Roadmap

What's coming, and when?!

Your architecture assessment platform is constantly evolving. Here’s what’s coming next.


What’s Available Today

Cloud Platforms

  • Azure architecture assessments aligned with Microsoft Well-Architected Framework
  • Azure resource scanning and compliance monitoring
  • Drift detection and monitoring

AI-Powered Analysis

  • 34 specialized AI agents (Cloud Architect, Security, Cost Optimization, and more)
  • Real-time chat-based architecture consultations
  • Automated finding generation and remediation guidance

WAF Pillar Health Scoring

  • Per-pillar health scores (0-100) for Reliability, Security, Cost Optimization, Operational Excellence, and Performance Efficiency
  • Weighted scoring with logarithmic diminishing returns
  • Overall architecture health score with trend tracking
  • Drill-down from pillar scores to individual findings

Azure Health Checks & Governance

  • Resource health monitoring - real-time availability status for every Azure resource
  • Orphaned resource detection - find unattached disks, unused public IPs, and idle resources costing you money
  • Tag compliance auditing - ensure every resource has required tags for cost allocation and governance
  • Encryption & HTTPS enforcement checks - verify storage accounts, disks, App Services, and SQL databases
  • ARM limits & capacity planning - proactive alerts when approaching subscription limits for role assignments, resource groups, and policies
  • Storage security analysis - detect anonymous blob access, shared key access, public network exposure, and outdated TLS
  • Resource locks coverage - find critical resources without CanNotDelete or ReadOnly locks
  • CAF naming convention validation - check resource names against Cloud Adoption Framework naming patterns
  • Azure Service Health integration - surface active incidents, planned maintenance, and health advisories per subscription
  • Management Group hierarchy visualization - interactive tree with policy, RBAC, and subscription counts per node
  • Diagnostic settings audit - identify resources without logging or metrics across all resource types
  • Identity & RBAC audit - 18 security checks for over-privileged identities, orphaned roles, SP credential expiry, guest risks, and PIM eligibility
  • Network security & topology audit - NSG rule analysis, subnet IP capacity monitoring, private endpoint coverage gaps
  • Azure governance change tracking - policy and RBAC change audit trail with identity resolution and configurable time windows
  • Policy governance deep dive - orphaned policies, deprecated policy detection, DINE effect tracking, exemption expiry monitoring
  • Azure Landing Zone validation - compare deployed policies against ALZ archetype definitions with version drift detection
  • Configuration drift detection - compare deployed resources against IaC definitions (Bicep, Terraform, ARM, Pulumi) with severity classification

Compliance Framework Mapping

  • Azure Policy-to-framework mapping database linking policies to ISO 27001, NIS2, SOC 2, and GDPR controls
  • DB-backed control catalog with real control IDs, names, descriptions, and sections from authoritative framework definitions
  • Per-control and per-policy mapping queries with confidence levels (Verified, Inferred, Partial)
  • Mapping statistics and admin verification API endpoints
  • Replaces AI-inferred compliance mappings with deterministic, audit-ready relationships
  • Foundation for SOC 2, ISO 27001, and regional compliance assessment templates

Professional Reports & Exports

  • PDF assessment reports with tenant branding, cover pages, WAF scores, compliance mapping, and remediation guidance
  • PowerPoint exports with executive summary slides, WAF radar charts, top findings, and recommendations
  • AI-generated executive summaries for C-level stakeholders in any supported language
  • Secure assessment sharing via time-limited links for external stakeholders

Workflow Integrations

  • Jira integration - create issues from findings with severity-to-priority mapping and bidirectional status sync
  • ServiceNow integration - generate incidents and change requests from findings with custom field mapping
  • Webhook events for assessment completion, finding creation/resolution, and document generation with delivery log and retry

Collaboration

  • Comments and annotations on findings and assessments with threaded replies and @mention notifications
  • Finding assignment and ownership with due dates, bulk assignment, and “my assignments” view

Assessment Quality & Trust

High-confidence findings you can act on — every recommendation comes with evidence of why it matters and rigorous internal challenge before it reaches you.

