Topics

The topics listed here are tentative. Below is a rough summary.

Foundations

  • Security mindset and threat modeling
  • Risk prioritization; attacker goals/capabilities; STRIDE, Kill Chain.

Access control and identity

  • Least privilege; DAC, MAC, RBAC/ABAC/ReBAC; capability systems; reference monitors.
  • Authentication and federation at scale: OAuth2/OIDC, SAML, SCIM.

Information flow control (IFC)

  • Flow policies, security lattices; static vs dynamic IFC; DIFC; taint tracking; language‑based security.

Privilege separation and isolation

  • Processes, sandboxes, seccomp; containers/namespaces/cgroups; VMs and microVMs; TEEs (SGX/SEV/TDX).

Large‑scale and cloud‑native security

  • Orchestration Plane security: RBAC, Network Policies, admission control, policy‑as‑code, multitenancy.
  • Service mesh; secrets management (KMS, Vault).
  • Serverless/event‑driven security; eBPF runtime enforcement; cloud logging and forensics.

Software supply chain security

  • SBOM, provenance, Dependency risk (CVE/OSV), typosquatting, CI/CD hardening, build isolation.

Distributed systems and data security at scale

  • Multicloud and data governance; Access control; Key management
  • Consistency models and security; access patterns and data lineage.

Network security at scale

  • Software Defined Networking; Intent Based Networking; TLS/mTLS, QUIC; DDoS mitigation and rate limiting.
  • API security

Detection, telemetry, and response

  • Auditing and host/network IDS; EDR/XDR; SIEM/SOAR pipelines; detection engineering
  • Provenance analysis; APT kill chain; deception (canaries/honeytokens); evasion attacks.

IoT/edge/automotive security

  • Secure boot and OTA updates; fleet management; ICS/IoT constraints.
  • Automotive: V2X security, CAN/LIN IDS, HMI safety/usability.

Human factors, usability, and policy

  • Secure defaults, consent, explainability; compliance (GDPR, HIPAA, PCI); governance and risk.

Recent research (curated readings)

  • Cloud: policy‑as‑code, multitenancy isolation, eBPF‑based defenses.
  • Supply chain: SBOM/provenance, artifact signing and verification.
  • Microservices: dynamic IFC/taint tracking, service‑mesh identity.
  • Containers/VMs: isolation hardening, TEEs in production.
  • IoT/Automotive: access/flow control, IDS efficacy, usability of security controls.
  • Enterprise: mimicry and evasion attacks, audit‑log integrity, EDR/XDR evaluations.
Previous