Executive Summary
A pan-European insurance group operating across 8 countries engaged Fintexis to architect a unified platform spanning the entire insurance value chain — from policy underwriting and contract lifecycle management through claims intake, adjudication, and settlement. The legacy landscape comprised 14 disconnected systems, 3 different claims engines, and no cross-jurisdiction visibility. Our architecture-first approach delivered a cohesive, event-driven platform that transformed every dimension of their operations.
The Challenge
Business Context
The client — one of Europe’s top-20 insurance groups with €12 billion in gross written premiums — faced a compounding technology crisis. Decades of M&A activity had produced a fragmented IT estate:
- 14 core systems across 8 countries, with no interoperability
- 3 separate claims engines (two COBOL-based, one Java monolith) processing 2.8 million claims annually
- Manual contract management: Policy amendments required 6–8 days of manual processing, with error rates exceeding 12%
- No unified customer view: A policyholder with home, auto, and life policies existed as three separate entities across siloed systems
- Regulatory pressure: Solvency II reporting required manual data aggregation from 9 different sources, consuming 3,200 staff-hours per quarter
Architecture Pain Points
Our initial assessment revealed systemic architectural deficiencies:
- Tight coupling: Claims processing was embedded in the policy administration system — modifying one invariably broke the other
- No separation of concerns: Business rules, data access, presentation logic, and integration code were co-mingled in monolithic codebases
- Synchronous bottlenecks: A single claim triggered 23 sequential database transactions, with the entire chain failing if any step encountered an error
- No event history: State changes were destructive updates — once a claim status changed, the previous state was lost, making audit and compliance reconstruction impossible
- Scaling limitations: Peak periods (storm damage, flooding events) caused system degradation because the architecture couldn’t scale horizontally
Our Approach
Phase 1: Enterprise Architecture Assessment (6 weeks)
Following TOGAF ADM, we conducted a comprehensive assessment structured around the Architecture Development Method:
Architecture Vision & Stakeholder Management
- Conducted 48 stakeholder interviews across business, technology, actuarial, compliance, and operations
- Developed Architecture Vision document with clear business capability targets
- Created stakeholder concern matrix mapping 127 concerns to architectural decisions
Business Architecture
- Process mining across 2.4 million claims from the past 3 years — identifying 34 distinct process variants where only 6 were intended
- Capability mapping: Modeled 84 business capabilities across the insurance value chain, identifying 23 with critical architectural gaps
- Value stream analysis: Mapped 4 primary value streams (Underwriting, Policy Servicing, Claims, Renewals) with pain-point heat mapping
Information Systems Architecture
- Application portfolio rationalization: Catalogued all 14 core systems, 67 satellite applications, and 340+ integration points
- Data architecture assessment: Identified 12 master data domains with no single source of truth — customer data alone existed in 9 authoritative-but-conflicting sources
- Integration topology mapping: Documented the existing integration spaghetti — 340 point-to-point integrations, 23 different data formats, 4 integration technologies
Technology Architecture
- Infrastructure capacity analysis across 3 data centers and 2 cloud tenants
- Security architecture review against ISO 27001, GDPR, and jurisdiction-specific requirements
- Operational readiness assessment for cloud-native deployment models
Phase 2: Domain-Driven Design & Target Architecture (8 weeks)
Strategic Domain Decomposition
Using Event Storming workshops (12 sessions, 85+ participants), we identified bounded contexts aligned to business capabilities:
| Bounded Context | Responsibility | Classification |
|---|---|---|
| Policy Management | Contract lifecycle, endorsements, renewals | Core Domain |
| Underwriting Engine | Risk assessment, pricing, acceptance rules | Core Domain |
| Claims Intake | FNOL, document collection, initial triage | Core Domain |
| Claims Adjudication | Assessment, decision, settlement calculation | Core Domain |
| Fraud Intelligence | Pattern detection, scoring, investigation workflow | Supporting Domain |
| Document Processing | OCR, classification, extraction, storage | Supporting Domain |
| Customer 360 | Unified customer profile, cross-product view | Supporting Domain |
| Partner Network | Repair shops, medical providers, legal partners | Supporting Domain |
| Regulatory Reporting | Solvency II, IFRS 17, jurisdiction-specific | Generic Domain |
| Payment & Settlement | Disbursement, recovery, reinsurance allocation | Generic Domain |
