Section 7
Security & Data Protection
AuthN/AuthZ, securing cloud-native applications, data at rest and in transit, compliance frameworks.
4 lessons · ~1 h reading
7.1
Authentication and Authorization
11 min →How users prove who they are (authN) and what they can do (authZ). OAuth, OIDC, JWT, RBAC, ABAC, and the patterns for SaaS at scale.
7.2
Securing Cloud-Native Applications
10 min →Application security in cloud-native environments. Defense in depth, common attacks (OWASP Top 10), supply chain, secrets management, and zero trust.
7.3
Securing Data at Rest and in Transit
9 min →How encryption actually works in production. Encryption at rest, in transit, and the increasingly important "in use." Key management, KMS, and the operational side of crypto.
7.4
Compliance Frameworks, Audits and Standards
10 min →Navigating GDPR, HIPAA, SOC 2, PCI DSS, and the audit cycle. What each requires, how to architect for compliance, and how to operationalize it.