๐บ๏ธ Product Security Ramp-Up Tracks
Intro: New people do not need a random reading pile. They need a path that builds judgment in an order that makes sense for the role.
What this page includes
- 30-day and 90-day learning ideas
- different tracks for engineers, platform specialists, and managers
- how to mix reading, review, and labs
- how to know the learner is progressing
Example tracks
Product Security engineer, first 30 days
- threat modeling basics and API security;
- CI/CD trust boundaries and secret scanning;
- cloud identity and workload federation;
- runtime investigation basics and one tabletop.
Platform security engineer, first 30 days
- runner isolation, OIDC, and deployment trust;
- Terraform and policy-as-code pages;
- Kubernetes baseline and runtime investigation;
- provider-specific attack chains.
Product Security manager, first 60-90 days
- operating model, metrics, and exception governance;
- architecture review and threat modeling;
- incident playbooks and detection engineering basics;
- stakeholder communication and roadmap planning.
Progress signals
Learners should be able to:
- review a design and identify trust boundaries;
- explain why a machine identity is risky;
- spot one or two real release-gate gaps;
- walk through the first 15 minutes of a product incident.
Related pages
Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.