Advanced Security #design-review #ASVS #risk-treatment #CVSS

Security Design Review Language

5 exercises — master security design review vocabulary: the review process and its SDLC placement, OWASP ASVS verification levels, shall vs should in security requirements, the four risk treatment options (accept/mitigate/transfer/avoid), and how to raise a precise security finding with description, impact, severity, and recommendation.

0 / 5 completed
Security design review quick reference
  • Security design review — pre-code structured examination of a proposed design; catches architectural security issues before they are expensive to fix.
  • Shift left — address security concerns in design phase; defects fixed in design are ~100x cheaper than post-deployment.
  • OWASP ASVS levels — L1 (Opportunistic): all apps; L2 (Standard): apps with sensitive data; L3 (Advanced): high-assurance/banking/healthcare.
  • SHALL vs SHOULD (RFC 2119) — SHALL = mandatory, blocks release; SHOULD = recommended, deviation needs documented rationale.
  • Risk treatment — Accept (within appetite + documented); Mitigate (control reduces risk to acceptable); Transfer (insurance/SLA); Avoid (remove feature/component).
  • Security finding structure — Description + Impact (CIA triad) + Severity (CVSS) + Recommendation (specific, actionable, addresses root cause).
  • Risk appetite — the level of risk leadership accepts; defines the boundary between "accept" and "mitigate" decisions.
1 / 5

A security lead explains their team's practice: "We run a security design review on every significant feature before it hits code review. It's not a checkbox — it's a structured conversation between the security team and the feature team."

What is a security design review, what does it cover, and when in the SDLC should it happen?