Security by Design: What We Actually Mean and Build

Security by Design: What We Actually Mean and Build

Pekka Tamminen
Pekka Tamminen

14 Apr 2026

8 min read

Security by design is one of those phrases that appears in every cloud vendor’s marketing material but rarely in their actual architecture. This article explains what security by design means in practice when you build and operate cloud infrastructure for organizations in healthcare, energy, and other regulated sectors. If you are a tech lead, architect, or CTO responsible for infrastructure that cannot afford to fail, this is what you should be building.

Security by design is not a feature you add later

Here is what usually happens. A team builds an application or migrates a workload to the cloud. They focus on functionality, performance, and deadlines. Somewhere near the end, someone asks about security. A firewall is configured. Some access controls are added. A penetration test is scheduled. The project ships.

That is security as an afterthought, and it is still the dominant model in most organizations. The problem is not that people do not care about security. The problem is that bolting security onto a finished system is expensive, incomplete, and fragile. You end up with controls that do not match the actual threat model, configurations that drift over time, and gaps that nobody discovers until an incident forces the question.

Security by design means the opposite. You start with the business risk. You define what needs to be protected and from whom. Then you build the architecture so that every component, every connection, and every access path reflects those requirements from the beginning. Security is not a layer you add. It is a property of the system itself.

Starting from business needs, not compliance checklists

The first mistake most organizations make is starting with a compliance checklist. NIS2 says we need this. ISO 27001 requires that. DORA mandates the other thing. The checklist gets ticked. The auditor is satisfied. And the actual security posture may still be weak.

Real security by design starts with the business. What does this system do? What data does it process? What happens if it is unavailable for an hour, a day, a week? Who would want to attack it, and what would they gain? These questions produce a threat model, and the threat model drives every architectural decision that follows.

When we design cloud environments at Cloud2, the first conversation is never about which firewall to use. It is about what the organization actually needs to protect and what the realistic threats look like. A healthcare provider processing patient data faces different risks than an energy company managing grid control systems, even if both end up running on AWS. The architecture must reflect those differences.

Compliance follows naturally from good security design. If you build an architecture that genuinely protects the business, you will meet most compliance requirements as a side effect. If you build an architecture to meet compliance requirements, you may still leave the business exposed.

The layered model: strategy, logic, and technical architecture

Security by design works in layers, and each layer must connect to the one above it. At Cloud2, we think about this as three layers that must be traceable from top to bottom.

The strategic layer defines what matters. This is where the business objectives, risk appetite, and regulatory requirements are translated into security principles. For example: all patient data must be encrypted at rest and in transit with customer-managed keys, or no administrative access to production systems without multi-party approval.

The logical layer defines how those principles are implemented in the architecture. This means identity and access management design, network segmentation strategy, data classification and protection schemes, and monitoring and detection architecture. Every control at this layer should trace back to a specific strategic requirement.

The technical layer defines the actual implementation. Infrastructure as code templates that enforce secure defaults. CI/CD pipelines with integrated security scanning. Runtime monitoring that detects anomalies against established baselines. Every configuration at this layer should trace back to a logical design decision.

The traceability matters. When an auditor asks why a particular network segment exists, or when an incident responder needs to understand why a specific alert fired, the answer should be traceable all the way back to a business requirement. If it cannot be traced, it is either unnecessary or undocumented, and both are problems.

Principles that actually show up in the code

Security by design principles are easy to state and hard to implement consistently. Here is what they look like when they are real, not just written in a policy document.

Least privilege means every identity, whether human or machine, gets exactly the permissions it needs and nothing more. In practice, this means using IAM policies that are scoped to specific resources and actions, not broad admin roles. It means service accounts that are rotated automatically and have time-limited credentials. It means that nobody has standing access to production; instead, access is granted through a just-in-time process with approval, logging, and automatic expiration.

Defense in depth means that no single control is expected to stop every threat. Network segmentation limits lateral movement. Encryption protects data even if network controls fail. Application-level validation catches attacks that bypass infrastructure defenses. Monitoring detects activity that all other controls missed. Each layer assumes the previous one might fail.

Secure by default means new resources are created with restrictive settings that must be explicitly opened, not permissive settings that must be manually restricted. In a well-designed infrastructure-as-code template, a new S3 bucket is private, encrypted, versioned, and access-logged before anyone writes the first line of application code. A new Kubernetes namespace inherits network policies that deny all ingress by default.

Immutable infrastructure means you do not patch running systems. You replace them. When a security update is needed, you build a new image, test it, and deploy it. The old instance is destroyed. This eliminates configuration drift, reduces the attack surface of long-running systems, and makes rollback straightforward.

Integrating security into the development pipeline

Security by design does not work if it only exists in architecture documents. It has to be embedded in the way teams build and deploy software every day.

