This curriculum spans the breadth of application security work seen in multi-workshop technical advisory programs, covering threat modeling, secure deployment, and compliance activities comparable to those conducted during internal capability builds in mid-to-large engineering organisations with mature security practices.
Module 1: Threat Modeling and Risk Assessment
- Conducting STRIDE-based threat modeling during design phase to identify spoofing, tampering, and elevation of privilege risks in microservices architecture.
- Selecting between qualitative risk scoring (e.g., DREAD) and quantitative methods (e.g., FAIR) based on organizational risk appetite and audit requirements.
- Integrating threat modeling outputs into Jira tickets to ensure development teams address identified threats before coding begins.
- Managing scope creep in threat models by defining clear system boundaries and data flows for cloud-native applications using Kubernetes.
- Coordinating cross-functional workshops with architects, developers, and security teams to validate threat scenarios and assign ownership.
- Updating threat models incrementally when third-party APIs or identity providers are introduced into the application ecosystem.
Module 2: Secure Authentication and Authorization
- Choosing between OAuth 2.0 and OpenID Connect based on whether identity verification or delegated access is the primary requirement.
- Implementing multi-factor authentication using time-based one-time passwords (TOTP) or WebAuthn, considering user device compatibility and support burden.
- Configuring short-lived JWTs with secure refresh token rotation mechanisms to reduce exposure from token theft.
- Enforcing role-based access control (RBAC) policies at both API gateway and service levels to prevent privilege escalation.
- Handling session persistence and revocation in distributed systems using Redis with TTL and secure eviction policies.
- Managing consent screens and scope disclosures in compliance with GDPR and CCPA when integrating third-party identity providers.
Module 3: Secure Coding Practices and Code Review
- Enforcing input validation using allow-listing for API endpoints that accept user-generated content to prevent injection attacks.
- Integrating static application security testing (SAST) tools like SonarQube or Checkmarx into CI pipelines with fail-on-critical thresholds.
- Conducting peer-led secure code reviews using checklists tailored to common vulnerabilities such as XXE, SSRF, and insecure deserialization.
- Disabling dangerous language features (e.g., Java deserialization, Python eval()) in production runtime configurations.
- Managing false positives in SAST results by tuning rule sets and maintaining a documented suppression process with security team approval.
- Documenting and tracking secure coding standards in a version-controlled repository accessible to all development teams.
Module 4: Data Protection and Encryption
- Classifying data sensitivity levels (public, internal, confidential) to determine appropriate encryption and access controls.
- Implementing field-level encryption for personally identifiable information (PII) in databases using application-layer keys.
- Selecting between envelope encryption with AWS KMS or Azure Key Vault versus on-prem HSMs based on regulatory and latency requirements.
- Managing key rotation schedules and ensuring backward compatibility during decryption of legacy encrypted records.
- Securing data in transit using TLS 1.3 with strict cipher suite policies and certificate pinning for mobile clients.
- Designing secure backup strategies that include encrypted snapshots and access logging for restoration operations.
Module 5: API and Web Service Security
- Validating and sanitizing all API inputs using schema definitions (e.g., OpenAPI) and automated middleware.
- Rate-limiting API endpoints to mitigate brute-force and denial-of-service attacks, with dynamic thresholds based on client identity.
- Implementing mutual TLS (mTLS) for service-to-service communication in zero-trust environments.
- Exposing only necessary endpoints in public APIs and deprecating unused versions with clear communication timelines.
- Logging and monitoring API request patterns for anomalies using tools like AWS CloudTrail or Splunk.
- Securing GraphQL endpoints against query depth and complexity attacks using query cost analysis and limits.
Module 6: Infrastructure and Deployment Security
- Hardening container images by removing unnecessary packages, running as non-root, and scanning for CVEs using Trivy or Clair.
- Enforcing infrastructure-as-code (IaC) security by scanning Terraform or CloudFormation templates with Checkov or tfsec.
- Implementing immutable infrastructure patterns to prevent runtime configuration drift and unauthorized changes.
- Configuring network segmentation using VPCs, security groups, and service mesh policies to limit lateral movement.
- Managing secrets using dedicated vault solutions (e.g., HashiCorp Vault) instead of environment variables or config files.
- Establishing deployment gates in CI/CD pipelines that require security scan approval before promoting to production.
Module 7: Incident Response and Monitoring
- Defining detection rules in SIEM systems (e.g., Splunk, Sentinel) to identify anomalous login patterns or data exfiltration attempts.
- Instrumenting applications with structured logging that includes context for security events without exposing sensitive data.
- Conducting tabletop exercises to validate incident response playbooks for scenarios like data breaches or ransomware.
- Establishing secure, isolated communication channels for incident response teams during active security events.
- Preserving forensic artifacts such as memory dumps, logs, and container images in write-once storage for legal admissibility.
- Coordinating post-incident reviews to update controls and prevent recurrence, with documented action items and owners.
Module 8: Compliance and Governance
- Mapping security controls to regulatory frameworks such as HIPAA, PCI-DSS, or SOC 2 based on business operations and customer contracts.
- Conducting internal audits using standardized checklists and evidence collection procedures to prepare for third-party assessments.
- Managing data residency requirements by configuring geo-fenced deployments and routing logic in cloud environments.
- Documenting data processing activities and maintaining records of consent for GDPR Article 30 compliance.
- Establishing a vulnerability disclosure program with defined intake, triage, and response procedures for external researchers.
- Reviewing third-party vendor security posture through questionnaires, audits, or shared compliance reports (e.g., SOC 2 Type II).