| Environment and secret boundaries | High | Fast iteration environments can blur production and experimental controls. | Map secret sources and confirm no secret appears in runtime output. |
| Access and deploy permissions | High | Broad deploy/admin access increases accidental or malicious change risk. | Review permission model and enforce least-privilege for production changes. |
| Data protection and restore path | Medium | Recovery gaps turn operational incidents into customer-impact events. | Validate backup cadence and restore test evidence for key datasets. |
| Operational observability | Low | Incomplete traces delay remediation and executive communication. | Confirm request-to-impact traceability on top user workflows. |