Governance first
Traceability
Fail-safe posture
Gateway and runtime network model
Pairing and trust boundaries
Authentication and token model
Health and troubleshooting