An architect is designing a large-scale enterprise system with multiple services.
The requirements state that every action that modifies data must be logged for auditing purposes, and every incoming request must be checked for valid authentication credentials.
How are these two requirements best categorized?