411 Goals of secure software development

Clarify the core outcomes that secure software aims to achieve at every stage of its development and use.

This section introduces the overarching goals that guide the development of secure software systems. These goals go beyond technical functionality to include protecting users, supporting responsible system use, and aligning with legal and ethical expectations. Whether designing a login page, writing an API, or managing error states, software engineers are expected to design with these goals in mind.

Secure software is not just about defence against attacks—it is about building systems that behave predictably and responsibly, even when under pressure or misuse. These goals should be considered early and applied consistently throughout the development lifecycle.

Targets

In this chapter, students learn to:

  • Identify the fundamental goals of secure software design and implementation

  • Relate software security goals to practical development tasks

  • Understand the connection between user needs and security outcomes

  • Recognise how ethical, legal, and social factors influence secure system behaviour

Why goals matter

Without clear goals, it is difficult to measure whether software is secure. By establishing desired outcomes—such as confidentiality, reliability, auditability, and fairness—developers can guide their design decisions and evaluate trade-offs. These goals influence architecture, coding practices, data handling, and user interactions.

Common development goals

Some of the goals that often drive secure software development include:

  • Protecting user data and privacy

  • Preventing unauthorised access

  • Ensuring the integrity of records and transactions

  • Maintaining system availability under normal and adverse conditions

  • Supporting accountability through traceable user actions

  • Complying with laws and regulations such as the Privacy Act

Connecting goals to system behaviour

Each goal has practical implications. For example, protecting user data might mean encrypting personal records and using secure communication protocols. Supporting accountability might mean implementing session logging and permission management. These goals also connect to broader concepts like the CIA triad, AAA model, and ethical responsibility.

Last updated

Was this helpful?