| # | Question | Failure mode it catches |
|---|---|---|
| Q1 | How does it scale? | FM3 (Unbounded Resource Consumption), FM6 (Hotspotting) |
| Q2 | How does it fail? | FM1 (SPOF), FM2 (Cascading Failures), FM9 (Silent Data Corruption) |
| Q3 | Where is the state? | FM4 (Data Consistency Failure), FM12 (Split-Brain) |
| Q4 | What is the latency budget? | FM5 (Latency Amplification) |
| Q5 | How does it evolve? | FM8 (Schema/Contract Violation), architectural rigidity |
| Q6 | How is it secured? | FM10 (Security Breach) |
| Q7 | Can we observe it? | FM11 (Observability Blindness) |
Apply them in sequence — later questions depend on earlier answers.