Security Design Review Language
5 exercises — master security design review vocabulary: the review process and its SDLC placement, OWASP ASVS verification levels, shall vs should in security requirements, the four risk treatment options (accept/mitigate/transfer/avoid), and how to raise a precise security finding with description, impact, severity, and recommendation.
0 / 5 completed
Security design review quick reference
- Security design review — pre-code structured examination of a proposed design; catches architectural security issues before they are expensive to fix.
- Shift left — address security concerns in design phase; defects fixed in design are ~100x cheaper than post-deployment.
- OWASP ASVS levels — L1 (Opportunistic): all apps; L2 (Standard): apps with sensitive data; L3 (Advanced): high-assurance/banking/healthcare.
- SHALL vs SHOULD (RFC 2119) — SHALL = mandatory, blocks release; SHOULD = recommended, deviation needs documented rationale.
- Risk treatment — Accept (within appetite + documented); Mitigate (control reduces risk to acceptable); Transfer (insurance/SLA); Avoid (remove feature/component).
- Security finding structure — Description + Impact (CIA triad) + Severity (CVSS) + Recommendation (specific, actionable, addresses root cause).
- Risk appetite — the level of risk leadership accepts; defines the boundary between "accept" and "mitigate" decisions.
1 / 5
A security lead explains their team's practice: "We run a security design review on every significant feature before it hits code review. It's not a checkbox — it's a structured conversation between the security team and the feature team."
What is a security design review, what does it cover, and when in the SDLC should it happen?
Security design reviews catch architectural problems before code is written. A bug fixed in design costs ~10x less than after deployment (NIST/IBM research). The goal is a structured conversation, not a gatekeeping checkpoint.
Security design review agenda:
When to trigger a security design review:
• New external-facing feature or API endpoint
• Changes to authentication, authorisation, or session management
• New data collection involving PII or sensitive data
• Significant architectural change (new service, new external dependency, new data store)
• Integration with a third-party system
Key vocabulary:
• Security design review — structured pre-code examination of a proposed design; identifies architectural security issues before code is written
• Security champion — an engineer embedded in a development team who has security training and acts as the first line of security review; liaisons with central security team
• Shift left — the practice of addressing security concerns earlier in the development lifecycle, closer to design/development rather than testing/deployment
• Design-phase cost of fix — architectural flaws found in design are ~100x cheaper to fix than post-deployment; the economic argument for early security review
Security design review agenda:
| Area | Questions asked |
|---|---|
| Data flow | Where does data enter/leave the system? Is sensitive data identified and classified? |
| Trust boundaries | Where do trust levels change? Is input validated at each boundary crossing? |
| Authentication/Authz | How are users identified? What authorisation model is used? Are service-to-service calls authenticated? |
| Cryptography | What data needs encryption at rest and in transit? Which algorithms/libraries are used? |
| Threat model | Who are the threat actors? What are the most likely attack vectors for this feature? |
| Logging/audit | Are security-relevant events logged? Can we reconstruct an incident from logs? |
When to trigger a security design review:
• New external-facing feature or API endpoint
• Changes to authentication, authorisation, or session management
• New data collection involving PII or sensitive data
• Significant architectural change (new service, new external dependency, new data store)
• Integration with a third-party system
Key vocabulary:
• Security design review — structured pre-code examination of a proposed design; identifies architectural security issues before code is written
• Security champion — an engineer embedded in a development team who has security training and acts as the first line of security review; liaisons with central security team
• Shift left — the practice of addressing security concerns earlier in the development lifecycle, closer to design/development rather than testing/deployment
• Design-phase cost of fix — architectural flaws found in design are ~100x cheaper to fix than post-deployment; the economic argument for early security review