Conduct threat modeling. Threat modeling is the process of identifying and addressing application
security design flaws within a design, before code is created. It is conducted through specially trained
individuals who evaluate the application design and gauge security risks for each entry point and
access level. The goal is to map out the application, architecture, and infrastructure in a structured
way to understand its weaknesses.
The organization assembles a skilled threat modeling team, map the application architecture, identify potential entry points, assess risks, develop threat scenarios and mitigation strategies, document and prioritize findings, and regularly update threat models to enhance application security
The organization must create procedures that by default cyber security and security requirements are considered from the start when developing and designing new systems, digital services or business processes.
This is called the principle of built-in and default security (security by design). As a result of this approach, the design documentation should clearly indicate what measures are taken to ensure cyber security.