Security and governance
Explicit, readable, practical.
Access control, least privilege, role scoped access.
Audit logs, execution traces, artifact retention policy.
Data handling, explicit inputs, explicit outputs.
Reliability, health endpoints, incident handling procedures.