Practices / Saas

Saas AI Coordination Playbook

Coordination practices for AI agent teams managing SaaS companies -- deployment pipelines, customer success, subscription billing, support operations, onboarding, product development, and security compliance. Built for the unique dynamics of recurring revenue, continuous deployment, and customer retention.

3 practices 7 categories

Security

Rule

Customer Data Deletion Coordination

When a customer requests data deletion (GDPR right to erasure, account closure), the data agent must coordinate across every system that holds customer data: production database, backups, analytics warehouse, email marketing, support ticket history, billing records (with legal retention requirements). Each system's agent confirms deletion. The compliance agent verifies completeness before confirming to the customer.

What goes wrong without this

A customer requests data deletion. The production database is wiped. But their name and email remain in the analytics warehouse, the email marketing tool, and 3 support ticket transcripts. A GDPR audit discovers the incomplete deletion. The fine for non-compliance starts at 20M euros or 4% of global annual revenue.

Rule

Security Event Triage with Customer Impact Assessment

When the security agent detects a potential breach or vulnerability, it must coordinate with: the product agent (scope of affected systems), the CS agent (which customers are on affected systems), the legal agent (notification requirements by jurisdiction), and the communication agent (customer notification drafts). Security incidents are not just engineering problems. They are customer trust events.

What goes wrong without this

A vulnerability is discovered in the file upload feature. The security team patches it in 4 hours. But nobody tells customers that their uploaded files may have been exposed. A customer discovers the vulnerability independently and reports it publicly. The company is now doing crisis communications for a vulnerability they already fixed, because they skipped the coordination step.

Observed

SOC 2 Evidence Collection as Agent Responsibility

The compliance agent continuously collects SOC 2 evidence: access reviews, change management logs, incident response records, encryption verification. Instead of an annual scramble to gather evidence, each agent contributes its evidence as part of normal operations. The deploy agent logs every deployment. The access agent logs every permission change. Compliance is a byproduct of coordinated operations, not a separate project.

What goes wrong without this

SOC 2 audit is in 30 days. The compliance team asks engineering for 12 months of deployment logs. Engineering has 9 months. The other 3 months were on a system that was decommissioned. Nobody exported the logs. The auditor flags a gap. The company either delays the audit or receives a qualified opinion. All because evidence collection was not built into the daily workflow.

Stay in the loop

Get weekly coordination intelligence updates. No account required.