Scroll Top

From Bolt-On to Built-In: The Case for Secure-by-Design Platforms 

Bolt_Blog_feature

Most security programs in 2026 are still operating on decisions made for a different era. They were built around static perimeter models, compliance checklists, and a stack of controls bolted on to existing architecture. That model worked when change was slow and attackers moved at human speed. 

 Today, cloud, application programming interfaces (APIs), and artificial intelligence (AI) have fundamentally changed enterprise security. Every new service, integration, and model adds more surface area, and AIaugmented adversaries are discovering and weaponizing vulnerabilities in hours instead of weeks. In that environment, what matters most isn’t how many tools you’ve bought, but whether your platforms and networks were built to be defended from day one. 


From Compliance to Resilience: Why Built-In Security Matters Now 

For years, many organizations have understandably treated “we’re compliant” as the main answer to “are we secure?” Security frameworks such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework, Service Organization Control 2 (SOC 2), the Payment Card Industry Data Security Standard (PCI DSS), and the Health Insurance Portability and Accountability Act (HIPAA) define minimum standards, but they weren’t written for an AIdriven threat landscape. They tell you what the floor looks like, not whether the building is sound. 

Over the past 12 to 18 months, expectations have changed. Boards, regulators, and enterprise buyers are starting from an assumption of builtin security. They want to see security embedded in how platforms are designed and operated, not added as bolton controls at the edge. Increasingly, they are asking: 

  • How quickly can you see what’s happening in your environment? 
  • How fast can you contain an issue? 
  • How reliably can you keep running when something goes wrong? 

Bolton vs. builtin lead to different outcomes. Bolton programs are wellsuited to passing audits and addressing visible gaps. Securebydesign platforms are better suited to resilience, treating security as an architectural property so you can move faster, adopt AI more confidently, and maintain trust under pressure.  

Related Read: SECURITY GAP ASSESSMENTS, AUDITS, AND RISK ASSESSMENTS: UNDERSTANDING THE DIFFERENCES 


From BoltOn Controls to SecureByDesign Platforms 

Most organizations didn’t set out to build “bolton” security. They arrived there over time. New tools were added as new requirements emerged, often on top of legacy platforms that were never built for the level of visibility, identity, or automation now required. The result is familiar: controls that can’t fully see what they’re protecting, and policies that live in PDFs instead of in code.  

securebydesign platform approaches the same challenges from the other direction. Security is part of the conversation from the first whiteboard sketch of a network, data center, or cloud environment, shaping how systems are built and connected rather than reviewing them at the end. A few patterns tend to stand out: 

  • Identity is foundational: every user, service, and AI agent has a governed credential with defined scope 
  • Observability is designed in: telemetry and logging are built in from the start 
  • Automation works for the security team: response playbooks are wired into the same systems that generate alerts 

 In this model, the platform becomes the control surface. Security has something to work with instead of around. 

Getting there is a journey, not a ripandreplace event. A practical first step is understanding what your current platforms can support and where new tools are needed to compensate for architectural constraints. 

Click to learn more on Presidios cybersecurity solutions


Modern Networks: Zero Trust and EdgeReady Design 

The perimetercentric view of the world (i.e., “inside is trusted, outside is not”) no longer aligns with how most teams actually work. Users connect from anywhere, applications span software as a service (SaaS), multiple clouds, and onpremises environments, and data lives in branch locations, at the edge, and in centralized hubs. 

Modern network designs use zero trust, secure access service edge (SASE), and secure edge connectivity to reflect that reality. 

  • Zero trust architecture designs around “never trust, always verify,” with access driven by identity, device state, context, and behavior rather than network location. 
  • SASE brings networking and security together into a clouddelivered fabric, so controls can follow users and workloads wherever they go 
  • Secure edge connectivity ensures that data and workloads at the edge are governed by the same identity and observability principles as the core. 

In a securebydesign approach, these ideas show up in the network blueprint, not as a latestage overlay. That means: 

  • Segmentation, identityaware access, and telemetry paths are part of how the network is defined. 
  • Security architects and network engineers work from a shared design instead of passing work back and forth between “build” and “harden.”

