Series · 10 parts · ~64 min total
Security for Application Engineers
Apply STRIDE to every epic before a line of code is written, keeping threat modeling lightweight enough that engineering teams actually do it.
- 1
Threat Modeling per Feature
Apply STRIDE to every epic before a line of code is written, keeping threat modeling lightweight enough that engineering teams actually do it.
7 min
Feb 1, 2026
- 2
AuthN: Passwords, Passkeys, MFA
What authentication actually looks like to ship in 2026 — hashing, passkey flows, MFA tiers, and the pitfalls that kill real implementations.
6 min
Feb 8, 2026
- 3
AuthZ: RBAC, ReBAC, ABAC
Pick the right authorization model for your product, implement it with OPA or Cedar, and avoid the access-control patterns that leak data in real systems.
6 min
Feb 15, 2026
- 4
Session Management
Design session tokens, cookie attributes, refresh flows, and revocation so that a stolen token has a short blast radius and a logged-out user is actually logged out.
6 min
Feb 22, 2026
- 5
Input Validation and Injection Classes
Understand SQLi, XSS, SSRF, and command injection as feature risks, not checklist items — with concrete mitigations for each injection class.
6 min
Mar 1, 2026
- 6
Secrets at Rest and in Motion
How to manage encryption keys with a KMS, apply envelope encryption to sensitive database columns, and ensure nothing sensitive travels over unprotected channels.
6 min
Mar 8, 2026
- 7
Dependency and Supply Chain
Manage transitive dependencies, generate and consume SBOMs, sign artifacts, and catch the supply chain attacks that slip past standard dependency scanning.
6 min
Mar 15, 2026
- 8
Logging Without Leaks
Build structured logs that give you full observability during incidents without accidentally writing PII, credentials, or security-sensitive data into your log pipeline.
7 min
Mar 22, 2026
- 9
Multi-Tenancy and Isolation
Design tenant isolation that actually holds — scoping queries, preventing cross-tenant data leaks, and closing the privilege escalation paths that multi-tenant architectures create.
6 min
Mar 29, 2026
- 10
Incident Response Basics
Build the detection, containment, communication, and postmortem practices that turn a security incident from a chaotic crisis into a structured, survivable process.
8 min
Apr 5, 2026