Security Engineering
13 chaptersThis page contains all chapters in this theme. Open chapters in sequence or use this page as a section map.
Why know Security Engineering
Original ContenteasyIntroductory chapter: why security is part of architecture, what topics the section includes and how to go through it.
Open chapterThreat Modeling: STRIDE and LINDDUN
Original ContentmediumPractical threat modeling for security and privacy: DFD, STRIDE/LINDDUN, and prioritization of architectural controls.
Open chapterOWASP Top 10 in the context of System Design
Original ContentmediumHow to apply OWASP Top 10 in distributed systems architecture: threat modeling, architectural controls and secure defaults.
Open chapterIdentification, Authentication and Authorization (AuthN/AuthZ)
Original ContenteasyA practical introduction to the Identification -> Authentication -> Authorization trio and modern protocols: OAuth 2.0/OIDC, SAML, WebAuthn, mTLS.
Open chapterRights management approaches: ACL, RBAC, ABAC, ReBAC
Original ContentmediumPractical analysis of ACL/RBAC/ABAC/ReBAC: how access decisions are made, canonical schemes, comparison of trade-offs and limits of applicability.
Open chapterEncryption, keys and TLS: how it works in practice
Original ContentmediumA practical introduction to asymmetric encryption, PKI/certificates, key infrastructure, and how TLS 1.3 works.
Open chapterAPI Security Patterns
Original ContentmediumPractical API security patterns: authn/authz, rate limiting, schema validation, anti-replay, abuse prevention and secure API lifecycle.
Open chapterSecrets Management Patterns
Original ContentmediumHow to securely manage secrets: secret stores, rotation, dynamic credentials, encryption-at-rest and operational guardrails.
Open chapterZero Trust: a modern approach to architectural security
Original ContentmediumA practical introduction to Zero Trust: principles, reference architecture, policy enforcement and phased implementation.
Open chapterSupply Chain Security
Original ContentmediumSoftware supply chain protection: SBOM, dependency hygiene, CI/CD hardening, artifact signing and provenance verification.
Open chapterData Governance & Compliance
Original ContentmediumPractical data governance design: GDPR, Federal Law-152, data lineage, PII handling, access control and audit of data changes.
Open chapterBuilding Secure and Reliable Systems (short summary)
Book SummaryhardGoogle practices: Zero Trust, defense in depth, secure SDLC, incident response and security culture.
Open chapterThe Untold Story of Log4j and Log4Shell
DocumentaryhardSpeech by Christian Grobmeier on the Log4Shell crisis and practical lessons in open source security.
Open chapter