Project Taxonomy

Project Taxonomy

This document defines the 25 project Kinds organized into 5 tiers.

Each Kind represents a category of project that can be cataloged in Backstage. The taxonomy is used by the ASSESS issue type to classify projects and generate catalog-info.yaml files.

Version

Quick Reference

All 24 Kinds at a glance:

ID Key Name Tier Backstage Type
1 infrastructure Infrastructure (IaC) foundation resource
2 identity-access Identity & Access (IAM) foundation resource
3 config-policy Config & Policy foundation resource
4 monorepo-meta Monorepo / Meta foundation system
5 design-system Design Systems standards library
6 software-library Software Libraries standards library
7 proto-sdk Proto / SDK standards api
8 blueprint Blueprints standards template
9 security-tooling Security Tooling standards tool
10 compliance-audit Compliance / Audit standards documentation
11 ml-model ML / Models engines service
12 data-etl Data / ETL engines service
13 microservice Microservices engines service
14 api-gateway APIs / Gateways engines api
15 ui-frontend UIs / Frontends engines website
16 internal-tool Internal Tooling engines service
17 build-tool Build Tools ecosystem tool
18 e2e-test E2E Test Suites ecosystem tool
19 docs-site Docs Sites ecosystem website
20 playbook Internal Playbooks ecosystem documentation
21 cli-devtool CLIs / Developer Tools ecosystem tool
22 reference-example Reference / Example noncurrent documentation
23 experiment-sandbox Experiment / Sandbox noncurrent service
24 archival-fork Archival / Forks noncurrent library
25 test-data-fixtures Test Data / Fixtures noncurrent resource

Tier: Foundation (Kinds 1-4)

Infrastructure and platform foundations

ID Key Name Stakeholder Output
1 infrastructure Infrastructure (IaC) Platform/DevOps Cloud Environment
2 identity-access Identity & Access (IAM) SDET/SecOps Permissions/Tokens
3 config-policy Config & Policy Platform/DevOps Runtime Behavior
4 monorepo-meta Monorepo / Meta Architect/Lead Project Standards

1 - Infrastructure (IaC)

Cloud resources and network (Terraform/CDK)

Detection File Patterns:

2 - Identity & Access (IAM)

Service accounts, secrets, and RBAC policies

Detection File Patterns:

3 - Config & Policy

Global feature flags and environment manifests

Detection File Patterns:

4 - Monorepo / Meta

Orchestration for projects and root standards

Detection File Patterns:

Tier: Standards (Kinds 5-10)

Shared components and specifications

ID Key Name Stakeholder Output
5 design-system Design Systems Product/UX Component Libraries
6 software-library Software Libraries Engineering Versioned Packages
7 proto-sdk Proto / SDK Engineering Contract Libraries
8 blueprint Blueprints Architect/Lead Project Templates
9 security-tooling Security Tooling SDET/SecOps Security Reports
10 compliance-audit Compliance / Audit SDET/SecOps Compliance Proofs

5 - Design Systems

Reusable UI components and brand tokens

Detection File Patterns:

6 - Software Libraries

Reusable internal logic packages (Shared Utils)

Detection File Patterns:

7 - Proto / SDK

API contracts and generated client libraries

Detection File Patterns:

8 - Blueprints

Scaffolding templates for bootstrapping repos

Detection File Patterns:

9 - Security Tooling

Custom scanners, audit scripts, and honeytokens

Detection File Patterns:

10 - Compliance / Audit

Evidence, snapshots, and regulatory reports

Detection File Patterns:

Tier: Engines (Kinds 11-16)

Core business logic and services

ID Key Name Stakeholder Output
11 ml-model ML / Models Data/ML Model Artifacts
12 data-etl Data / ETL Data/ML Clean Datasets
13 microservice Microservices Engineering Running Binaries
14 api-gateway APIs / Gateways Engineering Network Endpoints
15 ui-frontend UIs / Frontends Engineering Web/Mobile Assets
16 internal-tool Internal Tooling Engineering Operational Apps

