Skip to main content

What do you think of this service? Your feedback will help us to improve it.

Author: Government Digital Service

Last updated: 2025-03-28

How to integrate Secure by Design into the government gate review life cycle

Aligning activities to your organisation’s delivery process.

The Secure by Design approach aims to help teams deliver effective cyber security from the initial concept through every stage of a project delivering a digital service.

This guidance aims to help project delivery professionals effectively incorporate Secure by Design activities into the gate review process for agile delivery. We recommend tailoring it to reflect your organisation’s structure, processes and resources, since:

  • agile phases do not always align exactly with gates
  • the point at which business cases are submitted may vary for different departments
  • some teams use a waterfall or hybrid delivery method
  • smaller projects may not need to submit all the business case types we’ve listed

Projects that are already underway and digital services which are in public beta or live will not pass through each of the gates or phases listed on this page. The Questions about Secure by Design guidance explains how the Secure by Design approach applies in these scenarios (see the questions and answers in the ‘When it needs to be done’ section).

Overview of gates, business cases and agile phases

Gate review points

To promote consistent ways of working across government, the Government Functional Standard (GovS 002) sets a series of gate review points, also known as decision points or stage gates. These exist so business cases can be reviewed at key stages of the end-to-end life cycle. When teams show they’re meeting the necessary objectives, they can get approval to move to the next stage of the project.

The gate review points are:

Business cases

As outlined in the latest agile digital and IT projects guidance, you will submit the following business cases or equivalent at key points during this process:

  • Strategic Outline Case (SOC)
  • Outline Business Case (OBC)
  • Full Business Case (FBC)

By including details of planned and completed Secure by Design activities within business cases at key delivery points, you’ll be able to demonstrate that you’re achieving security requirements and are suitably prepared for the next delivery phase.

Agile phases

As part of projects, teams following agile delivery methods use the following phases:

These phases run in parallel to the gate review life cycle, with business cases being submitted at key delivery points. For example, the SOC might be submitted at the end of discovery, the OBC during alpha and the FBC at the end of private beta, although this can differ from project to project.

How activities align to gates and agile phases

Gates 0 and 1: discovery

It’s never too soon to think about cyber security considerations, and it’s sensible to include security-related topics during initial discussions about an idea for a digital service.

At the earliest available opportunity, look to get answers to questions like:

  • does providing this service create any obvious risks to users or the organisation?
  • have any similar services been developed that we can take a security steer from?
  • do we have the necessary resources available to make this type of service secure?

If you can establish elements like the project’s risk appetite and who will have responsibility for cyber security at the concept stage, it will be easier to show that you’re meeting the necessary requirements during later phases. It will also help to reduce the chances of a project being rejected or delayed due to security risks.

At the end of your discovery phase, you may have to submit a Strategic Outline Case (SOC) so the project can proceed. Completing the following recommended activities by this point will help you meet the required Secure by Design principles:

Until there’s something concrete to develop, much of this will remain theoretical rather than specific. Provide as much detail as possible, and use resources or expertise available from elsewhere in your organisation to cover areas of uncertainty.

Gates 2 and 3: alpha

When the first building blocks of your service are being put together, the security implications of what you’re planning to build will start to become clearer.

The size and complexity of alpha projects vary wildly, but in general they will be experimental solutions that cover core parts of the intended user journey. They are likely to rely on existing tools or environments, and be designed to be disposable.

The GOV.UK Service Manual guidance on how the alpha phase works says that “a crucial part of alpha is identifying your riskiest assumptions and testing them.”

Each of your tests and experiments should also have information on the:

  • types of cyber threats that may be relevant
  • vulnerabilities that may exist
  • data and other assets that will need to be protected
  • security controls that could be put in place to mitigate threats

Details may still be vague or unknown at this stage, but by consulting with cyber security advisors, you can work out what you need to do to provide more in-depth information. By collating this, along with a high-level security risk assessment in an Outline Business Case (OBC), the alpha phase project can progress, either to a further experimental stage or to a private beta.

