Why “core first” is no longer a purely architectural debate
Legacy decommissioning has moved from an optional IT hygiene program to a strategic constraint on execution. The portfolio impact is not limited to technical debt: legacy estates inflate run-the-bank (RTB) demands, reduce engineering capacity for change, and create fragility as banks increase reliance on real-time payments, cloud platforms, and AI-enabled decisioning. The executive question is increasingly about sequencing risk: which modernization moves reduce fragility and unlock delivery capacity, and which moves merely shift risk into coexistence complexity and operational workarounds.
In 2026, that sequencing challenge is sharpened by three forces that interact rather than arrive independently: operational resilience expectations, time-bound payments standards evolution, and rising security requirements that punish brittle integration patterns. A legacy decommissioning roadmap must therefore be judged less by its target-state architecture and more by whether it produces a credible critical path, with explicit gates that protect service continuity, control effectiveness, and regulatory defensibility.
What has changed: constraints that dictate sequencing
RTB consumption is a portfolio constraint, not a budgeting artifact
Decommissioning decisions often stall because RTB is treated as a cost pool rather than an execution constraint. When RTB consumes the majority of technology spend in many institutions, modernization capacity is implicitly capped, and “parallel transformation” becomes a misnomer. Roadmaps that propose broad parallel workstreams without explicitly allocating scarce engineering, testing, and change windows tend to fail through cumulative overload rather than a single major incident.
End-of-coexistence pressures make partial migration strategies time-sensitive
Phased approaches such as dual-core coexistence and progressive migration are often the least risky path operationally, but they carry an exposure that executives must govern: coexistence cannot persist indefinitely. Thoughtworks’ discussion of becoming ISO-native highlights the operational and architectural burden of extended coexistence during ISO 20022 migration, including the retirement of legacy message types and the need to process structured data more natively as timelines advance.
Standards and security roadmaps create fixed dates inside flexible programs
Legacy retirement is frequently scheduled as an “opportunity-led” program. That posture is increasingly incompatible with externally determined milestones in payments and security roadmaps. The most practical implication is that decommissioning sequences must be anchored to a small number of immovable deadlines, with explicit mitigation plans where legacy constraints cannot be eliminated in time.
The sequencing decision: core modernization first or later
There is no universal answer to “core first.” The decision is a function of dependency structure and risk concentration. Executives can avoid false binaries by framing the choice as a set of sequencing patterns, each with distinct operating model implications and distinct failure modes.
Pattern 1: Core-first cutover with aggressive decommissioning
This pattern prioritizes replacing core transaction processing early and retiring legacy quickly. It can reduce long-term complexity and eliminate duplicated change effort, but it concentrates execution risk. Oliver Wyman’s discussion of next-generation core modernization highlights the importance of cutover approach selection and the governance disciplines required to manage transition risk, particularly where target dates to sunset legacy platforms are not optional.
Where this pattern fails, it is often due to optimistic assumptions about data readiness, product rationalization, and operating model adaptation. Banks that pursue core-first must demonstrate unusually strong capabilities in data migration, testing automation, release governance, and 24/7 operational preparedness.
Pattern 2: Domain-first modernization using the strangler approach
The strangler pattern replaces high-value, low-risk modules incrementally—often by extracting a bounded capability (for example, customer profiles or account servicing features) into services and routing traffic through an API layer until the legacy monolith can be safely retired. This approach is emphasized across modernization guidance because it reduces “big bang” risk, supports learning, and allows teams to build momentum while progressively shrinking the legacy footprint.
The trade-off is coexistence complexity. Without strong dependency mapping and data governance, banks can unintentionally build a “distributed monolith” in which ownership boundaries are unclear and defects become harder to diagnose. Successful sequencing requires strict rules about which domains can be extracted safely, how data is synchronized, and how legacy integration points are managed during transition.
