audits: $5k-20k
- Performance testing tools: $500-5k/month
- Compliance consulting: $200-500/hour
Plan accordingly:
- Budget in project cost
- Schedule early (3+ months for SOC 2)
- Don’t skip (non-negotiable for compliance)
Use External Validators
Section titled “Use External Validators”Don’t self-certify:
- Penetration testing: Hire external firm
- Security audits: Independent auditor
- Compliance: Certification body
- Performance: Load testing service
TEA’s role: Prepare for external validation, don’t replace it.
Related Guides
Section titled “Related Guides”Workflow Guides:
- How to Run NFR Assessment - Deep dive on NFRs
- How to Run Trace - Gate decisions with evidence
- How to Run Test Review - Quality audits
- How to Run Test Design - Compliance-focused planning
Use-Case Guides:
- Using TEA with Existing Tests - Brownfield patterns
Customization:
- Integrate Playwright Utils - Production-ready utilities
Understanding the Concepts
Section titled “Understanding the Concepts”- Engagement Models - Enterprise model explained
- Risk-Based Testing - Probability × impact scoring
- Test Quality Standards - Enterprise quality thresholds
- TEA Overview - Complete TEA lifecycle
Reference
Section titled “Reference”- TEA Command Reference - All 8 workflows
- TEA Configuration - Enterprise config options
- Knowledge Base Index - Testing patterns
- Glossary - TEA terminology
Generated with BMad Method - TEA (Test Architect)