  • Devil’s Advocate Reasoning — Before surfacing any High or Critical finding, agents must argue “why might this NOT be a genuine gap?” Findings that survive scrutiny are marked Confirmed; those that don’t are downgraded
  • Confidence Levels — Every finding carries a Confirmed / Likely / Possible confidence badge based on the quality of evidence (direct observation, strong inference, or hypothetical)
  • Source Attribution — Each finding identifies which agent detected it and which resources or documents it was derived from
  • 3-Pass Adversarial Review — After an assessment completes, three independent challenger passes (Security, Cost, Resilience) re-examine all findings in parallel. You see the challenge results and acknowledge them before the assessment is finalized
  • AI Output Quality Monitoring — Thumbs-up/down feedback on every AI response drives continuous quality tracking and improvement

Architecture Decision Records (ADRs)

  • Automatically generate MADR-format ADRs from High and Critical assessment findings via the ADR agent
  • Export individual ADRs as Markdown or download all as a ZIP bundle
  • ADRs stored alongside the assessment and linked to the originating finding

Tenant Shared Memory

The platform learns from every assessment you run.

  • Persistent Architecture Memory — Key patterns, recurring issues, and successful remediations are remembered across sessions and automatically injected as context into future assessments
  • Recurrence Tracking — When the same finding appears across multiple assessments, its recurrence count and confidence score increase automatically, surfacing your most persistent risks
  • Memory Dashboard — Browse, search, and manage your tenant’s architecture memory, with “Most Recurring” sorting to prioritize what needs attention

Resilient AI Workflows

Never lose progress on complex assessments.

  • Three-Level Failure Recovery — Automatic retries with accumulated context (inner loop), LLM-powered workflow adaptation (middle loop), and structural replanning (outer loop). Assessments always produce output, even when parts encounter errors
  • Transparent Gap Tracking — When an assessment can’t fully evaluate something (missing permissions, timeout, scope reduction), the gap is explicitly documented — not hidden. You’ll know exactly what was and wasn’t assessed
  • Resume from Checkpoint — Long-running assessments checkpoint progress. If something fails mid-assessment, resume from where you left off instead of starting over
  • Parallel Assessment Phases — Independent analysis phases (identity, network, compute, storage) run in parallel using a dependency graph, completing faster without sacrificing coverage

Multi-Language Support

  • Generate documents and executive summaries in English, German, French, and Dutch
  • Per-tenant language preference with per-document language override

Microsoft 365 Assessments

  • M365 Architect agent evaluating security, compliance, identity, and collaboration configurations
  • M365 Security Baseline questionnaire (26 questions across 6 categories)
  • M365 Governance questionnaire (15 questions across 6 categories)
  • 4-agent assessment pipeline: M365 Architect → Security & Compliance → Identity Governance → Remediation
  • Works independently of Azure subscriptions
  • Microsoft Graph data collector — connect your customer’s M365 tenant via Service Principal to collect Entra ID, Intune, Defender, and M365 service configuration data for AI-powered assessments
  • Credential validation with granted/missing permission detection
  • Snapshot-based collection history with 90-day retention

M365 Automated Security Scanning

Move beyond questionnaire-based assessments to automated, evidence-based validation against industry benchmarks.

  • CIS M365 Benchmark Compliance - 93 automated checks against CIS Microsoft 365 Foundations Benchmark v6.0.0 covering identity, data management, email security, applications, auditing, storage, and devices
  • CISA SCuBA Baseline Validation - 77 checks validating M365 configuration against CISA’s Secure Cloud Business Applications baseline across Entra ID, Exchange Online, Defender for Office 365, SharePoint, Teams, and Power Platform
  • Entra ID Security Config Analysis (EIDSCA) - 44 automated checks on Entra ID configuration covering authorization policies, conditional access, authentication methods, and admin consent
  • Community Security Checks - 71 community-driven checks across Conditional Access, Identity, Privileged Access, and Applications
  • M365 Security Trend Dashboard - Track your M365 security posture over time with per-framework compliance scores, trend charts, scan comparisons, and time-to-remediate metrics

Cloud Sovereignty & Digital Independence

  • Sovereignty assessment agent scoring workloads against EUCS, BSI C5, and SecNumCloud frameworks
  • Sovereignty readiness questionnaire capturing drivers, constraints, and three sovereignty dimensions
  • Cloud exit strategy planner with portability scoring, lock-in identification, and phased migration timelines
  • European provider knowledge base mapping Azure/AWS services to OVHcloud, Hetzner, IONOS, Scaleway, and more
  • Sovereignty compliance dashboard with jurisdiction risk indicators and trend tracking
  • Migration playbook generator for VMs, Kubernetes, databases, storage, identity, and monitoring workloads
  • Data flow and jurisdiction mapping with cross-border transfer discovery and Schrems II risk flagging
  • European compliance framework controls: EUCS, BSI C5, SecNumCloud, Gaia-X, TISAX, ENS

