Operations and the Single Source of Truth
The operational backbone of a family office is rarely the part the principal cares about and almost always the part that determines whether the rest of the office works. A family office without a consolidated reporting platform is running its multi-entity, multi-custodian, multi-jurisdictional balance sheet on spreadsheets — and the cost of getting that wrong, in audit complications, silent reconciliation errors, key-person dependencies, and compounding data-integrity problems, is one of the most expensive antipatterns in the working profession. This section catalogs the patterns that make the operational layer load-bearing rather than improvisational.
Two structural choices anchor the section: the single source of truth (the consolidated reporting platform — Asset Vantage, Masttro, Addepar, Eton AtlasFive, FundCount, or a peer) and the outsourced chief investment officer arrangement (the third-party investment-management arrangement common for families below the SFO-staffing threshold and increasingly for those above). Around them cluster the cybersecurity, regulatory-compliance, and staffing patterns that distinguish a working family office from a wealth-management retainer with extra steps.
What belongs here
A pattern belongs in Operations when it is a system, vendor relationship, or compliance posture that supports the office’s day-to-day work. The single source of truth is the consolidated reporting platform. The outsourced chief investment officer is a third-party investment-management arrangement. The family-office cybersecurity stack is the layered defensive architecture. The family office exclusion (SEC Rule 202(a)(11)(G)) is the regulatory architecture that makes the SFO structurally distinct from a registered RIA.
A pattern does not belong here if it is a governance instrument (Governance), a deal architecture (Capital Deployment), a measurement discipline (Impact Measurement), or a philanthropic-integration choice (Philanthropic Integration). Operations is what runs the rest of the office, not what the office is for.
Antipatterns belong in Operations when the failure mode is operational. Spreadsheet source of truth is the canonical operations antipattern, named because it is among the most expensive failures in working practice. AUM-fee capture is the structural conflict that arises when the family’s primary advisor is paid as a percentage of assets under management — a conflict the book’s editorial position names directly because the working profession discusses it openly while published advisor material almost never does.
Highlights
- Single Source of Truth — the consolidated reporting platform that holds the family’s full balance sheet across entities, custodians, asset classes, and jurisdictions in one auditable, queryable system.
- Outsourced Chief Investment Officer — the third-party investment-management arrangement; OCIO/RIA distinction, fee structures, conflicts of interest in selection.
- Family Office Cybersecurity Stack — MDR, MFA enforcement, executive-protection-grade endpoint security, social-engineering training, incident response, cyber insurance.
- Family Office Exclusion (SEC Rule 202(a)(11)(G)) — the Dodd-Frank-era SEC rule that exempts qualifying family offices from RIA registration; the regulatory architecture for the SFO structure.
- Spreadsheet Source of Truth — the antipattern of running the consolidated balance sheet on Excel; one of the most expensive operational failures in working practice.
- AUM-Fee Capture — the structural conflict that arises when the primary advisor is paid as a percentage of AUM; the most-named conflict in working-practitioner conversation, almost never named in published advisor material.
How the patterns compose
The operations stack is layered. The single source of truth holds the data; the OCIO (or in-house investment team) operates against the data; the cybersecurity stack protects the data; the SEC family-office exclusion is the regulatory umbrella under which all of it operates without RIA registration; the staffing patterns determine who actually runs each layer. A family that gets the data layer right and the cybersecurity wrong has a sophisticated balance sheet that is also exfiltrable; a family that gets the cybersecurity right and the data layer wrong defends a balance sheet it cannot itself reliably read.
The section’s editorial position is that operational antipatterns are routinely the largest source of avoidable cost in family-office practice, that they are quiet rather than spectacular (a cyber breach is loud; a reconciliation drift is silent), and that naming them gives the principal and the operating staff vocabulary for problems that vendors prefer to address by selling product rather than by reorganizing the work.
Every entry in this section closes with the standard advisory disclaimer. The vendor and platform names that appear in entries are reference-grade examples of the pattern, not endorsements; vendor selection is jurisdictional, family-specific, and out of scope for any single entry.