Topics
The topics listed here are tentative. Below is a rough summary.
Foundations
- Security mindset and threat modeling
- Risk prioritization; attacker goals/capabilities; STRIDE, Kill Chain.
Access control and identity
- Least privilege; DAC, MAC, RBAC/ABAC/ReBAC; capability systems; reference monitors.
- Authentication and federation at scale: OAuth2/OIDC, SAML, SCIM.
Information flow control (IFC)
- Flow policies, security lattices; static vs dynamic IFC; DIFC; taint tracking; language‑based security.
Privilege separation and isolation
- Processes, sandboxes, seccomp; containers/namespaces/cgroups; VMs and microVMs; TEEs (SGX/SEV/TDX).
Large‑scale and cloud‑native security
- Orchestration Plane security: RBAC, Network Policies, admission control, policy‑as‑code, multitenancy.
- Service mesh; secrets management (KMS, Vault).
- Serverless/event‑driven security; eBPF runtime enforcement; cloud logging and forensics.
Software supply chain security
- SBOM, provenance, Dependency risk (CVE/OSV), typosquatting, CI/CD hardening, build isolation.
Distributed systems and data security at scale
- Multicloud and data governance; Access control; Key management
- Consistency models and security; access patterns and data lineage.
Network security at scale
- Software Defined Networking; Intent Based Networking; TLS/mTLS, QUIC; DDoS mitigation and rate limiting.
- API security
Detection, telemetry, and response
- Auditing and host/network IDS; EDR/XDR; SIEM/SOAR pipelines; detection engineering
- Provenance analysis; APT kill chain; deception (canaries/honeytokens); evasion attacks.
IoT/edge/automotive security
- Secure boot and OTA updates; fleet management; ICS/IoT constraints.
- Automotive: V2X security, CAN/LIN IDS, HMI safety/usability.
Human factors, usability, and policy
- Secure defaults, consent, explainability; compliance (GDPR, HIPAA, PCI); governance and risk.
Recent research (curated readings)
- Cloud: policy‑as‑code, multitenancy isolation, eBPF‑based defenses.
- Supply chain: SBOM/provenance, artifact signing and verification.
- Microservices: dynamic IFC/taint tracking, service‑mesh identity.
- Containers/VMs: isolation hardening, TEEs in production.
- IoT/Automotive: access/flow control, IDS efficacy, usability of security controls.
- Enterprise: mimicry and evasion attacks, audit‑log integrity, EDR/XDR evaluations.