Zero Trust Assessment

  • Zero Trust Check Engine with 14 deterministic checks across Identity, Devices, Data, and Security Operations pillars
  • Per-pillar and overall Zero Trust posture score (0-100) with configurable pillar weights
  • Severity-weighted scoring with logarithmic diminishing returns
  • YAML-based check definitions for extensibility
  • Checks evaluate Microsoft Graph data snapshots collected via the M365 data collector
  • Zero Trust assessment workflow with dedicated agent pipeline
  • 3 AI agent tools for running checks, retrieving results, and listing definitions
  • Automatic conversion of ZT findings to tracked findings with WAF and compliance mapping
  • Zero Trust Dashboard with score cards, trend charts, and pillar drill-downs
  • Scheduled recurring assessments with trend analysis over time
  • AI-generated remediation playbooks with PowerShell scripts and rollback procedures
  • PDF/PPTX export with ZT-specific layouts and radar charts
  • Hybrid assessment combining Azure infrastructure + Zero Trust tenant checks

Identity & Security Scanning

Go beyond resource configuration — scan the identity plane where the most dangerous attacks originate. Informed by real-world offensive security techniques used by red teams.

  • Service Principal Credential Audit - Detect expired credentials, approaching expiry, and credential sprawl across Entra ID
  • Privileged Service Principal Detection - Identify SPs with dangerous Graph API permissions using 4-tier criticality classification
  • Federated Identity Credential Audit - Detect unauthorized trust relationships on managed identities including GitHub Actions federation
  • Application Registration Security - Find rogue app registrations, credential injection patterns, external owners, and multi-tenant exposure
  • Managed Identity Permission Audit - Check MIs for over-privileged RBAC roles and unusual Graph API permissions
  • Key Vault Security Posture - 8 hardening checks: soft-delete, purge protection, RBAC mode, network access, private endpoints
  • Public Resource Exposure - Audit 12+ Azure resource types for public endpoint exposure
  • Diagnostic Settings Integrity - Detect stealth log tampering (logs disabled but metrics enabled)
  • Guest User Risk Detection - Privileged guest accounts and stale guest users
  • SP Credential Expiry Tracking - Service principal credential lifecycle monitoring

Collaboration & Security

  • Multi-tenant workspaces with role-based access
  • GitHub document synchronization
  • Audit logging and GDPR compliance
  • SSO via Microsoft Entra ID

Visual Architecture Design

Design your architecture visually and let AI validate and generate code from your diagrams.

  • Interactive Diagram Editor - Drag-and-drop Azure services onto a Cytoscape-powered canvas to design your architecture visually. Create nodes, connect them with labeled edges, and organize resources into clusters (VNets, subnets, resource groups). Features grid snapping, auto-layout, zoom/pan, and real-time spec synchronization
  • AI Architecture Critic - Get a second opinion on your visual designs with adversarial AI validation. The Design Critic agent analyzes diagrams for security gaps, reliability concerns, cost inefficiencies, and WAF alignment issues with actionable recommendations
  • One-Click Auto-Fix - Automatically remediate identified issues with a single click. The Auto-Fix agent proposes spec changes that resolve findings, explaining each modification before you apply it
  • Diagram Export - Export your visual architectures to PNG or SVG format for documentation and presentations
  • Available on Team plans (€499/month) and above

AVM-First Infrastructure as Code

Generated Bicep and Terraform always starts with official, community-backed modules.

  • Azure Verified Modules (AVM) — All IaC generation prioritizes AVM registry modules (br/public:avm/res/...) before falling back to raw resource definitions. 45 modules catalogued across Compute, Storage, Networking, Database, Identity, Security, and more
  • AI Provenance in Exports — Every generated IaC file, PDF, ADR, SVG, and ZIP export carries machine-readable AI provenance metadata (header comments, XMP, frontmatter), satisfying EU AI Act Art. 50 transparency requirements for automated artifact traceability

Governance Constraint Discovery

Understand the guardrails in place before generating or deploying any code.

  • Azure Policy Constraint Analysis — Discover active governance constraints (allowed locations, allowed SKUs, required tags, naming patterns, network isolation, encryption requirements, deny policies) directly from your Azure Policy configuration
  • Constraint-Aware Generation — IaC Engineer and Architecture Review agents check discovered constraints before generating recommendations, ensuring output complies with your organizational guardrails out of the box

AI Transparency & EU AI Act Compliance

PAA is fully compliant with EU AI Act transparency obligations. Every interaction with AI is clearly identified, every AI-generated output is labeled, and customers have formal channels to report concerns.