The limits of a bolton model become clear here. Once a threat actor (or an AIdriven attack using compromised credentials) is inside, perimeteronly controls have limited value. A defensible network treats every hop as potentially untrusted and has the instrumentation to see, question, and contain anomalous behavior quickly. 

Related Read: SSE VS. SASE – WHAT’S THE DIFFERENCE? 


Beyond Compliance: Security as a Driver of Resilience 

On the security side, the biggest shift is how success is defined. If the headline metric is “we passed the audit,” the program will be designed one way. If the metric is “we can detect, contain, and recover from incidents quickly,” it will look different.  

Compliance is a snapshot in time; resilience is about performance under stress. It shows up in metrics like: 

  • Mean time to detect (MTTD) and mean time to respond (MTTR) 
  • Uptime and incidentrelated downtime 
  • Cyber insurance terms and premiums 
  • Due diligence questions in large enterprise deals and renewals 

Culturally, securebydesign usually means bringing security into the room earlier. Many teams tell us security is still invited in at the end, once a project is ready for “review,” which almost guarantees friction and rework. Giving security a seat at the architecture table and building guardrails into the tools developers and operators already use helps shift that pattern. It also changes the conversation with the business, anchoring risk in uptime and customer impact instead of just vulnerability counts.  

Designing with security in mind from the start does take more time and conversation. But compared with the cost of a single major incident, the securebydesign path is often more economical over time. 


The CTO Lens: SecureByDesign as an AI Enabler 

Chief technology officers (CTOs) and chief information officers (CIOs) are being asked to move quickly on AIpowered products and automation, often within architectures that predate those ambitions. Each new model, pipeline, and integration can widen the attack surface, creating understandable hesitation. 

A policyonly response does not resolve that tension. Organizations need AI fluency backed by platforms that make secure use the default, rather than relying on restrictive policies alone.  

When identity, observability, and control are part of the AI and data infrastructure, teams can: 

  • Experiment and ship AIenabled workflows faster 
  • Avoid creating hardtogovern “shadow AI” 
  • Give security teams the visibility they need without slowing innovation 

Cost matters here too. Many organizations begin AI pilots in the public cloud, see strong initial results, and then watch consumption costs climb as usage grows. Without a clear plan for where AI workloads should run (and how to balance cloud flexibility with onpremises control and cost efficiency), those pilots can hit budget or governance ceilings. A securebydesign view of AI treats those placement decisions as architectural, with security, cost, and performance all in scope. 

Related Read: FROM TRUST TO VERIFICATION: 5 STEPS TO BUILDING A RESILIENT CLOUD VENDOR RISK PROGRAM  


Building for the Future: From BoltOn to BuiltIn 

For leaders who see too much bolton in their environment, there is a path forward. The first step is to understand where security is truly embedded in your platforms and where it’s not.  

In practice, many organizations start with a structured workshop to align security, IT, and business stakeholders, followed by a targeted architecture and security assessment to map the highestimpact changes. The goal isn’t to rebuild everything at once; it’s to focus on the parts of your networks, platforms, and AI stack where embedding security into the design will move the needle fastest. 

Over time, the shift from bolton to builtin reframes security’s role. It becomes the trust infrastructure that lets you move faster, adopt new technologies with confidence, and be ready for anything. 

When you’re ready to move from bolton fixes to builtin resilience, start with visibility, reach out to request a secure-by-design security assessment. 

Justin Tibbs

Vice President, Cybersecurity at  |  + posts
presidio CTO

Rob Kim is Chief Technology Officer at Presidio, where he helps organizations modernize with purpose — turning AI, cloud, and digital technologies into real business outcomes. With over 20 years of experience in enterprise technology strategy, Rob serves as a technology orchestrator for clients navigating complex transformations with a strategy-first, value-led mindset. Connect with Rob on LinkedIn.

Ali Tehrani

Sr. VP, Platforms & Modern Networks at  |  + posts
Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.