Secure Design Review Scenarios

Key Takeaways

  • A secure design review identifies assets, data flows, trust boundaries, assumptions, control gaps, and residual risk before deployment.
  • Threat modeling helps teams reason about spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege.
  • Design reviews should produce specific changes, such as narrowed ACLs, stronger identity, logging, encryption, or segmentation.
  • The best exam answer usually addresses the most direct risk with the least disruptive effective control.
  • Secure architecture is iterative: validate assumptions, test controls, document exceptions, and monitor after release.
Last updated: April 2026

Secure Design Review Scenarios

A secure design review asks whether a proposed system can meet its security requirements before it goes live. For Security+, focus on identifying the highest-risk gap and choosing a control that fits the scenario.

Review Inputs

InputWhy it matters
Data-flow diagramShows where data moves and where trust changes
Asset inventoryIdentifies what must be protected
Data classificationDetermines required handling controls
Identity modelShows users, admins, service accounts, and federation
Network designShows segmentation, exposure, and allowed paths
Logging planShows whether events can be investigated
Resilience planShows backup, failover, and recovery expectations

Threat Modeling Shortcut

STRIDE is a common threat-modeling memory aid:

STRIDE itemQuestion to askExample control
SpoofingCan someone pretend to be another identity?MFA, certificates, strong service identity
TamperingCan data or code be altered?Integrity checks, code signing, access control
RepudiationCan actions be denied later?Logging, time sync, nonrepudiation controls
Information disclosureCan sensitive data be exposed?Encryption, DLP, least privilege
Denial of serviceCan availability be disrupted?Rate limiting, redundancy, DDoS protection
Elevation of privilegeCan a user gain more access?Least privilege, patching, PAM

Scenario 1: Partner API

An insurance company exposes a claims API to a partner. The partner needs to submit claims, but should not read all customer records.

Design review findings:

FindingBetter design
Shared API key used by all partner usersUse partner identity, scoped tokens, and rotation
API can read and write all claim recordsRestrict scopes and object-level authorization
No rate limitAdd rate limiting and anomaly alerts
Logs exclude partner identityLog subject, action, object, source, and result
API accepts unvalidated payloadsValidate schema and reject unexpected fields

Best exam answer: use scoped authorization and strong partner identity, not a single shared secret with broad access.

Scenario 2: New Admin Portal

A team proposes a new admin portal for production support. It is reachable from the internet because support staff work remotely.

Minimum safer design:

  • Require SSO and phishing-resistant MFA where supported.
  • Restrict access by device posture and risk.
  • Put the portal behind ZTNA or VPN rather than open internet access where feasible.
  • Use privileged access management for high-risk actions.
  • Log admin sessions and sensitive changes.
  • Separate approval for destructive operations.

Trap: "Use HTTPS" is necessary but incomplete. TLS protects data in transit; it does not prove the user should be allowed to administer production.

Scenario 3: Analytics Copy of Production Data

A product team wants a copy of production customer data for analytics in a development environment.

Better design choices:

RequirementControl
Developers need trends, not identitiesMask, tokenize, or anonymize direct identifiers
Data is copied between environmentsEncrypt transfer and restrict destination
Development has weaker controlsDo not place regulated raw data there
Query activity must be auditableEnable logs and review privileged access
Retention must be limitedSet expiration and deletion process

Best exam answer: minimize and de-identify the data. Do not simply grant developers production database access.

PBQ-Style Walkthrough

Task: Review a diagram and choose the three most important fixes.

Facts:

  • Public web app accepts payments.
  • Database with cardholder data is reachable from the web subnet and the user workstation subnet.
  • Admins share a local administrator account.
  • Logs stay only on each server.
  • Backups exist but have never been restored.

Priority fixes:

  1. Restrict database access to only required application sources.
  2. Replace shared admin use with named privileged accounts, MFA, and session logging.
  3. Centralize logs and test backup restoration.

Why not pick "change the logo" or "buy faster servers"? They do not address confidentiality, integrity, accountability, or recoverability.

Design Review Output

A useful review result is specific:

  • Risk: Database accepts connections from user workstation subnet.
  • Impact: Customer data could be queried after workstation compromise.
  • Recommendation: Deny workstation subnet, allow only app security group on database port, monitor denied attempts.
  • Owner: Infrastructure team.
  • Due date: Before production release.
  • Residual risk: App-tier compromise could still reach database; monitor and harden app tier.

For the exam, favor answers that are actionable, mapped to risk, and aligned with least privilege.

Test Your Knowledge

A design review finds that developers want raw production customer data in a test environment. Which recommendation is best?

A
B
C
D
Test Your KnowledgeMulti-Select

Which findings from a secure design review should be prioritized? Choose two.

Select all that apply

Database with regulated data accepts connections from all workstation subnets
Public marketing page uses a slightly outdated image
Administrators share one privileged account
A dashboard has a cosmetic spacing issue
Test Your Knowledge

Which review output is most useful?

A
B
C
D