  • AI Interaction Disclosure — Clear banners on all AI-powered screens inform users they are interacting with an AI system, before the first interaction
  • AI-Generated Content Labels — Visual badges on every chat message, assessment finding, generated IaC file, and exported document clearly mark AI-generated content
  • Machine-Readable AI Provenance — Exported artifacts (IaC, PDF, ADR, SVG, ZIP) carry machine-readable provenance metadata parseable by standard tools — satisfying Art. 50 beyond visual-only labeling
  • Customer AI Incident Reporting — In-app “Report AI Issue” button with structured intake, severity classification (Critical → 24h response, High → 72h), and full audit trail
  • AI Help Documentation — Dedicated help resources explaining AI capabilities, limitations, and appropriate use for every agent in the platform
  • AI Literacy Program — Formal literacy materials for internal staff and customers (EU AI Act Art. 4 + Art. 25)

Subscription Tiers

  • Free, Team, Business, and Enterprise plans
  • MSP Partner program for managed service providers
  • Fractional Architect tier with human expert consultations
  • Token overage pricing - Never be cut off; pay €0.024/1K tokens for usage beyond your monthly limit

Usage Dashboard

  • AI token usage tracking - See your current token consumption, % of monthly limit, and input/output breakdown in real time
  • Daily usage trend charts - Visualise token consumption and estimated cost over 7, 30, or 90-day windows
  • 80% usage warnings - In-app alerts when approaching your monthly token allocation
  • Budget visibility - Projected end-of-period spend and budget status at a glance
  • Available from Settings → Usage (Team plan and above)

Specialized Architects

Purpose-built AI agents for deep technical domains beyond general cloud architecture.

  • Security Architect - Deep-dive security assessments with OWASP, NIST, and CIS benchmark analysis, threat modeling, and security posture scoring
  • Kubernetes Architect - AKS/EKS/GKE architecture reviews, pod security policies, service mesh assessment, and container hardening guidance
  • Data Platform Architect - Data lakehouse, ETL/ELT pipelines, governance frameworks, and ML platform architecture assessment
  • Disaster Recovery Planner - DR/BC strategy development, RTO/RPO analysis, failover architecture design, and recovery playbook generation

Guided Onboarding

Get up and running quickly with a personalized onboarding experience tailored to your role and subscription tier.

  • Multi-step wizard - Step-by-step guidance through workspace setup, Azure connection, team invitations, and feature discovery
  • Role-based paths - Owners get workspace configuration, admins get team management, members get feature tours
  • Tier-aware features - See features relevant to your subscription tier (Business+ sees Azure integration, MSP sees client management)
  • Progress tracking - Resume where you left off, skip optional steps, and see your completion percentage
  • Dashboard integration - Continue onboarding from the dashboard or dismiss and explore on your own

Now Building

Billing & Usage Transparency

FeatureDescription
Overage BillingAutomatic invoicing for token usage beyond your monthly limit at €0.024/1K tokens
80% Usage AlertsEmail notifications when you reach 80% of your monthly token allocation
Budget ControlsOptional hard cap setting to prevent overage charges

On the Horizon

AWS & Multi-Cloud Support

Extend your architecture governance across all your clouds.

FeatureDescription
AWS Cloud ArchitectAssessments aligned with AWS Well-Architected Framework
AWS Resource ScanningAutomated discovery and analysis of your AWS infrastructure
AWS Assessment TemplatesPre-built questionnaires for common AWS architectures

Smart Automation

Let the platform do the heavy lifting with intelligent automation features.

FeatureDescription
Requirements AutopilotDescribe what you need in plain language and get a structured architecture proposal to review
Compliance Auto-DetectionAutomatically detect which compliance frameworks apply based on your resources and regions
IaC ValidationGenerated code is validated against live provider schemas before you deploy

Zero Trust Assessment — Expanding

The Phase 1 Zero Trust Check Engine is live with scheduling, trend analysis, AI remediation, and hybrid assessments. We’re now expanding the check library.

