As of: 4 May 2026 · Reading time: 3 min
Key takeaways
- Learn how safe software development works.
- From Security by Design to OWASP to penetration tests – a guide for safe applications.
Learn how safe software development works. From Security by Design to OWASP to penetration tests – a guide for safe applications.
“Good software is not an accident—it comes from a structured development process with clear quality standards.”
– Björn Groenewold, Managing Director, Groenewold IT Solutions
The Threat Situation in Numbers
Short: More than 2,200 cyber attacks occur every day.
More than 2,200 cyber attacks occur every day. A data breach costs companies more than EUR 4 million on average. Preventive security measures cost a fraction of that.
Security built into development from the start is more effective and cheaper than patching vulnerabilities after deployment.
Security by Design: Build It In From the Start
Short: Security by Design means integrating protective measures across the development process.
Security by Design means integrating protective measures across the development process. It is not an afterthought. It is an architectural principle.
Core Principles
- Least Privilege — Components receive only the permissions they need
- Defense in Depth — Multiple security layers protect against different attack types
- Fail Secure — Systems default to a safe state when something goes wrong
- Input Validation — All data inputs are validated and sanitized before processing
- Secure Defaults — Standard configurations prioritize safety over ease of access
The OWASP Top 10: The Most Common Security Risks
Short: The Open Web Application Security Project maintains a list of the most critical vulnerabilities.
The Open Web Application Security Project maintains a list of the most critical vulnerabilities. Every development team should know these:
- Injection Attacks (SQL, NoSQL, OS) — Malicious code inserted through input fields. Mitigated through parameterized statements and strict input validation.
- Broken Authentication — Weak authentication enables unauthorized access. Addressed with multi-factor authentication and secure session management.
- Sensitive Data Exposure — Inadequate data protection exposes personal or financial data. Controlled through encryption in transit and at rest, plus secure key management.
- XML External Entities (XXE) — Parser-based attacks exploit XML processing. Prevented by disabling external entity processing in XML parsers.
- Broken Access Control — Insufficient authorization allows users to access data or functions beyond their permissions. Remedied through role-based access control and server-side validation.
Security Measures in Practice
Encryption
- TLS/HTTPS for all data in transit
- Database encryption for sensitive stored data
- Password hashing using bcrypt or argon2 — never plain MD5 or SHA1
Authentication and Authorization
- OAuth 2.0 and OpenID Connect for modern authentication flows
- JWT (JSON Web Tokens) for stateless token-based security
- Multi-factor authentication for accounts with elevated access rights
Code Security
- SAST (Static Application Security Testing) — Automated analysis of source code before deployment
- DAST (Dynamic Application Security Testing) — Runtime vulnerability detection against a running application
- Mandatory code reviews for all security-relevant changes
Patch and Dependency Management
- Track all third-party libraries and their known vulnerabilities
- Use tools like Snyk or Dependabot for automated dependency scanning
- Apply security patches within defined SLAs — critical vulnerabilities within 24–72 hours
What Mid-Sized Companies Should Require From Their Development Partners
Short: When selecting a software development partner, ask:
When selecting a software development partner, ask:
- Is Security by Design part of their standard process — or an add-on?
- Do they perform SAST/DAST scans as part of the build pipeline?
- How do they handle discovered vulnerabilities after delivery?
- Do they provide a Software Bill of Materials (SBOM) for your project?
Security is not a feature that can be added at the end. It must be embedded from the first sprint.
"Good software is not an accident — it comes from a structured development process with clear quality standards." — Björn Groenewold, Managing Director, Groenewold IT Solutions
About the author
Managing Director of Groenewold IT Solutions GmbH and Hyperspace GmbH
Since 2009 Björn Groenewold has been developing software solutions for the mid-market. He is Managing Director of Groenewold IT Solutions GmbH (founded 2012) and Hyperspace GmbH. As founder of Groenewold IT Solutions he has successfully supported more than 250 projects – from legacy modernisation to AI integration.
Blog recommendations
Related articles
These posts might also interest you.

German software development: quality and reliability that convince
In a digitalized world where software forms the backbone of companies, the quality label "Made in Germany" has long established itself in the IT industry. But what exactly hides...

Onshore instead of offshore: Why we develop exclusively in Germany
In the globalized world of IT services, companies are often faced with the strategic decision where they can develop their software. The options range from T...

Offshore risks: Why local development is often better
In today's globalised business world, the outsourcing of IT services, in particular software development, has become a common practice. The promise of significant...
Free download
Checklist: 10 questions before software development
Key points before you start: budget, timeline, and requirements.
Get the checklist in a consultationRelevant next steps
Related services & solutions
Based on this article's topic, these pages are often the most useful next steps.
Related services
Related solutions
Cost calculators
More on Software development and next steps
This article is in the Software development topic. In our blog overview you will find all articles; under category Software development more posts on this subject.
For topics like Software development we offer matching services – from app development and AI integration to legacy modernisation and maintenance. We describe typical use cases under solutions. Our cost calculators give initial estimates. Key terms are in the IT glossary. Books and long-form guides appear on the publications page; deeper articles live under topics.
If you have questions about this article or want a non-binding discussion about your project, you can book a consultation or reach us via contact. We usually respond within one working day.