At this point you should properly evaluate prototypes based on their security credentials and alignment with Secure by Design principles. By this stage, a delivery team should:

  • be including details of how they’re meeting security requirements within project plans
  • be including security resources within their budgets
  • have thorough processes for conducting risk assessments and developing mitigation strategies

With a clearer understanding of the technical architecture of the project forming, this is also the point where you should consider risks related to third-party products. Security requirements need to be embedded in procurement processes and supplier contracts with documented information on how vendors will meet obligations.

At the end of the alpha phase, you’ll submit an updated OBC. Completing the following recommended activities by this point will help you meet the required Secure by Design principles:

Gate 4: private beta

The gate 4 review approximately aligns with the end of the private beta phase. You’ll submit a Full Business Case (FBC). This needs to provide conclusive evidence that you’ve addressed cyber security risks and put suitable mitigations in place to counteract them.

At the end of the beta phase, you’ll submit an FBC. Completing the following recommended activities by this point will help you meet the required Secure by Design principles:

Gate 4 and 5: public beta and live

By the time your service is released to the public, you should continue to mitigate cyber security risks through change management processes and business as usual security risk management processes.

At the stage when your service is ready to move from public beta to live, you’ll submit an updated FBC. It should contain details of how you are meeting Secure by Design principles during operation and performing ongoing security monitoring and vulnerability assessments.

Completing the following recommended activities by this point will help you meet the required Secure by Design principles:

Because the security landscape is always evolving, regular security reviews need to take place to check that assumptions made about threats and risks are still accurate.

It’s likely that your live service will still go through a series of iterations and updates to address any emerging security threats. When making any changes to your live service, the testing of any components with security implications should be conducted in development environments and fully assured before going live.

As part of lessons learned and project closure process, you should assess whether you’ve met the expected cyber security requirements of the project.

Identify areas where Secure by Design principles were successfully implemented and where improvements could be made for future projects.

Tables showing how activities align

These 5 tables show each group of Secure by Design activities and their corresponding agile phases. An activity appearing in more than one phase means we recommend you revisit it and iterate accordingly.

Prepare a secure service

For the first activity, Considering security within the business case, note that some projects may not submit a business case at each phase.

Activities Discovery Alpha Private beta Public beta and live
Considering security within the business case Yes Yes Yes Yes
Identifying security resources Yes Yes Yes No
Agreeing roles and responsibilities Yes Yes Yes No
Tracking Secure by Design progress Yes Yes Yes Yes
Working out the project’s security risk appetite Yes Yes No No

Understand the security landscape

Activities Discovery Alpha Private beta Public beta and live
Managing third-party product security risks Yes Yes Yes No
Understanding cyber security obligations Yes No No No
Understanding business objectives and user needs Yes No No No

Manage cyber security risks

Discovery Alpha Private beta Public beta and live
Documenting service assets Yes Yes Yes No
Assessing the importance of service assets Yes Yes Yes No
Sourcing a threat assessment Yes Yes No No
Performing threat modelling No Yes Yes No
Performing a security risk assessment No Yes Yes No
Agreeing a security controls set for your service No Yes Yes No
Responding to and mitigating security risks No Yes Yes Yes
Assessing the effectiveness of security controls No Yes Yes Yes

Anticipate and respond to vulnerabilities

Activities Discovery Alpha Private beta Public beta and live
Implementing a vulnerability management process No Yes Yes No
Discovering vulnerabilities No Yes Yes Yes
Managing observability No Yes Yes No

Maintain continuous assurance

Activities Discovery Alpha Private beta Public beta and live
Evaluating the security impact of changes No Yes Yes Yes
Retiring service components securely No Yes Yes Yes

Life cycle visualisations

Here you can view or download a series of visualisations which show how the Home Office has adapted Secure by Design activities to match delivery life cycles for 3 different delivery methodologies (programme, waterfall and agile). You may find the visuals useful to adapt for your organisation's own needs.

Sign up to UK Government Security

Subscribe to our newsletters to receive notifications when changes to strategy, policy, standards, and guidance are published on the website.

Sign up now