In this post, I go through some well-known secure design principles and how they could be applied to…