27. What Day-1 really means for IT
Define Day-1 as a minimum viable operating state—with explicit pass/fail tests and fallbacks—so you don’t learn your dependencies at 9:00 a.m. after close.
The deal closed at 12:01 a.m. The Day-1 war room call at 7:30 a.m. was green across the board. No cutover. No migrations. The carve-out would stay on the parent’s systems under a TSA.
At 8:17 a.m., customer service stopped taking calls. Single sign-on tokens failed. A certificate had rotated overnight and the carve-out’s identity tenant wasn’t authorized. By mid-morning, orders were queueing, invoices weren’t going out, and finance had no reliable cash view.
Nothing “broke” in the classic sense. The team didn’t botch a cutover. They just discovered—live—that Day-1 was defined as “we’ll have access,” and nobody had turned that assumption into a tested, signed-off condition.
That’s what Day-1 means for IT: the first day you own the operational risk, with deal constraints and imperfect control. The primary decision is simple: do you define Day-1 as a date on the calendar, or as a minimum viable operating state with clear pass/fail criteria and fallbacks? Most deals pick the first. The ones that avoid TSA extensions and fire drills pick the second.
Day-1 is a business contract, not an IT milestone
Day-1 is not “go-live.” In many deals, nothing goes live on Day-1. You might run on TSAs, stand up only a thin layer of independence, or connect lightly to the buyer.
But the business still expects a contract to hold:
- People can do their jobs.
- Money moves (orders, invoices, payroll, close).
- Data is trustworthy enough to operate and report.
- Someone can support and secure the environment.
If those statements aren’t true, you don’t have a Day-1 plan. You have a project plan.
What Day-1 really means for IT: four “must be true” outcomes
Best teams define Day-1 in outcomes first, then design the systems and TSAs to make those outcomes true.
1) Access works (for humans and machines)
Day-1 fails quietly when identity is treated as “just SSO.” In reality it is:
- authentication (MFA, conditional access)
- authorization (roles, entitlements, SoD)
- service accounts, certificates, API keys, batch credentials
- joiner/mover/leaver processes
- privileged access and “break glass” controls
What goes wrong: the seller rotates keys, changes federation settings, tightens firewall rules, or restricts admin access post-close. Users can’t log in—or worse, the wrong users can.
What good looks like: a Day-1 access checklist that is testable:
- “All Day-1 roles can authenticate with MFA and reach their core apps from corporate endpoints.”
- “All critical service accounts are owned, rotated, and tested under the Day-1 operating model.”
- “Privileged access works with named admins, and break-glass is documented and monitored.”
Decision trigger: If you can’t name the owner for every critical service account and integration credential, you’re not Day-1 ready—because your batch jobs aren’t Day-1 ready.
2) Transactions run end-to-end (not just screens)
Day-1 stability is rarely about the user interface. It’s about the invisible paths:
- order entry → fulfillment → invoice → cash application
- procure-to-pay approvals and vendor onboarding
- payroll inputs, time capture, and tax interfaces
- month-end close feeds and reporting extracts
What goes wrong: teams test logins and “happy path” workflows but miss the overnight batch jobs, EDI/SFTP transfers, and system-to-system calls that actually move money. The business finds out at the worst times: daily invoicing runs, payroll cutoff, month-end close.
What good looks like: a Day-1 “money flow” test script that proves transactions, not tasks:
- one order through to invoice
- one vendor invoice through to payment
- one payroll run through to payslip and bank file
- one close-critical report produced from the Day-1 data sources
Decision trigger: If the first close after Day-1 requires manual spreadsheet bridges for more than a small subset of accounts, you have a Day-1 finance risk, not an integration inconvenience.
3) Data boundaries are clear enough to run the business
Day-1 data issues are usually not “bad data.” They are boundary issues:
- which system is the source of truth for customer, product, vendor, employee
- what data can legally be shared across the boundary (especially in carve-outs)
- how master data changes propagate during the TSA period
- what KPIs mean now that you’re independent (even if systems are shared)
What goes wrong: teams inherit a shared master that the parent continues to change, or reporting definitions diverge silently across entities. The business then debates the numbers instead of executing the plan.
What good looks like: explicit Day-1 data ownership statements:
- “Customer master changes are owned by X; downstream systems consume via Y interface.”
- “These fields are out of scope due to legal constraints; here is the workaround.”
- “KPI definitions for revenue, gross margin, and backlog are locked for Day-1 to Day-30.”
Decision trigger: If you can’t reconcile revenue and receivables to the Day-1 reporting layer within the first reporting cycle, stop expanding scope and fix the data boundary. Everything else will move slower until you do.
