Cybersecurity: Secured by Design
- Pnt. Ir. Ojahan M. Oppusunggu, ST(Civ), MT(Civ), CPA, AER, IP, PMP

- 2 days ago
- 6 min read
Introduction – Moving From Reactive to Proactive Security
For many years, cybersecurity in the hospitality industry - like in many other sectors - was treated as an afterthought.

Security measures were typically added only after systems were built, processes were implemented, or - worse- after a cyber incident had already occurred. This reactive approach, often described as “security as a patch,” is no longer sufficient in today’s digital and highly interconnected hotel ecosystem.
The concept of “Cybersecurity: Secured by Design” represents a fundamental shift in mindset. Rather than treating cybersecurity as a technical add-on, it positions security as a foundational principle embedded into every system, process, investment, and decision from the very beginning. For hotel groups, this approach is particularly critical given the scale, complexity, and sensitivity of the data they manage.
A Secured by Design approach means that cybersecurity is not just the responsibility of the IT department - it is a collective responsibility that shapes strategy, operations, technology investments, vendor selection, employee behavior, and guest experience. In an era where digital trust is as important as hospitality itself, building security into the DNA of hotel organizations is no longer optional - it is essential.
Why ‘Secured by Design’ Matters for Hotel Groups
Hotel groups operate within a vast digital ecosystem that includes reservation platforms, property management systems, payment gateways, loyalty programs, customer relationship management tools, cloud-based analytics, smart room technologies, and third-party integrations with online travel agencies and service providers.
Each of these digital touchpoints presents potential vulnerabilities. Traditional cybersecurity models often focus on defending the perimeter - firewalls, antivirus software, and intrusion detection systems. While important, these measures alone are insufficient when systems themselves are inherently insecure by design.
A Secured by Design approach ensures that security is integrated into:
System architecture
Software development
Data management policies
Operational workflows
Vendor relationships
Employee training
Guest interactions
For hotel groups, this is especially relevant because they handle highly sensitive personal data, including passports, credit card details, travel histories, and corporate client information. Any weakness in system design can expose this data to breaches, fraud, or misuse.
By embedding security from the outset, hotel groups can reduce risks, lower long-term security costs, improve regulatory compliance, and strengthen guest trust.
From Security as a Cost to Security as an Investment
One of the biggest barriers to effective cybersecurity in hospitality has been the perception that security is merely an operational cost. Many hotel executives historically viewed cybersecurity spending as a necessary but non-revenue-generating expense.
Secured by Design reframes this perspective. Instead of seeing cybersecurity as a cost center, it positions it as a strategic investment that protects revenue, brand reputation, and operational continuity.
A major data breach can cost a hotel group far more than proactive security investments. The financial impact may include:
Legal fees and regulatory fines
Compensation to affected guests
System recovery and forensic investigation costs
Business interruption losses
Increased insurance premiums
Long-term brand damage and lost bookings
By designing security into systems from the start, hotel groups can prevent many of these risks rather than reacting to them after the damage is done.
Principles of ‘Secured by Design’ in Hospitality
A Secured by Design framework for hotel groups should be built on several key principles:
Security by Default
All systems and processes should be configured securely by default. This means:
· Minimal access privileges for employees
· Encrypted data storage as standard practice
· Secure network segmentation between guest and internal systems
· Automatic security updates and patches
· Strict authentication requirements such as multi-factor authentication
Rather than relying on users to enable security features, these protections should be built into systems automatically.
Data Minimization and Purpose Limitation
A core principle of Secured by Design is collecting only the data that is truly necessary for business operations.
Many hotels historically stored excessive guest information without clear justification, increasing their exposure in case of a breach. A Secured by Design approach requires hotel groups to:
· Clearly define why each piece of data is collected
· Avoid unnecessary retention of personal information
· Regularly delete outdated or irrelevant data
· Limit access to sensitive information based on job roles
This aligns closely with modern data protection regulations such as GDPR and Indonesia’s Personal Data Protection (PDP) Law.
Privacy by Design and Privacy by Default
Cybersecurity and data privacy are deeply interconnected. Secured by Design must also incorporate Privacy by Design, meaning that privacy considerations are embedded into system development and business processes from the outset.
For hotel groups, this means:
· Designing reservation and loyalty systems that clearly inform guests about data usage
· Ensuring transparent consent mechanisms
· Implementing secure methods for handling passports and payment details
· Protecting guest data across all digital and physical touchpoints
Privacy is no longer just a legal requirement—it is a competitive differentiator in hospitality.
