product-infrastructure-security-engineer
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseProduct Infrastructure Security Engineer
产品基础设施安全工程师
When to Use
适用场景
- Threat-model product features, internal APIs, workers, and customer-facing infrastructure
- Design or review tenant isolation, authorization boundaries, and customer data-plane controls
- Harden product-owned services with secure defaults, service auth, rate limits, audit logs, and encryption
- Review product IaC or runtime changes for cross-tenant data leaks and abuse paths
- Support incidents involving customer workloads, tenant blast radius, or product security regressions
- 对产品功能、内部API、工作负载及面向客户的基础设施进行威胁建模
- 设计或评审租户隔离、授权边界及客户数据平面控制措施
- 通过安全默认设置、服务认证、速率限制、审计日志和加密加固产品自有服务
- 审查产品IaC或运行时变更,排查跨租户数据泄露和滥用路径
- 支持涉及客户工作负载、租户影响范围或产品安全退化的事件处理
When NOT to Use
不适用场景
- Implement corporate IdP, KMS, PAM, SIEM, or EDR systems →
information-security-engineer - Add CI/CD security gates, SBOMs, or supply-chain controls only →
devsecops - Run SOC alert triage and detection tuning →
defensive-security-analyst - Execute authorized pentests or exploit validation →
offensive-security-analyst - Build general IDP, golden paths, or developer portals →
platform-engineer - Define company-wide security strategy or GRC roadmap →
cybersecurity - Design RAG/copilot/LLM solution architecture →
applied-ai-architect-commercial-enterprise
- 部署企业IdP、KMS、PAM、SIEM或EDR系统 →
information-security-engineer - 仅添加CI/CD安全门禁、SBOM或供应链控制 →
devsecops - 执行SOC告警分诊和检测调优 →
defensive-security-analyst - 执行授权渗透测试或漏洞验证 →
offensive-security-analyst - 构建通用IDP、黄金路径或开发者门户 →
platform-engineer - 制定公司级安全策略或GRC路线图 →
cybersecurity - 设计RAG/copilot/LLM解决方案架构 →
applied-ai-architect-commercial-enterprise
Related skills
相关技能
| Need | Skill |
|---|---|
| Org-wide IAM, KMS ops, SIEM | |
| Pipeline scans, SBOM, CI OIDC | |
| Product feature code and APIs | |
| Core cloud/K8s provisioning | |
| IDP templates and portal | |
| Pentest reproduction | |
| Customer-impacting incident comms | |
| AI copilot/RAG architecture | |
| K8s namespace isolation and deploy | |
| 需求 | 技能角色 |
|---|---|
| 企业级IAM、KMS运维、SIEM | |
| 流水线扫描、SBOM、CI OIDC | |
| 产品功能代码与API | |
| 核心云/K8s配置 | |
| IDP模板与门户 | |
| 渗透测试复现 | |
| 影响客户的事件沟通 | |
| AI copilot/RAG架构 | |
| K8s命名空间隔离与部署 | |
Core Workflows
核心工作流
1. Product threat modeling
1. 产品威胁建模
Scope the product boundary (what attackers and tenants can reach):
- List actors: customer user, tenant admin, partner integration, internal operator, anonymous
- Map assets: customer data, credentials, billing, config, audit logs
- Draw data flows across services and stores
- Identify trust boundaries (tenant, region, env)
- Prioritize threats: cross-tenant access, privilege escalation, data exfil, abuse
- Record mitigations and residual risk owners
See for STRIDE-lite worksheet.
references/product_threat_model.md明确产品边界(攻击者和租户可触及的范围):
- 列出角色:客户用户、租户管理员、合作伙伴集成、内部操作员、匿名用户
- 梳理资产:客户数据、凭证、账单信息、配置、审计日志
- 绘制跨服务和存储的数据流向
- 识别信任边界(租户、区域、环境)
- 优先级排序威胁:跨租户访问、权限提升、数据泄露、滥用
- 记录缓解措施及剩余风险负责人
参考获取STRIDE-lite工作表。
references/product_threat_model.md2. Multi-tenant isolation
2. 多租户隔离
Isolation goals:
- No cross-tenant read/write on data paths
- Blast radius contained per tenant on compromise
- Strong tenant ID in every authZ decision (never trust client-supplied tenant alone)
Patterns: row-level security, per-tenant keys, namespace isolation, dedicated cells for enterprise tier.
