PS Product SecurityKnowledge Base

Appendices

Reading Paths

Section focus: Appendices.
Best use: pick a starting path based on the kind of reviewer, builder, or leader you want to become faster.

Reader goal Best path
Become useful quickly as a newcomer Guided Learning Paths for Newcomers โ†’ From Zero to Useful โ†’ Security Review Checklists and Cheat Sheets
Learn API review as a beginner API Authentication and Authorization โ†’ API Review Checklist โ†’ Worked Example API Review Lab
Learn Kubernetes review as a beginner Kubernetes Security Baseline โ†’ Kubernetes Deployment Review Checklist โ†’ Runtime Investigation Playbook for Kubernetes and Containers
Build a release-gating model in GitLab GitLab CI YAML Deep Dive โ†’ Security Quality Gates and Release Blocking โ†’ GitHub, GitLab, and Cloud Trust Patterns
Learn product threat modeling that actually changes designs Threat Modeling Methods and Workflows โ†’ Multi-Tenant and Microservice Threat Modeling โ†’ Multi-Tenant SaaS and Admin-Plane Patterns
Improve product detection and incident response Logging and Telemetry Strategy โ†’ High-Signal Detection Patterns and SIEM Examples โ†’ Product Security Incident Response Playbooks
Tighten cloud identity controls Workload Federation and Non-Human Identities โ†’ GitHub, GitLab, and Cloud Trust Patterns โ†’ AWS IAM and Role Design
Learn frontend and session security Browser Security Foundations: CSP, CORS, Cookies, and Sessions โ†’ OAuth for SPA, BFF, and Frontend Secret Anti-Patterns
Practice business-logic abuse review API Authorization, Business-Flow Abuse, and Third-Party API Consumption โ†’ Business Logic Abuse Review Playbook โ†’ Tenant Isolation, Object-Level, and Workflow Abuse
Ramp up a new Product Security engineer Product Security Ramp-Up Tracks โ†’ Security Review Checklists and Cheat Sheets โ†’ Break-Fix Labs and Tabletop Scenarios
Practice API contract security before runtime API Design and Contract Security โ†’ API Definition Conformance Lab - OpenAPI, Contract Linting, AuthZ Checks, and CI Validation โ†’ API Testing, Observability, and Release Gates
Build a standards and assurance lens Cloud Security Frameworks and Standards โ€” Practical Map โ†’ Vendor Guides and Standards Map โ†’ DevSecOps Assessment Framework (DAF) and DSOMM โ€” Practical Positioning
Build a broader Product Security reading and community map Product Security Ecosystem Projects, Communities, and Learning Hubs โ†’ Top Books for Product Security by Domain and Role โ†’ Three-Month Product Security Self-Study Plan
Learn from notable public practitioners and leaders Product Security Contributors, Authors, and Community Builders โ†’ Julie Davila and Vincent Danen โ€” Product Security Leadership Notes

Deepening path: browser, abuse, and integration reviewers

  1. Frontend Security Review Playbook
  2. Business Logic Abuse Review Playbook
  3. API Authorization, Business-Flow Abuse, and Third-Party API Consumption
  4. GitHub Actions and GitLab Components Review Playbook
  5. Worked Example Lab: Frontend Session Review