Basic Framework
Breakdownsystem-designresearch-cardSystem Design

System Design Card 436 — Authentication and Security / Breakdown

Authentication And Security — BASIC step map

Concern

Security concerns determine access, data exposure, auditability, and abuse surfaces. Sensitive notifications, file storage, and admin tooling all need explicit identity and authorization decisions.

Decomposition is a skill, not a step you skip.

What Breakdown means for this concern

In BASIC, the Breakdown step is where you clarify the product goal, workload shape, and non-functional requirement that will dominate the design. For Authentication and Security, that means the candidate should make this concern visible at the right moment instead of bolting it on at the end.

Design move

A good move is to split the problem before trying to solve it. Tie the concern back to the user flow, the workload, and the dominant trade-off. That keeps the design grounded and makes it easier for the interviewer to follow why a cache, queue, replica, partition, or rate limiter is actually necessary.

Common miss

The miss is leaving auth as a generic box and never saying what is being protected or how. BASIC helps because the staged flow keeps this concern proportional to the prompt and connected to the rest of the architecture.

BASIC prompt

“When I reach the Breakdown stage, how does Authentication and Security change the architecture, the trade-offs, or the review checklist?”

From practice
When reviewing mock interviews, the single biggest predictor of a strong performance is whether the candidate paused here long enough to restate the problem in their own words. Not parroting the prompt — genuinely translating it into something they can work with.

References

S9 S14 S15

Related in System Design

January 16, 2023

BASIC for system design interviews: the most reliable sequence for thinking at architecture scale

System design interviews are not just “bigger coding interviews.”

April 10, 2025

System Design Card 356 — Requirements Clarification / Breakdown

Every design starts with defining what must be true for the system to be considered successful. A notification system for security alerts is a different system from a marketing…

April 12, 2025

System Design Card 357 — Requirements Clarification / Assess

Every design starts with defining what must be true for the system to be considered successful. A notification system for security alerts is a different system from a marketing…