See for patterns and test cases.
references/multi_tenant_isolation.md隔离目标:
- 数据路径上无跨租户读写权限
- 发生入侵时,影响范围限制在单个租户内
- 每个授权决策都包含有效的租户ID(绝不单独信任客户端提供的租户信息)
常用模式:行级安全、租户专属密钥、命名空间隔离、企业级租户专属单元。
参考获取模式和测试用例。
references/multi_tenant_isolation.md3. Service and API security baselines
3. 服务与API安全基线
Every product service should default to:
- Authenticated internal calls (mTLS or signed service tokens)
- AuthZ at resource level, not only route level
- Input validation and size limits on APIs
- Structured audit logs for security-relevant actions
- No secrets in images; workload identity for cloud APIs
See for checklist and anti-patterns.
references/secure_service_defaults.md每个产品服务应默认配置:
- 内部调用认证(mTLS或签名服务令牌)
- 资源级授权,而非仅路由级授权
- API输入验证及大小限制
- 安全相关操作的结构化审计日志
- 镜像中不存储密钥;使用工作负载身份访问云API
参考获取检查清单和反模式。
references/secure_service_defaults.md4. Customer data protection
4. 客户数据保护
| Control | Product infra angle |
|---|---|
| Encryption at rest | Per-tenant or per-table keys where required |
| Encryption in transit | TLS everywhere; no TLS termination that exposes plaintext internally without justification |
| Retention | Deletion hooks for account closure |
| Logging | Redact PII in product logs; separate security audit stream |
See for key hierarchy and deletion workflow.
references/customer_data_protection.md| 控制措施 | 产品基础设施视角 |
|---|---|
| 静态加密 | 按需使用租户专属或表级密钥 |
| 传输加密 | 全链路TLS;无正当理由不得在内部暴露明文的TLS终止 |
| 数据留存 | 账号注销时的删除钩子 |
| 日志记录 | 产品日志中脱敏PII;分离安全审计流 |
参考获取密钥层级和删除工作流。
references/customer_data_protection.md5. Abuse and resilience
5. 防滥用与韧性
- Rate limits per tenant/user/IP on public and partner APIs
- Idempotency and replay protection on sensitive mutations
- Circuit breakers on dependency calls that handle tenant context
- Quotas on expensive operations (exports, bulk API)
Align with defensive monitoring for anomaly signals.
- 公共API和合作伙伴API按租户/用户/IP设置速率限制
- 敏感操作的幂等性与重放保护
- 处理租户上下文的依赖调用断路器
- 高成本操作(导出、批量API)的配额限制
与防御性监控对齐,识别异常信号。
6. Security design review (product infra)
6. 安全设计评审(产品基础设施)
Review triggers: new data store, new cross-service API, tenancy model change, new integration surface, crypto change.
Review output:
- Findings with severity
- Required controls before launch
- Test plan (isolation tests, negative authZ cases)
- Rollback / feature flag recommendation
See for review template.
references/security_design_review.md评审触发条件: 新增数据存储、新增跨服务API、租户模型变更、新增集成面、加密方案变更。
评审输出:
- 带严重级别的发现项
- 上线前需落实的控制措施
- 测试计划(隔离测试、授权否定用例)
- 回滚/功能标志建议
参考获取评审模板。
references/security_design_review.md7. Incident support (product scope)
7. 事件支持(产品范围)
When customer workloads are affected:
- Confirm blast radius (which tenants, regions)
- Preserve tenant-scoped logs and configs
- Coordinate containment without cross-tenant impact
- Post-incident: add regression test and detection
Hand off enterprise IR/comms to when required.
cybersecurity当客户工作负载受影响时:
- 确认影响范围(涉及哪些租户、区域)
- 保留租户范围的日志和配置
- 协调遏制措施,避免影响其他租户
- 事后:添加回归测试和检测机制
必要时将企业级事件响应/沟通移交角色。
cybersecurityWhen to load references
何时调用参考文档
- Threat modeling →
references/product_threat_model.md - Tenancy →
references/multi_tenant_isolation.md - Service baselines →
references/secure_service_defaults.md - Data and crypto →
references/customer_data_protection.md - Design reviews →
references/security_design_review.md
- 威胁建模 →
references/product_threat_model.md - 租户管理 →
references/multi_tenant_isolation.md - 服务基线 →
references/secure_service_defaults.md - 数据与加密 →
references/customer_data_protection.md - 设计评审 →
references/security_design_review.md