Secure by Design
6 min.
Most software projects don't start with security built into the architecture. By the time the team recognizes the gap, the assumption is: too late. That assumption is wrong. Secure by Design is not an all-or-nothing approach and the best time to start is now.

Most software projects don’t start with security built into the architecture. Timelines are tight, the first release takes priority, and security requirements either arrive late or not at all. By the time anyone thinks seriously about security architecture, the foundation is already poured.
And once that realization hits, the most common conclusion is: “It’s too late now. We’d have to start over.”
That conclusion is wrong. Not because the challenge isn’t real, retrofitting security is genuinely harder than building it in from the start. But Secure by Design was never meant to be an all-or-nothing approach. It’s a set of principles that create value at any point in a project’s lifecycle.
So, the real question isn’t whether a project started with Secure by Design but whether the team is willing to start now.
Why most projects don’t start secure
The pattern is structural. Projects don’t skip security because someone made a bad call. They skip it because the way most projects are set up makes it almost inevitable.
In the early phases, speed wins every argument. Architecture decisions get made under time pressure, with the first release as the primary goal. Security requirements, if they exist at all, haven’t been translated into technical specifications. They aren’t on the sprint board. And the people making architecture decisions and the people responsible for security often aren’t in the same meetings.
When security requirements do arrive, they come in a format that doesn’t fit the project workflow and instead come in the form of compliance checklists written for auditors, not developers. On top of that:
- Project managers see security as something the security team owns
- Developers were hired to ship features, not to design security architecture
- Smaller teams often have no dedicated security budget or expertise
- Security becomes something to “address later”, after the MVP, after the first customer, after the next funding round
- None of this is a failure of individuals. It’s the result of structures and incentives that consistently prioritize shipping over securing.
The hidden cost of waiting
The longer security debt accumulates, the more it costs in places that project managers feel directly.
Rework that blows up your timeline
A team two weeks out from launch receives a penetration test report required before go-live. Among the findings: a structural weakness in the API authentication layer. Not a simple code fix, but a change to the service architecture. The release gets pushed by six weeks. The scenario is fictional, but the pattern is routine.
Veracode’s State of Software Security 2024 – based on scan data across hundreds of thousands of applications – puts a number on this pattern: Teams that prioritize early remediation reduce critical security debt by up to 75%. For a project manager tracking velocity and budget, the direction is clear: later is more expensive, and the gap compounds.
Unplanned risks that destabilize delivery
Without early threat analysis, security risks surface at the worst possible moments – right before a release or during an audit. According to the Synopsys Global State of DevSecOps 2023 survey of over 1,000 IT professionals, more than 80% of organizations reported that a critical security issue impacted their DevOps delivery schedule in the prior year. For a project manager, each of those incidents means unplanned rework, stakeholder communication, and a timeline that no longer holds.
Technical debt that compounds quietly
A missing input validation pattern that would have been a two-hour task in the first sprint becomes a cross-service refactoring effort twelve months later. The IBM Cost of a Data Breach Report 2025 puts the global average cost of a breach at 4.44 million USD.
“We can’t afford to invest in security right now” sounds pragmatic until you compare it with the cost of not investing.
The myth of “it’s too late” for Secure by Design
The most common reaction to accumulated security debt isn’t “let’s start fixing this.” It’s “we’re too far in to change course now.”
That logic wouldn’t be accepted in any other area of software quality. No team has ever said “we didn’t write tests from the start, so there’s no point introducing them now.” No one argues that adopting CI/CD mid-project is a waste because the first six months ran without it. Security is the same principle applied to a different risk category.
What often hides behind “it’s too late” is something else entirely:
- “It’s too expensive.”
- “I don’t know where to start.”
- “It’s not my responsibility.”
These are legitimate concerns with practical answers. But the “too late” framing buries them under a sense of inevitability that prevents action.
Yes, retrofitting security is harder than building it in from the start. But doing nothing and hoping the next audit doesn’t surface something critical is more expensive in every scenario we’ve seen. The pragmatic path is incremental: identify the highest-risk areas, address them step by step, and build security thinking into the way the team works going forward.
How project managers can introduce Secure by Design
Project managers don’t need to become security experts. But they can create the conditions under which security becomes part of how the team works.
Introduce threat modeling as a planning tool
A focused threat modeling workshop on the most critical components fits into a single sprint planning cycle. The project manager’s role isn’t to lead the technical analysis but to make it happen: block the time, get the right people in the room, and make sure the output feeds into planning decisions.
Add security criteria to the definition of done
When security becomes part of what “done” means, it stops being a separate workstream and becomes routine. Examples:
- No open critical or high-severity findings at the end of a sprint
- Input validation implemented for new endpoints
- Security-relevant changes reviewed before merge
- Turn existing pentest findings into backlog items
Many organizations have pentest reports with findings that were never translated into development tasks. The project manager can act as the translator by triaging findings, mapping them to components, and feeding them into sprint planning. Where internal expertise for prioritization is missing, an external partner that combines structural findings with architectural context, can help to translate abstract findings into actionable backlog items.
Establish a security champion in the team
Not a new hire but someone already on the team who becomes the first point of contact for security questions. The project manager identifies a willing team member and allocates sprint capacity. External security partners can accelerate this through coaching, so the competence grows inside the team rather than staying tied to a consultant.
Plan incremental security refactoring
Dedicate 10 to 15 percent of sprint capacity to security improvements, the same way teams allocate time for technical debt. The Boy Scout Rule applies: leave the code more secure than you found it, one feature cycle at a time. A security assessment can identify where that effort delivers the highest return so the refactoring is focused, not scattered.
Start now, not perfect
Secure by Design is not a label a project earns at the start or misses forever. It’s a direction.
Threat modeling creates value in month eight. A single pentest finding, properly translated into a backlog item, can prevent the kind of architectural rework that derails a release. The question worth asking in your next sprint planning isn’t “are we Secure by Design?” It’s “what’s one thing we can do this sprint to get closer?” Pick one measure from this article. Put it on the agenda. The first step doesn’t need to be big but it needs to happen.




