Use this section to document environments, deployment topology, secrets handling, observability, and dependencies.
Suggested Contents
- Runtime platforms and environments
- Network boundaries and ingress paths
- Secrets and identity management
- Logging, metrics, and tracing
- Backup and recovery expectations