What is security?
Protecting systems and data-concepts that apply in every environment.
Confidentiality, integrity, availability
Security is often described as protecting three things: confidentiality (only the right people see data), integrity (data is not altered wrongly), and availability (systems are there when needed).
These three principles form the "CIA triad," a fundamental model for thinking about security. Every security measure addresses one or more of these concerns. Encryption protects confidentiality, checksums protect integrity, and redundancy protects availability.
How it's done in applications
Applications use authentication and authorization to control who can do what. They encrypt data in transit (e.g. HTTPS) and at rest (e.g. encrypted database fields). They log and monitor activity to detect misuse. They patch vulnerabilities and follow secure development practices.
These concepts apply whether the app runs on your own servers or in the cloud. In fact, cloud providers offer many managed security services that handle encryption, access control, and monitoring, making it easier to build secure applications.
Defense in depth
Defense in depth means using multiple layers of security. If one layer fails, others still protect you. For example, you might use: network firewalls, application firewalls, authentication, authorization, encryption, and monitoring.
Each layer adds protection, but also complexity. The key is finding the right balance for your threat model. A public-facing web app needs more layers than an internal tool.
Cloud providers excel at defense in depth. They provide security at the network, compute, storage, and application layers, often with managed services that handle the complexity for you.
Network Firewall
Allow or deny traffic by IP, port, and protocol. First line of defense at the network edge.
App Firewall
Protects the application from attacks (e.g. SQL injection, XSS). Inspects requests before they reach your code.
Authentication
Verifies who the user is—login, password, MFA. No identity, no access.
Authorization
Decides what the user can do—roles, permissions. Same person, different access levels.
Encryption
Scrambles data in transit (HTTPS) and at rest so only authorized parties can read it.
Monitoring
Logs and alerts so you spot anomalies and respond. You can't defend what you can't see.
Multiple layers protect you—if one fails, others still defend your system.
Threat modeling and risk assessment
Security isn't about being perfectly secure-that's impossible. It's about understanding your threats and risks, then applying appropriate controls. Threat modeling helps you identify what could go wrong and how to prevent it.
Common threats include: unauthorized access, data breaches, denial of service attacks, and insider threats. Each threat has different mitigations. Understanding threats helps you prioritize security work.
Risk assessment considers both the likelihood of a threat and its impact. High-impact, high-likelihood threats get the most attention. Low-impact, low-likelihood threats might not be worth mitigating.
High Risk Threats
- Unauthorized access (data breach)
- Ransomware attacks
- Insider threats
- DDoS attacks
Mitigation Strategies
- Strong authentication (MFA)
- Regular backups
- Access logging & monitoring
- Rate limiting & CDN
Risk Assessment Matrix
Prioritize threats by likelihood × impact. High-impact, high-likelihood threats get immediate attention. Low-impact, low-likelihood threats might not be worth mitigating.
Security in the development lifecycle
Security from the start - not bolted on at the end. Code reviews, security testing, dependency scanning, and guidelines.
DevSecOps = security inside the pipeline. Checks run on every build: dependency scan, SAST, container scan, secrets detection. Catch issues early when they're cheap to fix.
Cloud providers offer scanning tools and compliance guides. Same idea everywhere: automate checks so humans fix real issues.
DevSecOps = security in the pipeline
Checks run on every build. Catch issues early.
Security checks in CI/CD
Dependency scan
Find vulnerable libraries
SAST
Static code analysis
Container scan
Image vulnerabilities
Secrets detection
Prevent credential leaks
Incident response and monitoring
Incident response = detect → contain → recover. Have a plan before something goes wrong so recovery is fast.
Monitoring and logging = know what "normal" looks like so you spot anomalies. Cloud providers offer logging and alerting; use them.
Plan + monitoring = you're ready when an incident happens.
Incident response = detect → contain → recover. Have a plan before something goes wrong.
Detect
Spot the incident
Contain
Stop it spreading
Recover
Fix and restore
Monitoring & logging
Know what "normal" looks like so you spot anomalies. Use logs and alerts—cloud providers offer both.
Sign in to track progress on your dashboard.
Ready to see how this works in the cloud?
Switch to Career Paths on the Academy page for structured paths (e.g. Developer, DevOps) and provider-specific lessons.
View role-based paths