Pattern 3: Dual-core coexistence with staged product and segment migration
Many banks adopt a dual-core strategy to minimize customer and service risk: the new core is introduced for selected products, segments, or regions, while the legacy core continues to run the remainder. This supports controlled migration waves and reduces the blast radius of defects, but it raises governance demands around reconciliation, duplicate controls, and parallel operations.
In this pattern, the decommissioning roadmap is only as credible as its “exit plan” from coexistence. If the organization cannot define the conditions under which legacy workloads will stop being onboarded and will start being forcibly migrated or retired, coexistence becomes structural, and RTB reduction benefits fail to materialize.
A four-phase roadmap that makes sequencing governable
Regardless of the chosen pattern, executives need a roadmap that converts technical work into explicit sequencing logic and decision gates. The phases below align modernization activity to the conditions required for safe decommissioning, while preserving flexibility in implementation choices.
Phase 1: Discovery and strategic assessment
Build a defensible inventory and dependency map
Application retirement guidance consistently highlights that decommissioning begins with knowing what exists, how it is used, and what it is connected to. Automated discovery and dependency mapping reduce reliance on tribal knowledge and surface “hidden” risks such as undocumented interfaces, embedded credentials, and shadow integrations. Inventory discipline also clarifies which systems are true candidates for retirement and which are effectively part of critical service delivery.
Classify data by business objects, not tables
Decommissioning programs often underestimate the semantic loss that occurs when data is treated as a collection of relational tables. Business-object classification preserves context—what the data represents in business terms, how it is used in downstream decisions, and what control obligations attach to it. This becomes critical for extraction, archival design, and evidencing data lineage during audits and investigations.
Scope regulatory and retention obligations early
Retention, privacy, and security constraints determine what must be archived, what can be deleted, and what must remain accessible under defined conditions. Treating regulatory scoping as an early gate prevents a common failure mode: building a technically elegant target-state only to discover late-stage retention and audit-access requirements that force expensive rework or prolong legacy coexistence.
Phase 2: Modernization and coexistence
Choose a progressive migration strategy with explicit coexistence limits
Phased migration reduces operational risk, but it increases the need for explicit rules: what will be migrated when, what will be re-platformed versus retired, and what will be frozen. Thoughtworks’ ISO-native perspective is particularly relevant because it illustrates how external evolution in messaging and processing expectations can turn coexistence into a liability if the organization cannot move toward more native processing over time.
Design ISO 20022 readiness as a processing capability, not a translation exercise
Payments modernization timelines are increasingly shaped by structured data expectations. Roadmaps should therefore separate “message format compliance” from “processing readiness.” Swift’s roadmap communications and industry guidance emphasize that the retirement of legacy message types and evolution of data requirements can create operational breakpoints for institutions that rely on translation wrappers rather than structured processing end-to-end. JPMorgan’s ISO 20022 migration insights reinforce that impact depends on the institution’s role and usage patterns—highlighting the need for precise scoping rather than generic assertions.
Modernize risk and monitoring controls in parallel with platform change
Technology replacement programs frequently discover that transaction monitoring, alerting, and investigation workflows are tightly coupled to legacy data structures and processing patterns. Best-practice guidance on switching transaction monitoring tools highlights the need to manage data mapping, threshold calibration, and operational readiness to avoid control gaps during migration. Sequencing should therefore treat monitoring and controls modernization as a prerequisite for large-scale workload moves, not a post-cutover optimization.
Phase 3: Execution and data archiving
Use intelligent archiving to reduce target-state bloat
Data archiving is not a dumping ground; it is an operating capability. Archiving guidance emphasizes maintaining secure, searchable, auditable access to historical records without contaminating the new core with unnecessary volume and complexity. Intelligent archiving supports auditability and analytics while allowing the modernized estate to remain lean, performant, and easier to control.
Run parallel operations to prove equivalence where it matters
Parallel runs are often described as a time-bound verification step, but executives should insist on clarity about what “equivalence” means. For critical outputs such as transaction alerts, risk scores, and customer notifications, parallel validation must be framed as evidence: which measures must match, what tolerances are acceptable, and who signs off. Without this discipline, parallel runs become either performative (too shallow to detect defects) or interminable (too broad to complete).
