Request to execution flow consists of decoding user data, validating and encoding with new credentials.
Each proxy request generate an event, exported for event server
Event server can persist or export to one of many monitoring services
Metrics from event server are feed into fraud detector service, a ML service for risk management and notification.