PracHub
QuestionsPremiumLearningGuidesInterview PrepNEWCoaches
|Home/System Design/Robinhood

Design authorization and audit logging systems

Last updated: Mar 29, 2026

Quick Overview

This question evaluates competency in designing secure authorization and audit logging systems, including access-control models (RBAC/ABAC/hybrid), policy representation and evaluation, low-latency enforcement, caching and invalidation, threat modeling, immutable audit trails, ingestion and storage, and anomaly detection.

  • medium
  • Robinhood
  • System Design
  • Software Engineer

Design authorization and audit logging systems

Company: Robinhood

Role: Software Engineer

Category: System Design

Difficulty: medium

Interview Round: Onsite

## Scenario You are building security infrastructure for internal services at a fintech company. Two key components are needed: ## Part A — Internal authorization (access control) Design an internal permission and access-control system used by employees, services, and automated jobs. ### Requirements - Support common authorization models: - RBAC (role-based access control) - ABAC (attribute-based access control) - Enforce **least privilege** and support separation of duties. - Permission changes (grant/revoke) should take effect quickly across the fleet. - Must support low-latency authorization checks on hot paths. ### Topics to cover - Choosing RBAC vs ABAC vs hybrid, and why. - Policy representation and evaluation (where policies live, how they are authored). - Caching authorization decisions: what to cache, cache invalidation strategy, and correctness guarantees. - Multi-tenant and service-to-service authorization. - Threat model: bypass attempts, replay, confused deputy, privilege escalation. ## Part B — Security audit logging + monitoring Design a security audit and monitoring system that records sensitive operations and detects anomalies. ### Requirements - Record immutable audit events for actions like permission changes, data exports, key/secret access. - Provide: - ingestion/collection, - durable storage, - query/search for investigations, - alerting for suspicious patterns. - Must not significantly impact the main business request path. - Prevent or detect **log tampering** (including by insiders) and support retention/compliance. ### Topics to cover - Event schema, idempotency, ordering guarantees. - Collection approach (agent vs library vs sidecar), buffering, backpressure. - Storage choices, indexing strategy, retention tiers. - Alerting/anomaly detection primitives (rules, thresholds, baselines). - Integrity mechanisms (WORM storage, hash chaining, signing, access controls). - Operational considerations (cost, on-call, failure modes, disaster recovery).

Quick Answer: This question evaluates competency in designing secure authorization and audit logging systems, including access-control models (RBAC/ABAC/hybrid), policy representation and evaluation, low-latency enforcement, caching and invalidation, threat modeling, immutable audit trails, ingestion and storage, and anomaly detection.

Related Interview Questions

  • Design a Photo Album App - Robinhood (medium)
  • Design a distributed job scheduler - Robinhood
  • Design a Photo Management Service - Robinhood (medium)
  • Design a job scheduler with SLA and logs - Robinhood (medium)
  • Design an At-Most-Once Job Scheduler - Robinhood (medium)
Robinhood logo
Robinhood
Jan 22, 2026, 12:00 AM
Software Engineer
Onsite
System Design
11
0
Loading...

Scenario

You are building security infrastructure for internal services at a fintech company. Two key components are needed:

Part A — Internal authorization (access control)

Design an internal permission and access-control system used by employees, services, and automated jobs.

Requirements

  • Support common authorization models:
    • RBAC (role-based access control)
    • ABAC (attribute-based access control)
  • Enforce least privilege and support separation of duties.
  • Permission changes (grant/revoke) should take effect quickly across the fleet.
  • Must support low-latency authorization checks on hot paths.

Topics to cover

  • Choosing RBAC vs ABAC vs hybrid, and why.
  • Policy representation and evaluation (where policies live, how they are authored).
  • Caching authorization decisions: what to cache, cache invalidation strategy, and correctness guarantees.
  • Multi-tenant and service-to-service authorization.
  • Threat model: bypass attempts, replay, confused deputy, privilege escalation.

Part B — Security audit logging + monitoring

Design a security audit and monitoring system that records sensitive operations and detects anomalies.

Requirements

  • Record immutable audit events for actions like permission changes, data exports, key/secret access.
  • Provide:
    • ingestion/collection,
    • durable storage,
    • query/search for investigations,
    • alerting for suspicious patterns.
  • Must not significantly impact the main business request path.
  • Prevent or detect log tampering (including by insiders) and support retention/compliance.

Topics to cover

  • Event schema, idempotency, ordering guarantees.
  • Collection approach (agent vs library vs sidecar), buffering, backpressure.
  • Storage choices, indexing strategy, retention tiers.
  • Alerting/anomaly detection primitives (rules, thresholds, baselines).
  • Integrity mechanisms (WORM storage, hash chaining, signing, access controls).
  • Operational considerations (cost, on-call, failure modes, disaster recovery).

Solution

Show

Comments (0)

Sign in to leave a comment

Loading comments...

Browse More Questions

More System Design•More Robinhood•More Software Engineer•Robinhood Software Engineer•Robinhood System Design•Software Engineer System Design
PracHub

Master your tech interviews with 7,500+ real questions from top companies.

Product

  • Questions
  • Learning Tracks
  • Interview Guides
  • Resources
  • Premium
  • For Universities
  • Student Access

Browse

  • By Company
  • By Role
  • By Category
  • Topic Hubs
  • SQL Questions
  • Compare Platforms
  • Discord Community

Support

  • support@prachub.com
  • (916) 541-4762

Legal

  • Privacy Policy
  • Terms of Service
  • About Us

© 2026 PracHub. All rights reserved.