Skip to main content

This is a new service. Help us improve it and give your feedback.

Development Standards

Security

Introduction

Security is a core part of how we design, build and operate digital services. Applying consistent security principles helps teams make informed decisions, reduce risk, and build systems that are resilient by default.

Security must be considered from the outset and throughout the software delivery lifecycle — not added as an afterthought.

Guidance

Teams MUST:

  • design systems to be secure by default, from initial concept through to decommissioning
  • consider security at every phase of the software delivery lifecycle
  • adopt a defence-in-depth approach, using multiple layers of security controls
  • apply the principle of least privilege to all users, systems and services
  • implement fail-safe defaults so that systems remain secure if controls fail

Teams SHOULD:

  • apply zero trust principles, verifying and authorising every request regardless of origin

Measurement

Use these indicators to assess how well security principles are embedded in team practices.

ID Indicator GREEN AMBER RED
SEC-1 Security principles documented in team practices Documented and reviewed quarterly Documented but not regularly reviewed Not documented
SEC-2 Security considered throughout the SDLC Evident in planning, design, implementation and testing Considered in some phases only Not considered
SEC-3 Defence-in-depth approach applied Multiple layers of controls implemented Some layers present but inconsistent Single point of protection
SEC-4 Least privilege enforced All roles and systems scoped to minimum access Some roles overly permissive No access control strategy
SEC-5 Fail-safe defaults implemented Secure defaults applied across all components Defaults applied inconsistently Defaults are insecure

Published: 24 July 2025
Last updated: 7 August 2025
Page Source