Executive Summary
- Before drafting an RFP, governments must define the program architecture. Architecture decisions shape sovereignty, interoperability, enforcement capability, and citizen trust for years to come.
- Three strategic principles shape every effective system:
- Sovereignty: Government must retain full control of all data, access, and continuity.
- Interoperability: Agencies should operate from one shared source of truth.
- Phygital solution: Combining physical security features with digital traceability – and enabling consumer verification – delivers the strongest protection.
Architecting the Response: An Introduction to Revenue Management & Control Program Models
This is Part II of Chapter 1 of our series “Implementing a Revenue Management & Control Solution”. Part I made the case for action, establishing why investment in revenue protection is both urgent and financially justified. If you haven’t read it yet, we recommend starting there before continuing.
Part II now turns to the first strategic question every government must answer: what kind of program should you build, and how do you think about the architecture before requirements are written?
The architecture decision is a strategic decision
The most common mistake governments make when approaching a Revenue Management and Control Solution is treating technology as the sole decision to make. The architecture of a solution — how it is hosted, how it authenticates, how it connects agencies, and how it empowers citizens — is a strategic choice with long-term implications for sovereignty, institutional effectiveness, and public trust.
This article does not prescribe a solution. Chapter 2 of this series will do that in detail, walking through the full RFP design process: technical requirements, policy frameworks, and sustainable funding models. What this article does is introduce the 3 foundational principles that should anchor every government’s thinking before that process begins.
Sovereignty
Who controls the data, and under what conditions?
Interoperability
Connecting agencies around a single source of truth
Phygital
The model that connects physical products to digital intelligence
1. Sovereignty: who controls the data, and under what conditions?
One of the first questions any government must answer is who owns the data the platform generates. A revenue protection program creates a continuous stream of highly sensitive information: supply chain movements, excise payment records, enforcement intelligence, and consumption patterns at the product level. That data belongs to the state. The program architecture must reflect that from day one.
Modern programs, whether cloud-based, on-premises, or hybrid, can all be designed to preserve full government ownership and control of national data. The key is not the hosting model per se, but the governance framework that sits around it: who holds the encryption keys, which data never leaves national jurisdiction, under what conditions a third-party operator can access records, and how the government retains full program continuity if a vendor relationship changes.
Sovereignty is an argument for clarity of contractual and technical control from the outset.
2. Interoperability: connecting agencies around a single source of truth
Revenue protection is rarely a single-agency problem. The Ministry of Finance sets the excise policy. The Customs authority controls the border. The Tax Authority monitors domestic compliance. The health regulator tracks product standards. Law enforcement executes seizures. In most jurisdictions, these agencies operate in institutional silos, each with its own systems, its own data, and its own definition of what a compliant product looks like.
A revenue protection program that is designed only for one agency will deliver only one agency’s results. The programs that deliver the most impact – in fiscal recovery, in enforcement effectiveness, and in public health outcomes – are those that are architected from the start as shared infrastructure: a single, authoritative record of every product’s identity and supply chain journey, accessible to each agency through role-appropriate interfaces.
This is the interoperability principle. It does not mean that all agencies share all data — appropriate access controls are essential. It means that when a Customs officer at a border post, a Tax inspector at a warehouse, and a health regulator at a pharmacy scan the same product, they are all querying the same underlying record.
Interoperability is not just a design choice; it is one of the strongest predictors of enforcement effectiveness. When agencies work from a unified system, they detect anomalies earlier, coordinate interventions faster, and close enforcement gaps that siloed architectures leave open. In practice, interoperability makes responses synchronized and intelligent-driven.
3. Phygital: the model that connects physical products to digital intelligence
The third foundational principle concerns how the system authenticates, and this is where the most important evolution in revenue protection has occurred. For decades, the primary tool was the physical tax stamp: a visible, tamper-evident label affixed to a product as evidence of duty payment. Physical stamps remain relevant as a deterrent and a consumer signal. But deployed alone, they are a static defense against a dynamic threat. Sophisticated counterfeiting operations can replicate physical features and a physical stamp, by itself, generates no intelligence.
Digital traceability systems assign a unique serialized identifier to each individual unit of product — recorded at every point in the supply chain from production to first retail sale. The result is a complete, auditable record: one that can identify diversion from bonded warehouses, detect counterfeit identifier replication, flag anomalous distribution patterns, and generate the fiscal intelligence that turns enforcement from reactive to anticipatory. The WHO FCTC Protocol to Eliminate Illicit Trade in Tobacco Products establishes track-and-trace as a minimum international standard precisely because this intelligence layer is what physical systems alone cannot provide.
The most effective programs combine both into a phygital architecture: a tax stamp or security label that carries a machine-readable digital identifier — typically a 2D barcode or DataMatrix code — connecting the physical object to its digital supply chain record. This is Inexto’s recommended model, and it is the direction that every major international framework points toward. It is also the model implemented by many of the most resilient national programs, which recognize that only a phygital system creates both field-level deterrence and deep digital intelligence.
What makes phygital programs qualitatively different from their predecessors is the third layer they enable: consumer verification. When every product carries a scannable code, any citizen with a smartphone becomes a real-time authentication point. A consumer who scans a medicine in a pharmacy, a cigarette pack at a market stall, or a bottle of spirits at a retailer and receives an instant authenticity result is not just protected — they are participating in the enforcement ecosystem.
What comes next
Sovereignty, interoperability, and phygital architecture are strategic commitments — decisions about what kind of institution a government wants to be, and what kind of relationship it wants to have with its supply chains, its enforcement agencies, and its citizens.
Chapter 2 of this series will address how to design a strong RFP, explain in detail the architectural choices and funding models.
The architecture decision is where strategy becomes structure. Getting it right does not require a perfect understanding of every technical detail — it requires asking the right questions before the process begins. That is what this series is designed to help you do.
Before the RFP
Part II: Defining the program architecture
Coming Soon
Coming Soon
Coming Soon
Contact us
If your agency is currently assessing hosting models, data sovereignty requirements, inter‑agency interoperability, or the transition to phygital authentication, Inexto offers government‑only architecture consultations grounded in global best practices and comparative analysis of national programs.
These sessions support ministries and regulators in shaping early design decisions that will define the long‑term impact of revenue protection programs.
