System Design SpaceSystem Design Space
Onboarding
Back to table of contents

Security Engineering

13 chapters

This page contains all chapters in this theme. Open chapters in sequence or use this page as a section map.

1

Why know Security Engineering

Original Contenteasy

Introductory chapter: why security is part of architecture, what topics the section includes and how to go through it.

Open chapter
2

Threat Modeling: STRIDE and LINDDUN

Original Contentmedium

Practical threat modeling for security and privacy: DFD, STRIDE/LINDDUN, and prioritization of architectural controls.

Open chapter
3

OWASP Top 10 in the context of System Design

Original Contentmedium

How to apply OWASP Top 10 in distributed systems architecture: threat modeling, architectural controls and secure defaults.

Open chapter
4

Identification, Authentication and Authorization (AuthN/AuthZ)

Original Contenteasy

A practical introduction to the Identification -> Authentication -> Authorization trio and modern protocols: OAuth 2.0/OIDC, SAML, WebAuthn, mTLS.

Open chapter
5

Rights management approaches: ACL, RBAC, ABAC, ReBAC

Original Contentmedium

Practical analysis of ACL/RBAC/ABAC/ReBAC: how access decisions are made, canonical schemes, comparison of trade-offs and limits of applicability.

Open chapter
6

Encryption, keys and TLS: how it works in practice

Original Contentmedium

A practical introduction to asymmetric encryption, PKI/certificates, key infrastructure, and how TLS 1.3 works.

Open chapter
7

API Security Patterns

Original Contentmedium

Practical API security patterns: authn/authz, rate limiting, schema validation, anti-replay, abuse prevention and secure API lifecycle.

Open chapter
8

Secrets Management Patterns

Original Contentmedium

How to securely manage secrets: secret stores, rotation, dynamic credentials, encryption-at-rest and operational guardrails.

Open chapter
9

Zero Trust: a modern approach to architectural security

Original Contentmedium

A practical introduction to Zero Trust: principles, reference architecture, policy enforcement and phased implementation.

Open chapter
10

Supply Chain Security

Original Contentmedium

Software supply chain protection: SBOM, dependency hygiene, CI/CD hardening, artifact signing and provenance verification.

Open chapter
11

Data Governance & Compliance

Original Contentmedium

Practical data governance design: GDPR, Federal Law-152, data lineage, PII handling, access control and audit of data changes.

Open chapter
12

Building Secure and Reliable Systems (short summary)

Book Summaryhard

Google practices: Zero Trust, defense in depth, secure SDLC, incident response and security culture.

Open chapter
13

The Untold Story of Log4j and Log4Shell

Documentaryhard

Speech by Christian Grobmeier on the Log4Shell crisis and practical lessons in open source security.

Open chapter