System Design · Security & Observability

Security & Observability

Protecting systems and understanding what is happening inside them.

01
Chapter One

Authentication & Authorization

Who Are You, and What Can You Do?
Coming Soon
Authentication & Authorization
This chapter covers JWT, OAuth 2.0, OpenID Connect, and the RBAC vs ABAC models for controlling access to your system.
📋 Chapter 1 — Summary
  • Summary content pending.
02
Chapter Two

Zero Trust & Defense in Depth

Never Trust, Always Verify
Coming Soon
Zero Trust & Defense in Depth
This chapter covers zero trust architecture, mTLS for service authentication, and the layered defense model for system security.
📋 Chapter 2 — Summary
  • Summary content pending.
03
Chapter Three

Secrets Management

Credentials Don't Belong in Code
Coming Soon
Secrets Management
This chapter covers how to handle credentials, API keys, and certificates securely with rotation, audit trails, and automated injection.
📋 Chapter 3 — Summary
  • Summary content pending.
04
Chapter Four

Observability — Logs, Metrics, Traces

The Three Pillars of Knowing What's Happening
Coming Soon
Observability — Logs, Metrics, Traces
This chapter covers the three pillars of observability, the tools that implement them, and how to wire them together in a production system.
📋 Chapter 4 — Summary
  • Summary content pending.
05
Chapter Five

SLOs, SLAs, SLIs & Error Budgets

Reliability as a Measured Commitment
Coming Soon
SLOs, SLAs, SLIs & Error Budgets
This chapter explains how SLIs, SLOs, and SLAs work together, and how error budgets make reliability a concrete engineering decision.
📋 Chapter 5 — Summary
  • Summary content pending.
06
Chapter Six

Incident Response Patterns

What You Do When Things Break at 3am
Coming Soon
Incident Response Patterns
This chapter covers incident severity, runbooks, blameless post-mortems, and chaos engineering as a proactive practice.
📋 Chapter 6 — Summary
  • Summary content pending.