Operational Considerations Reliability (Delivery guarantees, retries, idempotency.) Observability (Logging/metrics—without exposing sensitive material.) Security operations Key compromise scenarios Incident response notes Safe defaults