Architecture Patterns & Decisions
Every significant decision was documented as an Architecture Decision Record (ADR) and communicated through arc42 documentation:
ADR-001: Event-Driven Architecture with Event Sourcing
- Context: Need for complete audit trail, temporal queries, and decoupled processing
- Decision: Apache Kafka as event backbone with event sourcing for claims and policy aggregates
- Consequences: Eventually consistent read models, requires CQRS, but enables full state reconstruction and regulatory compliance
ADR-002: CQRS for Operational Workspaces
- Context: Claims handlers and underwriters need sub-second access to rich, pre-computed views while write operations have complex business rules
- Decision: Separate command and query models with dedicated read stores (Elasticsearch for search, PostgreSQL for relational queries, Redis for real-time dashboards)
- Consequences: Increased complexity in synchronization, but 10x improvement in query performance and independent scaling of read/write workloads
ADR-003: Saga Pattern for Cross-Context Orchestration
- Context: Claims settlement involves coordinated actions across 5 bounded contexts (Claims, Payment, Partner Network, Policy, Regulatory)
- Decision: Choreography-based sagas for simple flows, orchestration-based sagas (using a saga orchestrator service) for complex multi-party claims
- Consequences: Requires compensation logic for each step, but provides resilience and visibility into long-running processes
ADR-004: Strangler Fig Migration Strategy
- Context: Cannot replace 14 systems simultaneously; business continuity is paramount
- Decision: Progressive migration using Anti-Corruption Layers (ACL) to shield new services from legacy data models
- Consequences: Temporary increase in system complexity during migration, but zero-downtime transition and continuous business value delivery
ADR-005: Multi-Tenancy with Data Sovereignty
- Context: 8 jurisdictions with different regulatory requirements (GDPR, local insurance regulations)
- Decision: Logical multi-tenancy with data residency controls — compute is shared, data is jurisdiction-partitioned
- Consequences: Shared codebase reduces maintenance, but requires sophisticated data routing and access control
Phase 3: arc42 Documentation Package
We delivered a comprehensive arc42 documentation package covering all 12 sections:
- Introduction & Goals: Business drivers, quality goals (availability > 99.95%, settlement < 72h, throughput > 500 claims/min)
- Constraints: Regulatory (Solvency II, GDPR), organizational (phased migration), technical (Kafka, Kubernetes)
- Context & Scope: System context diagram with 45 external actors and interfaces
- Solution Strategy: Event-driven, domain-aligned microservices, cloud-native on Azure
- Building Block View: Three-level decomposition from system level through container level to component level
- Runtime View: 8 critical runtime scenarios (claim submission, fraud detection, settlement, contract amendment)
- Deployment View: Multi-region Azure deployment with geo-redundancy and data sovereignty controls
- Crosscutting Concepts: Security model, error handling strategy, logging/monitoring, data consistency patterns
- Architecture Decisions: 47 ADRs covering all significant decisions
- Quality Requirements: Quality tree with 23 scenarios, each with measurable acceptance criteria
- Risks & Technical Debt: Risk register with 31 entries, technical debt backlog with prioritized remediation plan
- Glossary: Domain-specific terminology ensuring consistent communication across 8 country teams
Phase 4: Implementation Guidance (14 months)
We structured implementation into four releases:
Release 1 — Foundation & Claims Intake (Months 1–4)
- Event infrastructure (Kafka cluster, Schema Registry, event catalog)
- Claims intake microservice with multi-channel FNOL (web, mobile, call center, partner API)
- Document processing pipeline (OCR + ML-based classification)
- Anti-Corruption Layer for legacy system synchronization
- Observability stack (Prometheus, Grafana, Jaeger, structured logging with ELK)
Release 2 — Claims Adjudication & Contract Management (Months 4–8)
- Intelligent claims triage and routing engine
- Automated adjudication for low-complexity claims (straight-through processing)
- Contract lifecycle management — policy creation, endorsements, renewals, cancellations
- Underwriting rules engine with configurable risk models
- Claims handler workspace (CQRS-powered rich views)
Release 3 — Fraud Intelligence & Partner Network (Months 8–11)
- ML-based fraud scoring engine with cross-jurisdiction pattern detection
- Real-time fraud alerting and investigation workflow
- Partner network integration (repair shops, medical providers, legal services)
- Automated partner assignment and SLA tracking
- Cross-border claims coordination
Release 4 — Analytics, Compliance & Migration Completion (Months 11–14)
