Secure design principles – Part 1