Secured by Design in Technology Infrastructure
A truly Secured by Design hotel group must build security into its technological foundation.
Secure System Architecture
Hotel IT systems should be designed with security as a core structural element rather than a layer added later. This includes:
· Isolated network environments for guest Wi-Fi and internal operations
· Secure cloud infrastructure with robust access controls
· Redundant and encrypted data backups
· Continuous monitoring for suspicious activity
By designing secure architecture from the start, hotel groups reduce the likelihood of cyber incidents and improve resilience.
Secure Software Development Lifecycle (SDLC)
For hotel groups that develop or customize their own digital platforms, adopting a Secure Software Development Lifecycle is critical. This involves:
· Identifying security risks during the design phase
· Conducting regular code reviews and vulnerability testing
· Fixing security flaws before system deployment
· Continuously updating software to address emerging threats
Rather than treating cybersecurity as a final step before launch, it becomes an integral part of development.
AI and Automation for Security by Design
Modern cybersecurity increasingly relies on artificial intelligence and automation. AI-driven systems can:
· Detect anomalies in real time
· Identify potential breaches before they escalate
· Automate threat responses
· Reduce human error in security management
By integrating AI into security design, hotel groups can build smarter and more adaptive defenses.
Secured by Design and Third-Party Risk Management
Hotel groups rely heavily on third-party vendors for technology, marketing, payment processing, and operations. In a Secured by Design model, cybersecurity must extend beyond internal systems to the entire supply chain.
This requires:
· Conducting cybersecurity due diligence before engaging vendors
· Including security requirements in contracts
· Regularly auditing third-party compliance
· Ensuring data-sharing agreements align with privacy laws
A single weak vendor can compromise an entire hotel network, making supply chain security a critical component of Secured by Design.
Human-Centered Security: Designing for Employee Behavior
Even the most secure systems can be undermined by human error. A Secured by Design approach recognizes that people are a central part of cybersecurity.
Hotel groups should design security processes that are:
Easy to understand
Integrated into daily workflows
Supported by continuous training
Reinforced through leadership commitment
Instead of blaming employees for security mistakes, organizations should design systems that minimize the risk of human failure.
Regulatory Alignment: Secured by Design and Indonesia’s PDP Law
For hotel groups operating in Indonesia, the Personal Data Protection (PDP) Law reinforces the importance of Secured by Design principles.
The PDP Law requires organizations to ensure the confidentiality, integrity, and availability of personal data. This aligns directly with Secured by Design by mandating:
Strong technical and organizational safeguards
Clear accountability for data protection
Secure handling of guest information
Proper management of third-party data processors
Under this regulation, hotels are not just expected to react to breaches—they are expected to proactively design systems that prevent them.
From Compliance to Competitive Advantage
While regulatory compliance is essential, Secured by Design should not be seen merely as a legal obligation. Instead, it can be a strategic differentiator.
Hotel groups that demonstrate strong cybersecurity practices can:
Build stronger guest trust
Attract corporate clients who prioritize data security
Reduce operational disruptions
Strengthen brand reputation
Lower long-term risk exposure
In an industry built on trust and experience, cybersecurity can enhance rather than hinder guest confidence.
Crisis Preparedness: When Design Meets Reality
Even with a Secured by Design approach, cyber incidents may still occur. However, organizations that have embedded security into their design are better prepared to respond.
A strong incident response framework should include:
Clear escalation protocols
Rapid containment procedures
Transparent communication strategies
Coordination with legal and cybersecurity experts
Post-incident learning and system improvement
Secured by Design does not eliminate risk entirely - but it significantly improves resilience.
The Future of Secured by Design in Hospitality
As hotels become more digital, connected, and data-driven, Secured by Design will become the standard rather than the exception.
Future trends likely to shape cybersecurity design include:
Greater use of biometric authentication
Expansion of contactless and mobile-based services
Increased integration of IoT in smart hotels
More stringent global and local data protection laws
Advanced AI-driven cybersecurity systems
Hotel groups that embrace Secured by Design today will be better positioned to navigate these changes tomorrow.
Conclusion - Security as the Foundation of Digital Hospitality
Cybersecurity: Secured by Design is not just a technical concept - it is a strategic philosophy that redefines how hotel groups operate in the digital age.
By embedding security into systems, processes, governance, and culture from the very beginning, hotel groups can protect their data, safeguard their guests, and strengthen their business resilience.
In a world where cyber threats continue to evolve, Secured by Design is not just the safest approach—it is the smartest.
Author: Ojahan Oppusunggu, Director of Technical & Technology









Comments