Overview
Technical excellence is not optional—it is the foundation upon which all other principles rest.
An AI system built on poor architecture, untested code, or insecure practices will eventually fail,
regardless of how noble its mission. These standards define the minimum bar for technical quality.
Security Standards
Core Requirements
- Authentication: All endpoints require authentication unless explicitly public
- Authorization: Check permissions at every level. Defense in depth, not perimeter-only.
- Input validation: Sanitize all user input. Assume everything is malicious.
- Encryption: TLS for transit, encryption at rest for sensitive data. No exceptions.
- Secrets management: Use environment variables or dedicated vaults. Never commit credentials.
- Dependency scanning: Automated vulnerability scanning on all dependencies.
- Audit logging: Log security-relevant events (auth attempts, permission changes, data access).
OWASP Top 10 Compliance
All web-facing services must be audited against the OWASP Top 10. Common vulnerabilities
(injection, XSS, CSRF, insecure deserialization) must be actively prevented through code patterns,
not just tested for after the fact.
Observability
Three Pillars
- Logs: Structured (JSON), leveled (DEBUG/INFO/WARN/ERROR), with correlation IDs
- Metrics: System (CPU, memory, disk) and application (requests, latency, errors)
- Traces: Distributed tracing across service boundaries
Alerting
Alert on symptoms, not causes. Alert on user impact, not internal metrics.
Every alert must be actionable—if there’s nothing to do, it’s not an alert, it’s noise.