ARCHIVED from builddistributedsystem.com on 2026-04-28 — URL: https://builddistributedsystem.com/tracks/securitor
Tracks/The Securitor
26

The Securitor

Advanced
Operations|10 tasks

Distributed systems have a larger attack surface. Security is not optional. Build mTLS, JWT authentication, RBAC, envelope encryption, key rotation, and audit logging from first principles.

Subtracks & Tasks

Concepts Covered

JWTaccess tokenrefresh tokentoken verificationtoken expiryOAuth 2.0authorization code flowPKCEscopetoken refreshsessionsession IDsession fixationsession expirysession storageRBACrolespermissionsresource ownershipwildcard permissionsrate limitinginput validationSQL injection preventionsecurity headersOWASPAES-256-GCMsymmetric encryptionIVauthentication tagtamper detectionRSApublic keyprivate keydigital signaturekey pair generationSHA-256bcrypthash integritypassword hashingsaltwork factorKMSenvelope encryptionkey rotationdata keymaster keyescrowE2EEX3DH key agreementdouble ratchetperfect forward secrecysession keys

Prerequisites

It is recommended to complete the previous tracks before starting this one. Concepts build progressively throughout the curriculum.