Security

Role-based access control

Signed webhooks and replay protection

Audit logs for privileged actions