Checklists

Privacy-First Architecture implementation checklist

This checklist provides a technical framework for validating that an application adheres to privacy-first principles before deployment, focusing on data minimization, infrastructure sovereignty, and user agency.

Progress0 / 30 complete (0%)

Data Minimization and Sanitization

0/5
  • PII Log Sanitization

    critical

    Verify that application loggers (e.g., Winston, Pino) use middleware to redact emails, physical addresses, and full names before writing to stdout or disk.

  • IP Address Masking

    critical

    Configure reverse proxies (Nginx/Traefik) or application code to mask the last octet of IPv4 addresses and the last 80 bits of IPv6 addresses.

  • Database Schema Audit

    recommended

    Review every column in the production schema; remove any fields that are not strictly required for the application's core functionality.

  • Temporary Data TTLs

    recommended

    Set Time-To-Live (TTL) indexes on session stores and temporary caches to ensure data is automatically purged after inactivity.

  • Client-Side Storage Cleanup

    recommended

    Verify that sensitive data is cleared from localStorage or sessionStorage upon user logout or session expiration.

Infrastructure and Data Sovereignty

0/5
  • EU-Only Compute Region

    critical

    Confirm that all cloud resources (Compute, DB, Object Storage) are provisioned exclusively in EU regions (e.g., eu-central-1) to avoid Schrems II complications.

  • Sub-processor Audit

    critical

    Trace every outgoing network request from the production environment to ensure no data is sent to US-based services without a valid DPA.

  • Self-Hosted Asset Verification

    recommended

    Ensure all fonts, icons, and JavaScript libraries are hosted on your own infrastructure rather than via third-party CDNs like Google Fonts or cdnjs.

  • Database Encryption at Rest

    critical

    Verify that the underlying storage for Postgres/MySQL/NoSQL instances is encrypted using AES-256 with managed or customer-provided keys.

  • Encrypted Backups

    critical

    Test backup restoration from an encrypted snapshot to ensure that backup files are not stored in cleartext on secondary storage.

Analytics and Tracking Compliance

0/5
  • Cookie-less Analytics Setup

    critical

    Verify that Plausible, Umami, or Fathom is configured to run without generating or storing persistent browser cookies.

  • Do-Not-Track (DNT) Respect

    recommended

    Validate that the analytics script or backend logic checks for the 'DNT' header and suppresses tracking if present.

  • Event Property Scrubbing

    critical

    Scan all custom event metadata in PostHog or Matomo to ensure no dynamic user-input strings (like search queries) contain PII.

  • Session Recording Masking

    critical

    If using session replay, verify that all input fields and sensitive text elements are masked via CSS classes before being uploaded.

  • Fingerprinting Prevention

    recommended

    Ensure that the tracking implementation does not use Canvas fingerprinting or TLS ja3 hashes to identify users across sessions.

AI and Third-Party API Integration

0/5
  • LLM Training Opt-Out

    critical

    Verify that API requests to LLM providers (e.g., OpenAI, Anthropic) include the specific flag or account setting to opt-out of data training.

  • Local Embedding Generation

    recommended

    Configure the application to generate vector embeddings locally (e.g., using Transformers.js or Ollama) instead of sending raw text to cloud APIs.

  • PII Pre-filtering for APIs

    recommended

    Implement a regex-based or NLP filter to strip names and emails from user prompts before they are sent to external AI services.

  • Webhook Payload Minimization

    recommended

    Review outgoing webhooks (e.g., to Stripe or Slack) and ensure they only send the minimum required IDs rather than full user objects.

  • Local LLM Fallback

    optional

    Implement a local model fallback for processing highly sensitive data categories that cannot leave the VPC.

User Rights and Data Portability

0/5
  • Automated Data Export (SAR)

    recommended

    Verify that users can trigger a self-service download of all their personal data in a machine-readable format (JSON/CSV).

  • Hard Deletion Cascade

    critical

    Confirm that a 'Delete Account' action triggers a hard delete across all primary databases, related tables, and object storage buckets.

  • Backup Purge Cycle

    recommended

    Verify that the backup retention policy is set to 30 days or less to ensure that deleted user data is eventually purged from all archives.

  • Consent Withdrawal Verification

    critical

    Test that revoking consent for marketing or analytics immediately halts all associated data collection and processing activities.

  • Consent Audit Logging

    recommended

    Ensure that every change in user consent is logged with a timestamp and the version of the privacy policy accepted.

Communications and Email

0/5
  • Privacy-First Email Provider

    recommended

    Verify that transactional emails are sent via privacy-respecting providers (e.g., Listmonk, Buttondown) rather than marketing-heavy platforms.

  • Tracking Pixel Removal

    critical

    Disable open-tracking and click-tracking pixels in transactional emails to prevent leaking user IP and device data to the ESP.

  • Email Link Proxying

    recommended

    Ensure that links in emails do not include identifying tokens in the URL parameters that could be leaked to third-party sites via Referer headers.

  • Double Opt-In Workflow

    critical

    Validate that the newsletter or notification subscription process requires a confirmed double opt-in to prevent malicious signups.

  • List Segmentation Privacy

    optional

    Verify that email lists are segmented without exporting entire user databases to the email service provider.