Security & Operations (Shortlist)
Secure endpoints (TLS), credentials/roles, and least privilege. Monitor lag, consumer errors, and DLQ rates. Scale via partitions, consumer groups, and sharding. Backups and retention matter for compliance and replay.