Secure by Design: Why Documenting Access Is Your Best Defense