4) Support and security can operate on Day-1
Day-1 is also the first day the seller’s incentives shift. They want you out, they want fewer tickets, and they will follow the TSA contract—not your urgency.
What goes wrong: there is no on-call model, no monitoring, no incident process that spans seller + buyer + NewCo. An outage becomes a three-way argument about responsibility.
What good looks like: a Day-1 operating model that includes:
- a single control room with named decision maker
- ticketing, monitoring, and escalation paths (including seller TSA contacts)
- incident severity definitions and response SLAs
- cyber controls that match the new boundary (logging, endpoint protection, privileged access)
Decision trigger: If your “support plan” is a list of contacts, you don’t have a support plan. You have a phone tree.
Choose your Day-1 design explicitly (and price the trade-offs)
There are three common Day-1 designs. Problems start when the deal says it picked one, but the technical reality behaves like another.
Pattern 1: TSA-heavy Day-1 (minimum change)
You keep the business on seller systems and rely on TSAs for continuity. This can be the right call when speed matters more than control.
Hidden cost: you are outsourcing your Day-1 stability to a party whose incentives change on Day-1.
If/then triggers:
- If the TSA term is under 9–12 months and identity/network access is shared, plan independence work immediately. Waiting makes the exit harder, not easier.
- If the seller won’t grant admin-level access for systems you must operate, assume delays and build fallbacks (manual invoicing paths, offline procedures, alternate reporting).
Pattern 2: Minimum viable independence (stand up the control plane)
You stand up a thin layer that gives NewCo control even if apps stay on the parent: identity, endpoints, network segmentation, logging, ticketing, and a few critical integrations.
This is often the best “risk-adjusted” Day-1 posture for carve-outs: not a full separation, but enough control to run without begging.
If/then triggers:
- If you’re inheriting regulated data or strict customer SLAs, independence of logging and access control is Day-1 scope, not Day-100 scope.
- If the business depends on always-on integrations (EDI, API partners), stand up monitoring and alerting inside NewCo, even if the interface endpoints remain on the parent.
Pattern 3: Integrated Day-1 (connect to buyer platforms)
In some acquisitions, you move fast to the buyer’s identity, endpoints, network, and selected shared services.
The trap: buyer readiness becomes the critical path. If the buyer’s identity, device management, and security controls can’t scale quickly, “integrated Day-1” becomes “partial access and weeks of exceptions.”
If/then triggers:
- If the buyer cannot onboard the target’s users and endpoints end-to-end before close (identity, device, access, support), don’t make it Day-1 scope. Use an interim model and phase the integration.
How best teams make Day-1 real: a one-page definition and a testable scorecard
Most Day-1 plans are task trackers. They have owners and dates, but they lack decision logic and pass/fail criteria.
Best teams create two artifacts that force clarity.
Artifact 1: the Day-1 definition (one page)
Write Day-1 as a business contract with three columns:
- Non-negotiables: “must work” outcomes (payroll, order entry, invoice run, customer support access).
- Degraded acceptable: what can be slower or manual for a bounded period (manual reporting bridge, limited self-service, temporary approval workarounds).
- Not Day-1 scope: explicitly deferred items (platform replacement, app rationalization, major data migration).
Every line needs an owner and a fallback.
Artifact 2: the Day-1 scorecard (tested, signed-off)
For each non-negotiable, define:
- test (what proves it works)
- owner (who signs off)
- dependency (TSA/system/party)
- fallback (what happens if the test fails)
Then run it like a product release: rehearse the full flow, including failures, and make the go/no-go call based on the scorecard—not optimism.
What to do in the next two weeks
If you’re inside 30–60 days to close, these actions reduce Day-1 risk fast:
- Write the Day-1 definition page (deal lead + COO + CIO). Non-negotiables, degraded acceptable, not in scope. Get it signed.
- Lock the identity strategy (CIO + security lead). Federation, MFA, privileged access, break-glass, and service account ownership. Test the top roles and the top integrations.
- Prove the money flows (CFO + IT lead). Run a mini end-to-end script for order-to-cash, procure-to-pay, and payroll using the Day-1 operating model.
- Turn TSAs into readiness gates (separation lead). For each TSA service, document what “available on Day-1” means in practical terms (permissions, hours, escalation, project work).
- Stand up the Day-1 operating model (PMO lead). Control room, incident process, monitoring, ticketing, and named decision rights across buyer/seller/NewCo.
Day-1 isn’t the close weekend. It’s the first day the business expects you to operate with new constraints and real accountability. Define it as an operating state, test it like a release, and you stop discovering your dependencies the hard way.