Build crypto-agility into the decommissioning critical path
Security roadmaps increasingly require institutions to plan for cryptographic transition. Guidance on quantum-safe cryptography roadmaps highlights the need to begin transition activities for high-risk systems under EU-coordinated approaches. For sequencing, the implication is practical: systems that cannot be upgraded to modern cryptographic standards should be prioritized for retirement or isolation, and new platforms should be designed with crypto-agility in mind to avoid repeating today’s hard-coded dependencies.
Phase 4: Shutdown and governance
Execute a controlled shutdown sequence, not a single switch-off event
Application decommissioning guidance stresses that shutdown requires staged removal of access, network connectivity, and upstream/downstream integrations, with controls to prevent “zombie” dependencies from reappearing. A phased shutdown reduces the risk of latent interfaces causing service disruption after the retirement decision has already been communicated as complete.
Ensure secure disposal and contractual closure
Retirement programs frequently underestimate the residual risks of decommissioned environments—especially where physical hardware, backups, or third-party managed components are involved. Secure disposal must meet data protection expectations, and contract termination must be governed to avoid auto-renewals and hidden service dependencies. These activities are not administrative; they are the final controls that make decommissioning real.
Critical 2026 milestones that shape sequencing decisions
Executives should treat major payments and security milestones as sequencing anchors, not as compliance afterthoughts. The milestones below represent common planning constraints referenced across ISO 20022 roadmap communications and modernization perspectives:
- November 2026: Swift CBPR+ decommissions unstructured postal addresses, requiring structured address formats to avoid payment disruption risk.
- November 2026: MT101 (Request for Transfer) messages are scheduled for decommissioning on the Swift network, shaping coexistence and processing strategy for relevant institutions.
- End of 2026: EU-aligned roadmaps for post-quantum cryptography transition activities begin for critical infrastructure and high-risk systems, increasing pressure on crypto-agility planning.
The strategic point is not the dates themselves, but what they do to optionality. As milestones approach, banks lose degrees of freedom: workaround tolerance declines, coexistence costs rise, and operational risk increases if foundational capabilities are not already in place.
Executive governance: the minimum viable disciplines that prevent sequencing failure
Legacy decommissioning is one of the easiest transformation programs to mis-govern because progress can appear linear while risk accumulates non-linearly. The following governance disciplines convert roadmap claims into inspectable decision objects:
- Dependency-based sequencing: each migration wave must state prerequisites, shared constraints, and critical service impacts, not just timelines.
- Coexistence exit criteria: define the conditions that end dual-running, including freeze rules, product onboarding prohibitions, and decommission triggers.
- Control continuity evidence: maintain auditable proof that transaction monitoring, security controls, and operational processes remain effective throughout transition.
- Data accountability: assign ownership for business-object definitions, retention interpretations, and archive access policies.
- Service resilience gates: require explicit sign-off that important services meet resilience expectations before increasing customer exposure.
These disciplines are deliberately limited in number. They exist to keep sequencing grounded in reality and to prevent the program from collapsing into a contest between architectural ideals and delivery pressures.
Strategy validation and prioritization through sequencing confidence in core modernization
The “core first or later” decision is a strategy validation test because it exposes whether strategic ambition is supported by current capability. If the organization lacks strong inventory discipline, data governance, test automation, control modernization capacity, and 24/7 operational readiness, then core-first strategies concentrate risk beyond what the bank can safely carry. Conversely, if coexistence governance is weak, domain-first and dual-core approaches can become permanent complexity traps that prevent RTB reduction and delay compliance outcomes.
A maturity-based assessment provides a structured mechanism to make these constraints explicit. By benchmarking capabilities across architecture and integration readiness, data management and archival discipline, delivery operating model strength, resilience and control maturity, and security modernization preparedness, executives can sequence initiatives with greater confidence: identifying true prerequisites, choosing where to run in parallel versus stage sequentially, and determining where to simplify ambition to remain realistic. Framed this way, the DUNNIXER Digital Maturity Assessment supports executive governance by translating modernization intent into evidence-based sequencing choices, reducing the probability that legacy retirement becomes either an over-scoped “big bang” gamble or an under-governed coexistence program that never exits.