11 - ML / Models

Training scripts and model weight artifacts

Detection File Patterns:

12 - Data / ETL

Data transformation logic and SQL models

Detection File Patterns:

13 - Microservices

Backend business logic and domain units

Detection File Patterns:

14 - APIs / Gateways

Entry points that route and protect traffic

Detection File Patterns:

15 - UIs / Frontends

Web or mobile apps for end-user interaction

Detection File Patterns:

16 - Internal Tooling

Private apps for internal business operations

Detection File Patterns:

Tier: Ecosystem (Kinds 17-21)

Supporting tools and utilities

ID Key Name Stakeholder Output
17 build-tool Build Tools Platform/DevOps Automated Pipelines
18 e2e-test E2E Test Suites SDET/SecOps Quality Reports
19 docs-site Docs Sites Product/UX Static Support Sites
20 playbook Internal Playbooks Platform/DevOps Operational Guides
21 cli-devtool CLIs / Developer Tools Platform/DevOps Developer UX Tools

17 - Build Tools

CI/CD actions and custom build logic

Detection File Patterns:

18 - E2E Test Suites

Integration tests and smoke test runners

Detection File Patterns:

19 - Docs Sites

Documentation, tutorials, and references

Detection File Patterns:

20 - Internal Playbooks

Incident response and on-call runbooks

Detection File Patterns:

21 - CLIs / Developer Tools

Productivity scripts and developer utilities

Detection File Patterns:

Tier: Noncurrent (Kinds 22-25)

Repos of little product or operational importance (test data, examples, archives, forks)

ID Key Name Stakeholder Output
22 reference-example Reference / Example Architect/Lead Educational Code
23 experiment-sandbox Experiment / Sandbox Engineering Discardable Code
24 archival-fork Archival / Forks SDET/SecOps Historical/Vendor Code
25 test-data-fixtures Test Data / Fixtures SDET/SecOps Test Data Assets

22 - Reference / Example

Best-practice implementation examples

Detection File Patterns:

23 - Experiment / Sandbox

Proof-of-concepts and R&D “spikes”

Detection File Patterns:

24 - Archival / Forks

Legacy code and forks of 3rd party repos

Detection File Patterns:

25 - Test Data / Fixtures

Repositories containing test data, fixtures, seed data, and mock datasets

Detection File Patterns:

File Pattern Detection

The taxonomy uses file pattern matching to suggest project Kinds. When analyzing a project, patterns are matched against file paths, and the Kind with the most matches is suggested.

Pattern Syntax

Patterns use glob syntax:

All Patterns by Kind

Infrastructure (IaC) (infrastructure):

Identity & Access (IAM) (identity-access):

Config & Policy (config-policy):

Monorepo / Meta (monorepo-meta):

Design Systems (design-system):

Software Libraries (software-library):

Proto / SDK (proto-sdk):

Blueprints (blueprint):

Security Tooling (security-tooling):

Compliance / Audit (compliance-audit):

ML / Models (ml-model):

Data / ETL (data-etl):

Microservices (microservice):

APIs / Gateways (api-gateway):

UIs / Frontends (ui-frontend):

Internal Tooling (internal-tool):

Build Tools (build-tool):

E2E Test Suites (e2e-test):

Docs Sites (docs-site):

Internal Playbooks (playbook):

CLIs / Developer Tools (cli-devtool):

Reference / Example (reference-example):

Experiment / Sandbox (experiment-sandbox):

Archival / Forks (archival-fork):

Test Data / Fixtures (test-data-fixtures):

Backstage Type Mapping

Each Kind maps to a Backstage catalog type:

Backstage Type Kinds
api proto-sdk, api-gateway
documentation compliance-audit, playbook, reference-example
library design-system, software-library, archival-fork
resource infrastructure, identity-access, config-policy, test-data-fixtures
service ml-model, data-etl, microservice, internal-tool, experiment-sandbox
system monorepo-meta
template blueprint
tool security-tooling, build-tool, e2e-test, cli-devtool
website ui-frontend, docs-site