- Unified data lake for cross-jurisdiction analytics
- Solvency II and IFRS 17 automated reporting
- Executive dashboards with real-time KPIs
- Legacy system decommissioning (12 of 14 systems retired)
- Customer 360 unified profile
Architecture Highlights
Event Sourcing for Regulatory Compliance
Every state change in a claim’s lifecycle and every contract amendment is captured as an immutable event. This provides:
- Complete audit trail: Regulators in any jurisdiction can reconstruct the exact state of any claim or contract at any point in time
- Temporal queries: “What was the reserve estimate for this claim on March 15th?” becomes a trivial query
- Event replay: New analytics models can be applied retroactively to historical data
- Cross-jurisdiction consistency: The same event model works across all 8 countries, with jurisdiction-specific projections
Hexagonal Architecture for Business Logic Isolation
Each bounded context implements hexagonal architecture (ports & adapters), ensuring:
- Business logic has zero dependencies on infrastructure — it can be tested in isolation
- External integrations (legacy systems, partner APIs, databases) are abstracted behind ports
- Technology migrations (e.g., switching from PostgreSQL to CockroachDB) require changes only in adapters
Circuit Breaker & Bulkhead Patterns for Resilience
Given the 45 external integrations, we implemented:
- Circuit breakers on every external call with configurable failure thresholds
- Bulkhead isolation: Each integration category (payment processors, partner APIs, regulatory feeds) runs in isolated thread pools
- Fallback strategies: Degraded-mode operation for non-critical integrations — claims processing continues even when partner systems are unavailable
API Gateway with Rate Limiting and Throttling
A unified API gateway provides:
- Rate limiting per client, per jurisdiction, and per endpoint
- Request/response transformation for legacy system compatibility
- API versioning with backward compatibility guarantees
- Real-time API analytics for capacity planning
Results
The platform delivered transformational outcomes across every dimension:
- Claim settlement reduced from 21 days to under 72 hours: Simple claims (60% of volume) now settle in under 4 hours through straight-through processing
- 94% contract automation rate: Policy amendments, endorsements, and renewals are processed without manual intervention — up from 23%
- Fraud detection accuracy improved by 340%: Cross-jurisdiction ML models identified €18.4 million in fraudulent claims in the first year
- 38% operational cost reduction: Legacy system decommissioning, reduced manual processing, and automated compliance reporting
- Straight-through processing at 71%: Up from 12% — nearly three-quarters of claims require zero human intervention
- Claims handler productivity improved by 62%: CQRS-powered workspaces eliminate data gathering, allowing handlers to focus on complex adjudication
- Regulatory reporting time reduced by 85%: Solvency II and IFRS 17 reports generated automatically from the event store
- Zero-downtime deployment: Blue-green deployments with canary releases enable continuous delivery without business disruption
Technology Stack
| Layer | Technology |
|---|---|
| Event Streaming | Apache Kafka, Confluent Schema Registry |
| Microservices | Java 21 (Spring Boot), Kotlin |
| API Gateway | Kong Gateway |
| Container Orchestration | Azure Kubernetes Service (AKS) |
| Databases | PostgreSQL, Elasticsearch, Redis |
| Data Lake | Azure Data Lake Gen2, Apache Spark |
| ML/AI | Azure ML, Python (scikit-learn, TensorFlow) |
| Observability | Prometheus, Grafana, Jaeger, ELK Stack |
| IaC | Terraform, Helm Charts |
| CI/CD | Azure DevOps, ArgoCD |
| Security | Azure AD, OAuth 2.0/OIDC, HashiCorp Vault |
| Documentation | arc42, Structurizr (C4 diagrams) |
Lessons Learned
Architecture Governance is Non-Negotiable
With 7 architects and 12 development teams across 4 countries, architecture governance was critical. We established:
- Weekly Architecture Review Board: Every significant design decision reviewed against quality attributes
- ADR governance: No architectural change without a documented decision record
- Fitness functions: Automated checks in CI/CD verifying architectural constraints (dependency rules, API compatibility, event schema evolution)
Domain-Driven Design Requires Business Investment
The Event Storming workshops were the single most valuable activity. But they required genuine business participation — not just IT proxies. The sessions where actuaries, underwriters, and claims managers participated directly produced bounded contexts that survived implementation without rework.
Migration is Harder Than Greenfield — Plan for It
The Anti-Corruption Layers consumed approximately 20% of total effort. This was higher than estimated but essential. Every shortcut in the ACL layer resulted in legacy concepts leaking into the new architecture, requiring costly remediation later.