Reviewed by

The Founder & CEO of DUNNIXER and a former IBM Executive Architect with 26+ years in IT strategy and solution architecture. He has led architecture teams across the Middle East & Africa and globally, and also served as a Strategy Director (contract) at EY-Parthenon. Ahmed is an inventor with multiple US patents and an IBM-published author, and he works with CIOs, CDOs, CTOs, and Heads of Digital to replace conflicting transformation narratives with an evidence-based digital maturity baseline, peer benchmark, and prioritized 12–18 month roadmap—delivered consulting-led and platform-powered for repeatability and speed to decision, including an executive/board-ready readout. He writes about digital maturity, benchmarking, application portfolio rationalization, and how leaders prioritize digital and AI investments.
References
- https://www.ciklum.com/legacy-modernization/#:~:text=in%20your%20portfolio.-,AI%2DEnabled%20Modernization:%20The%20New%20Paradigm,before%20they%20impact%20the%20user.
- https://www.archondatastore.com/blog/application-decommissioning-retirement/
- https://www.linkedin.com/pulse/why-core-banking-modernization-fails-what-actually-works-2026-zifsc#:~:text=Current%20industry%20data%20confirms%20the,during%20periods%20of%20rapid%20change.
- https://www.ciklum.com/legacy-modernization/#:~:text=Legacy%20modernization%20is%20the%20enterprise,ready%20platforms%20within%2012%20months
- https://www.ciklum.com/legacy-modernization/#:~:text=Identify%20a%20Feature:%20Pick%20a,it%20can%20be%20safely%20decommissioned.
- https://www.thoughtworks.com/insights/articles/becoming-ISO-native-navigating-end-of-coexistence-in-ISO-20022-migration-journey
- https://www.thoughtworks.com/insights/articles/becoming-ISO-native-navigating-end-of-coexistence-in-ISO-20022-migration-journey#:~:text=Key%20requirement-,Retirement%20of%20legacy%20MT%20messages%20for%20CBPR+.,structured%20or%20hybrid%20address%20format.
- https://www.flagright.com/post/best-practices-for-switching-from-a-legacy-transaction-monitoring-tool
- https://www.cryptomathic.com/a-bankers-guide-to-quantum-safe-cryptography-part-3-roadmap-to-pqc-migration-for-financial-institutions-cryptomathic#:~:text=The%20EU'%20s%20coordinated%20PQC,for%20a%20post%2Dquantum%20era.
- https://neevdata.com/blog/legacy-system-decommissioning-retiring-systems/#:~:text=Ensure%20archived%20data%20remains%20securely,Plan%20for%20Future%20Scalability
- https://www.jpmorgan.com/insights/payments/fx-cross-border/iso-20022-migration#:~:text=There%20is%20no%20immediate%20impact,impact%20or%20requirement%20to%20change
- https://www.oliverwyman.com/our-expertise/insights/2025/may/next-gen-core-banking-modernization.html#:~:text=The%20method%20of%20cutting%20over,deadlines%20to%20sunset%20legacy%20core.
- https://kodesage.ai/blog/legacy-system-modernization#:~:text=Modernization%20works%20best%20when%20decisions,the%20door%20when%20they%20do.
- https://www.swift.com/standards/iso-20022/iso-20022-bytes/one-month-go#:~:text=ISO%2020022%20Roadmap%20for%20Non%2Dinstruction%20messages&text=Start%20your%20preparations%20now%20for,.structuring@swift.com.
- https://www.archive360.com/blog/retire-your-legacy-applications-keep-the-data-available#:~:text=Legacy%20Application%20Retirement%20and%20Data,ongoing%20analytics%20and%20information%20management.