Skip to main content
← All Series

Series · 10 parts · ~64 min total

Security for Application Engineers

Apply STRIDE to every epic before a line of code is written, keeping threat modeling lightweight enough that engineering teams actually do it.

  1. 1

    Threat Modeling per Feature

    Apply STRIDE to every epic before a line of code is written, keeping threat modeling lightweight enough that engineering teams actually do it.

    7 min

    Feb 1, 2026

  2. 2

    AuthN: Passwords, Passkeys, MFA

    What authentication actually looks like to ship in 2026 — hashing, passkey flows, MFA tiers, and the pitfalls that kill real implementations.

    6 min

    Feb 8, 2026

  3. 3

    AuthZ: RBAC, ReBAC, ABAC

    Pick the right authorization model for your product, implement it with OPA or Cedar, and avoid the access-control patterns that leak data in real systems.

    6 min

    Feb 15, 2026

  4. 4

    Session Management

    Design session tokens, cookie attributes, refresh flows, and revocation so that a stolen token has a short blast radius and a logged-out user is actually logged out.

    6 min

    Feb 22, 2026

  5. 5

    Input Validation and Injection Classes

    Understand SQLi, XSS, SSRF, and command injection as feature risks, not checklist items — with concrete mitigations for each injection class.

    6 min

    Mar 1, 2026

  6. 6

    Secrets at Rest and in Motion

    How to manage encryption keys with a KMS, apply envelope encryption to sensitive database columns, and ensure nothing sensitive travels over unprotected channels.

    6 min

    Mar 8, 2026

  7. 7

    Dependency and Supply Chain

    Manage transitive dependencies, generate and consume SBOMs, sign artifacts, and catch the supply chain attacks that slip past standard dependency scanning.

    6 min

    Mar 15, 2026

  8. 8

    Logging Without Leaks

    Build structured logs that give you full observability during incidents without accidentally writing PII, credentials, or security-sensitive data into your log pipeline.

    7 min

    Mar 22, 2026

  9. 9

    Multi-Tenancy and Isolation

    Design tenant isolation that actually holds — scoping queries, preventing cross-tenant data leaks, and closing the privilege escalation paths that multi-tenant architectures create.

    6 min

    Mar 29, 2026

  10. 10

    Incident Response Basics

    Build the detection, containment, communication, and postmortem practices that turn a security incident from a chaotic crisis into a structured, survivable process.

    8 min

    Apr 5, 2026