FeatureDescription
415+ Deterministic Security ChecksExpanding from 14 Phase 1 checks to 415+ across all 7 Zero Trust pillars (adding Network, Infrastructure, and DevSecOps) queried directly from Microsoft Graph API
Radar Chart VisualizationInteractive in-app radar chart showing per-pillar Zero Trust scores with drill-down to individual findings

M365 Automated Scanning — Coming Soon

CIS, SCuBA, EIDSCA, and Community security checks (285 total) are live. The following are coming next:

FeatureDescription
Automated Scheduled ScansRun M365 security scans on a schedule (daily, weekly, monthly) with alerts on new failures or score regression
Unified Compliance ViewM365 security findings mapped to ISO 27001, NIS2, GDPR, and SOC 2 alongside your Azure infrastructure compliance

GRC Module (Governance, Risk & Compliance)

Transform PAA from a technical assessment platform into a complete GRC solution. Bridge the gap between automated security scanning and organizational governance, inspired by open-source GRC leaders like Eramba and CISO Assistant.

FeatureDescription
Risk RegisterDocument, assess, and track organizational risks with configurable 5×5 risk matrices, likelihood/impact scoring, and treatment workflows (Accept, Mitigate, Transfer, Avoid)
AI-Powered Risk IdentificationAutomatically identify and categorize risks from assessment findings using AI agents, with suggested risk ratings and treatment recommendations
Policy Lifecycle ManagementCreate, version, approve, and publish policies with full audit trail. Track employee acknowledgments and schedule automated review reminders
Control Testing & EvidenceSchedule control testing cycles, record effectiveness scores, and collect evidence attachments for audit readiness
Internal Audit ManagementPlan audit programs, execute fieldwork, track findings with CAPA workflows, and monitor remediation to closure
Vendor Risk Management (TPRM)Maintain a vendor registry with risk tiering, conduct security assessments using standardized questionnaires, track contract renewals and compliance certifications
Incident TrackingDocument security incidents with structured timelines, root cause analysis, lessons learned, and link to failed controls for continuous improvement
Exception ManagementFormal exception request and approval workflows with expiry dates, compensating control documentation, and renewal tracking
GRC Executive DashboardUnified view across all GRC modules: risk heatmap, policy compliance, control effectiveness, open audit findings, and exception status

Combines process-oriented GRC (like Eramba) with automated technical compliance (PAA’s unique strength) — no other platform offers both.


Additional Workflow Integrations

Bring findings into even more tools and processes.

FeatureDescription
Terraform CloudAnalyze your IaC state for drift and architecture compliance

Enterprise AI Options

Choose the AI provider that meets your security and compliance requirements.

FeatureDescription
Azure OpenAI ServiceUse your own Azure OpenAI deployment for data sovereignty
Additional ProvidersSupport for Mistral AI and other leading models
Local AI OptionRun assessments with self-hosted models for maximum privacy


Future Plans

Expanded Cloud Coverage

FeatureDescription
Google Cloud PlatformGCP Architecture Framework assessments
Vendor Dependency AnalysisDeep supply chain analysis mapping sub-processors and CLOUD Act exposure across your cloud stack
Sovereign Architecture TemplatesPre-built reference architectures for European providers and hybrid on-premises configurations

Enterprise Features

FeatureDescription
Universal SSOSAML and OIDC support for any identity provider
White-LabelCustom branding for MSP partners
Public APIBuild custom integrations with our documented API
Compliance TemplatesSOC 2, ISO 27001, and regional framework assessment templates (built on the policy-to-framework mapping database)

Global Platform

FeatureDescription
Localized InterfacePlatform UI in multiple languages
Regional ComplianceTemplates for GDPR, NIS2, BSI C5, and more
Data ResidencyChoose where your data is stored

How We Prioritize

Our roadmap is driven by customer feedback. We prioritize features based on:

  • Customer demand - What you tell us you need most
  • Market reach - Features that benefit the most users
  • Strategic value - Capabilities that differentiate PAA
  • Technical foundation - Building blocks for future innovation

Share Your Feedback

Your input shapes our roadmap. Tell us what features matter most to you:

  • Email: [email protected]
  • In-app feedback: Use the feedback button in the platform
  • Customer success: Talk to your account manager

Feature Requests

Have an idea that’s not on our roadmap? We’d love to hear it. Submit feature requests through our feedback portal and vote on ideas from other customers.


Roadmap Updates

This roadmap is updated quarterly. Last update: March, 2026

Note: This roadmap represents our current plans and is subject to change. Features and timelines may be adjusted based on customer feedback, technical considerations, and market conditions. Items listed do not represent commitments or guarantees.


Building the future of architecture assessment, together.