Trust boundaries. Draw a data-flow diagram first: browser → BFF → retrieval → tools → vendors. Every hop needs encryption (TLS 1.2+, KMS-managed keys at rest), tenant isolation (separate DB schemas or row-level security), and least-privilege IAM scoped to job roles—not ‘*’ service accounts.
Runtime hardening. Distroless/minimal images, signed builds, SBOM, continuous CVE scanning, and enforced mTLS inside the mesh so a compromised microservice cannot freely laterally move.
Data tiers. Tier-0 public marketing copy can hit shared SaaS inference; tier-1 engineering docs stay in VPC with self-hosted or private endpoints; tier-2 HR/legal may disable whole features (agents, browsing) regardless of user complaints.
Key custody. Customer-managed keys (CMK) for regulated tenants; HSM-backed unwrap flows; break-glass procedures rehearsed quarterly.
Culture. Security is not ‘enable CloudTrail’—it is product tradeoffs: slower features vs breach likelihood. Say that aloud in panels.