Contents

Setting Security Objectives - Locking It Down Like a Boss.

Read time: 8 mins
Last Updated on May 3, 2025
Published April 23, 2022

Setting clear security goals is the first big step in keeping your web apps safe throughout the development process. These goals should be baked into the right parts of your organization and follow solid security principles—especially when it comes to dodging the big risks that show up in things like the OWASP Top 10.

When you're building web apps or services, your security objectives make sure to cover the basics of the "C.I.A." triad: keeping data Confidential, making sure it stays Accurate, and ensuring it's Available when needed. To keep them as specific as possible - The S.M.A.R.T. format may be a good starting point for you (Specific, Measurable, Achievable, Realistic, and Timely). We're planning to follow up with a more specficic article on that later.

Below is a list of good Security Objectives drawn from information security frameworks, web security best practices, and developer requirements. To make it a bit more tangible, we have added a few sample objectives - to save some screen real-estate it will be left to you to transform them into S.M.A.R.T. formatted objectives.

1. Core Identity and Access Control Objectives

The main objective here is to prevent Broken Access Control (a critical risk in modern API environments) and Identification and Authentication Failures.

  • Objective: Strong, Multi-Factor Authentication (MFA) Adoption

    • Achieve strong, cryptographically secured authentication for all users and services.

    • Implement robust multi-factor authentication (MFA) across all critical systems to resist credential-based attacks.

  • Objective: Enforced Authorization and Least Privilege

    • Ensure that all authenticated users and system processes operate strictly according to the principle of least privilege, granting only the minimum access necessary for assigned organizational tasks.

    • Ensure proper access controls and session management are enforced using zero-trust principles.

    • Implement Role-Based Access Control (RBAC) or Attribute-Based Access Control (ABAC) to define granular permissions based on user roles or attributes.

  • Objective: Secure Session Management

    • Protect the authenticity of communications sessions against session hijacking.

    • Invalidate session identifiers upon user logout or other session termination.

    • Generate unique, random, system-generated session identifiers.

2. Data Protection and Cryptography Objectives

The objective is to achieve Confidentiality and Integrity of information, preventing Cryptographic Failures and Data Leakage.

  • Objective: Confidentiality in Transit and at Rest

    • Protect the confidentiality and integrity of all transmitted and stored information.

    • Enforce HTTPS everywhere with proper certificate management and use Transport Layer Security (TLS) encryption to protect data during transmission.

    • Implement cryptographic mechanisms using strong algorithms (e.g., AES-256 or RSA-4096) to secure sensitive data (such as PII, PCI, and PHI) while at rest.

  • Objective: Key and Authenticator Management

    • Manage cryptographic keys in accordance with organizational requirements for key generation, distribution, storage, access, and destruction.

    • Avoid storing unencrypted static authenticators in applications or other static storage.

  • Objective: Data Minimization and Tokenization

    • For systems processing Personally Identifiable Information (PII), restrict processing to only what is directly relevant and necessary for the identified purpose (Minimization).

    • Where possible, reduce the exposure of sensitive data during transactions, such as through tokenization.

3. Software and Data Integrity Objectives

These objectives focus on eliminating vulnerabilities that lead to Injection attacks, Software and Data Integrity Failures, and general system compromise.

  • Objective: Input Validation and Injection Prevention

    • Check the validity of all information inputs against specified formats (syntax and semantics).

    • Prevent untrusted data injections (including SQL, XSS, and AI prompt injection) by separating data from code (e.g., using prepared statements or parameterized queries) and using output encoding.

  • Objective: Flaw and Vulnerability Remediation

    • Ensure the integrity of code and systems by implementing a verifiable flaw remediation process.

    • Ensure timely patch management and regular application security assessments to address known vulnerabilities in third-party and custom components.

  • Objective: Non-Modifiable Executable Programs

    • Ensure the integrity of executable programs by loading and executing critical components from hardware-enforced, read-only media where appropriate.

4. Design, Maintenance, and Monitoring Objectives

These goals aim to embed security throughout the development lifecycle (SDLC) and ensure ongoing system resilience, addressing Insecure Design and Security Logging and Monitoring Failures.

  • Objective: Security by Design

    • Integrate threat modeling and architectural reviews from the initial design process to identify systemic weaknesses early.

    • Design the architecture using a defense-in-depth approach, allocating controls strategically across multiple layers (e.g., API gateway, service, data).

  • Objective: Least Functionality and Secure Configuration

    • Configure the system to provide only mission essential capabilities, prohibiting or restricting the use of unnecessary functions, ports, protocols, software, and services.

