Maintain a searchable catalog of every field your automations touch, including sensitivity labels, lawful basis, source systems, destinations, and retention expectations. When something feels unclear, document assumptions, link screenshots, and schedule a review. Cataloging reduces surprises and shortens incident investigations when time and clarity matter most.
Use lightweight diagrams to mark inputs, outputs, storage locations, and people or tools with access. Add notes for tokens, scopes, and webhooks. A quick sketch reveals hidden copies, risky forks, and loops that duplicate sensitive records long after original tasks finish.
Challenge every field you pass along. If a phone number or birthdate is not essential for the outcome, drop it early. Smaller payloads crash less, log cleaner, and dramatically reduce what could leak during errors, vendor breaches, or misdirected emails.