This is where DevSecOps becomes practical rather than theoretical. Security scanning happens in the CI/CD pipeline, not in a quarterly review. Infrastructure as code templates are scanned for misconfigurations before they reach production. Container images are checked for known vulnerabilities before deployment. Secrets management is automated so that credentials never appear in code repositories.

At Cloud2, we build these checks into the pipeline as gates, not suggestions. A deployment that introduces a critical vulnerability does not proceed. A configuration change that violates a security policy is rejected automatically. The goal is to catch problems at the earliest possible point, when they are cheapest and easiest to fix.

This requires investment in tooling and process, but the alternative is worse. Manual security reviews are slow, inconsistent, and do not keep pace with modern deployment frequency. If your team deploys multiple times per day, your security controls need to operate at the same speed.

Continuous adaptation, not a one-time design

The biggest misconception about security by design is that it is a one-time activity. You design the architecture, implement the controls, and you are done.

In reality, the threat landscape changes constantly. New vulnerabilities are discovered. Attackers develop new techniques. Regulations evolve. Your own business changes; new applications are deployed, new integrations are added, new data flows are created.

A security architecture that was well-designed two years ago may have significant gaps today, not because it was poorly built, but because the world moved. Security by design includes a commitment to continuous assessment: regular threat modeling reviews, architecture fitness evaluations, and security posture assessments that identify where the design no longer matches the reality.

NIS2 reinforces this point. It requires not just risk management measures but ongoing review and improvement. The directive recognizes that static security is not security at all.

What this means for your next cloud project

If you are starting a new cloud project or rearchitecting an existing one, here is the practical takeaway.

Do not start with the technology. Start with the business risk. Understand what you are protecting and from whom. Build a threat model before you build an architecture.

Design your security controls as properties of the system, not features added later. Every infrastructure template, every pipeline configuration, and every access policy should reflect a deliberate security decision that traces back to a business requirement.

Automate everything you can. Manual security processes do not survive contact with modern deployment velocity. If a control cannot be automated, it will eventually be skipped.

Plan for change. Your architecture will need to evolve. Build it so that security controls can be updated, extended, and replaced without redesigning the entire system.

And if you are not sure where to start, a Health Check can help. We assess your current cloud environment against security by design principles and give you a concrete list of what needs to change, in priority order, with realistic timelines.

Share this post

Pekka Tamminen

Pekka Tamminen

FAQs

Frequently asked questions about this topic

What is security by design in cloud computing?

Security by design means building security into your cloud architecture from the start, rather than adding it after the system is built. It involves starting with business risks and threat models, then designing every component, access path, and data flow to reflect those requirements. The result is an architecture where security is a built-in property, not a bolted-on feature.

How does security by design differ from compliance-driven security?

Compliance-driven security starts with regulatory checklists and aims to satisfy auditors. Security by design starts with actual business risks and aims to protect the organization. Good security by design naturally meets compliance requirements as a side effect, while compliance-focused approaches may tick every box and still leave significant security gaps.

Does NIS2 require security by design?

NIS2 requires organizations in critical sectors to implement appropriate and proportionate technical, operational, and organizational measures to manage security risks. While the directive does not use the exact phrase, its requirements for risk-based security measures, incident response, supply chain security, and continuous improvement align closely with security by design principles.

What does least privilege look like in a cloud environment?

Least privilege in the cloud means every identity, human or machine, gets exactly the permissions it needs for a specific task and nothing more. In practice, this means scoped IAM policies instead of broad admin roles, automated credential rotation, time-limited access through just-in-time approval processes, and no standing access to production environments.

How do you integrate security into a CI/CD pipeline?

Security integrates into CI/CD through automated gates: infrastructure-as-code scanning for misconfigurations, container image vulnerability checks, secrets detection in code repositories, and policy-as-code validation. Deployments that introduce critical issues are blocked automatically. The goal is to catch problems at the earliest and cheapest point rather than relying on periodic manual reviews.

Field Notes

Related Articles

Continue exploring cloud technology and best practices

Security by Design: What We Actually Mean and Build

Security

3 min read

Why we reshaped our cloud security offering and why I'm writing about it

Many security challenges are not caused by missing tools or lack of intent. They are caused by operating models that no longer fit how modern environments behave.

Read more
Security by Design: What We Actually Mean and Build

Security

9 min read

Regulation as competitive advantage: the business case for early action

The organizations that built their compliance foundations early are now deploying AI faster, winning contracts sooner, and pulling ahead of competitors who treated regulation as a problem to be solved later.

Read more
Security by Design: What We Actually Mean and Build

Resilience

8 min read

Cloud Risk Is Business Risk: What Your Board Needs to Know

Most boards treat cloud as a technology topic delegated to IT. That gap between perception and reality is where real business risk hides.

Read more

Ready to discuss your cloud strategy?

Let's talk about how Cloud2 can help your organization.

Field Notes

Stay ahead of the cloud

Practical insights on AWS, Azure, security and AI. Delivered to your inbox.

No spam. Unsubscribe any time.