    • Avoid security misconfigurations (e.g., overly permissive CORS policies, default credentials) by implementing infrastructure as code with security templates and conducting regular security configuration audits.

  • Objective: Comprehensive Monitoring and Auditing

    • Enable comprehensive logging for key security-relevant events, including authentication attempts, access to sensitive resources, and administrative actions.

    • Implement automated tools and mechanisms (such as SIEM solutions) to support near real-time analysis of events and detect anomalous behavior or suspicious activity.

  • Objective: Continuous Validation and Testing

    • Conduct security testing continuously within the development (CI/CD) pipelines (Shift-Left).

    • Perform automated vulnerability analysis and regular penetration testing to validate controls against simulated adversary actions.

  • Objective: Incident Response Readiness

    • Develop a clear and tested Incident Response Plan to ensure the organization can respond quickly and effectively to security breaches, minimizing damage and facilitating swift recovery.

Hopefully the example objectives above can provide a good starting point for development teams to ensure security is systematically integrated throughout the entire process, and not just treated as a checklist item to check.

The table below is another way to look at comprehensive security objectives for web application development, mapping them to the fundamental security principles and the associated NIST control family concepts:

Security Domain Security Objective (Goal) Core Principle(s) Supporting Control Concepts (NIST SP 800-53 Families)
I. Identity & Access Strong Authentication & Credential Management: Implement strong, unique identification and authentication mechanisms to verify users and devices. Authentication Identification and Authentication (IA), Access Control (AC).
Enforced Authorization & Least Privilege: Restrict user and system component access strictly to the minimum necessary functions required for the job. Authorization, Confidentiality Access Control (AC), Account Management (AC-2), Role-Based Access Control (AC-3(7)).
Secure Session Management: Protect active user sessions from unauthorized takeover or abuse. Confidentiality, Integrity Access Control (AC).
II. Data Protection Confidentiality of Data in Transit and at Rest: Ensure sensitive organizational and personally identifiable information (PII) is encrypted when stored and communicated across the network. Confidentiality Cryptographic Protection (SC-13), Protection of Information at Rest (SC-28), Transmission Confidentiality and Integrity (SC-8).
Data Minimization: Limit the collection, use, and retention of PII to only what is directly relevant and necessary for authorized purposes. Privacy, Confidentiality Personally Identifiable Information Processing and Transparency (PT), Minimization (SA-8(33)).
III. System Integrity Input Validation and Injection Prevention: Prevent the processing of malicious or malformed input that could lead to integrity failures or code injection attacks. Integrity Information Output Filtering (SI-15), System and Information Integrity (SI).
Secure Baseline Configuration: Ensure the system runs with only essential functionality enabled and that system components (hardware, software, firmware) conform to approved, documented security settings. Integrity, Availability Configuration Management (CM), Least Functionality (CM-7), Baseline Configuration (CM-2).
Timely Flaw and Vulnerability Remediation: Establish a process to promptly identify, report, and correct system flaws (patches, updates) and remediate legitimate vulnerabilities within defined timeframes. Integrity Flaw Remediation (SI-2), Vulnerability Monitoring and Scanning (RA-5).
IV. Resilience & Monitoring High Availability and System Resilience: Design the system to operate under adverse conditions and ensure essential mission functions continue despite disruption, compromise, or failure. Availability Contingency Planning (CP), Predictable Failure Prevention (SI-13), Fail in Known State (SC-24).
Comprehensive Audit and Accountability: Log and review security-relevant events across the system to maintain accountability and detect inappropriate activity. Accountability, Non-repudiation Audit and Accountability (AU), Event Logging (AU-2).
Incident Response Readiness: Develop and test capabilities to effectively prepare for, detect, analyze, contain, eradicate, and recover from security incidents. Availability Incident Response (IR), Contingency Planning (CP).

Enjoy.

back to more articles

security   AuthN   AuthZ   Authentication   Authorization   Availability   CIA   CIA Triad   Confidentiality   Continuous Validation   Core Principles   Data Confidentiality   Defense-in-Depth   DevSecOps   Enforced Authorization   HTTPS everywhere   Identity and Access Control   Incident Response Plan   Integrity   Least Privilege   MFA   Monitoring   Multi-factor authentication   SIEM   SecDevOps   Security Objectives   Security by Design   Shift-Left Testing   System Integrity   at rest   cryptographic algorithms   encryption   in transit   in transit encryption   prompt injection   secure engineering   security architecture   security information & event management   untrusted data   Identity & Access   Resilience   2022