Guided Lab Brief

Security, Authentication & Encryption

Compose ingress security, authn/authz, rate limiting, and crypto boundaries into one coherent flow.

Overview

Compose ingress security, authn/authz, rate limiting, and crypto boundaries into one coherent flow.

Security architecture is only credible when each layer has a precise job.

You will build 7 architecture steps that model production dependencies.

You will run 1 failure experiment to observe bottlenecks and recovery behavior.

Success target: Only authenticated and rate-limited traffic reaches business API; sensitive data remains encrypted end-to-end.

Learning Objectives

  • Can explain complete auth/security request path
  • Can justify token TTL and rate-limit policy decisions
  • Can articulate encryption boundary placement and rationale

Failure Modes to Trigger

  • Trigger: Extend token TTL too far and observe elevated replay risk window

    Observe: Stolen tokens stay valid for too long, increasing blast radius of credential compromise.