Logging — no sensitive data; adequate observability.
Documentation — public APIs and operational changes documented.
Secrets and environment variables. No secret values in .env, config.yaml, values.yaml, container images, Helm charts, Terraform state, static Kubernetes Secret manifests, deployment-tool environment blocks, or CI logs. Every new env var that holds a secret must source from Vault at runtime via a workload-bound auth method (Vault AWS / Kubernetes / AppRole / OIDC) — see Secrets Management → Application configuration and environment variables. .env.example may carry placeholder values only.
Changes to authentication, IAM/RBAC, billing, customer-data export, and key-management code paths require a second reviewer from the Security team via CODEOWNERS.