Skip to content

Security Principles

Foundation Track | 4 Modules | ~2 hours total

The mindset and principles of building secure systems. Concepts that apply regardless of which tools, languages, or platforms you use.


Every system you build will be attacked. The question isn’t “if” but “when” and “how prepared are you?”

Security principles teach you to:

  • Think like attackers to defend against them
  • Design systems that are secure by default
  • Layer defenses so one failure doesn’t mean total compromise
  • Manage identity and access with least privilege

This isn’t about memorizing checklists. It’s about developing the security mindset that makes those checklists obvious.


#ModuleTimeDescription
4.1The Security Mindset25-30 minAttacker thinking, security principles, trust
4.2Defense in Depth30-35 minLayered security, network/app/data layers
4.3Identity and Access Management30-35 minAuthentication, authorization, least privilege
4.4Secure by Default30-35 minSecure defaults, guardrails, configuration

START HERE
┌─────────────────────────────────────┐
│ Module 4.1 │
│ The Security Mindset │
│ └── Attacker's advantage │
│ └── Core security principles │
│ └── Trust boundaries │
│ └── Security vs. theater │
└──────────────────┬──────────────────┘
┌─────────────────────────────────────┐
│ Module 4.2 │
│ Defense in Depth │
│ └── Security layers │
│ └── Network security │
│ └── Application security │
│ └── Data security │
└──────────────────┬──────────────────┘
┌─────────────────────────────────────┐
│ Module 4.3 │
│ Identity and Access Management │
│ └── Authentication factors │
│ └── Authorization models │
│ └── Least privilege │
│ └── Service identity │
└──────────────────┬──────────────────┘
┌─────────────────────────────────────┐
│ Module 4.4 │
│ Secure by Default │
│ └── Default state matters │
│ └── Guardrails and constraints │
│ └── Configuration as code │
│ └── Secure deployment patterns │
└──────────────────┬──────────────────┘
COMPLETE
┌──────────────┼──────────────┐
│ │ │
▼ ▼ ▼
DevSecOps Security Distributed
Discipline Toolkit Systems

ConceptModuleWhat It Means
Attack Surface4.1Everything an attacker could target
Least Privilege4.1, 4.3Grant minimum necessary permissions
Defense in Depth4.2Layer independent security controls
Zero Trust4.1, 4.2Never trust, always verify
Fail Secure4.1When things fail, fail to secure state
Trust Boundary4.1Where data crosses trust levels
Authentication4.3Proving identity (who are you?)
Authorization4.3Granting access (what can you do?)
RBAC4.3Role-Based Access Control
Secure by Default4.4Security without explicit configuration
Guardrails4.4Constraints that prevent mistakes
Immutable Infrastructure4.4Deploy new, never update in place


After completing Security Principles, you’re ready for:

TrackWhy
DevSecOps DisciplinePut security into practice in CI/CD
Security Tools ToolkitLearn specific tools (Vault, OPA, Falco)
CKS CertificationKubernetes security specialization
Distributed SystemsSecurity in distributed architectures

Books referenced throughout this track:

  • “The Web Application Hacker’s Handbook” — Dafydd Stuttard
  • “Threat Modeling: Designing for Security” — Adam Shostack
  • “Building Secure and Reliable Systems” — Google
  • “Container Security” — Liz Rice

Standards and Frameworks:

  • OWASP Top 10 — owasp.org/Top10
  • NIST Cybersecurity Framework — nist.gov/cyberframework
  • CIS Benchmarks — cisecurity.org/cis-benchmarks

Question to AskWhy It Matters
”What could go wrong?”Threat modeling starts here
”Who would want to attack this?”Determines threat level and investment
”What’s the blast radius?”Scopes potential damage
”How would we know?”Detection and monitoring
”What’s the secure default?”Security shouldn’t require action
”What do I implicitly trust?”Hidden assumptions are vulnerabilities

“Security is not a product, but a process.” — Bruce Schneier