{"id":4100,"date":"2026-03-11T10:38:03","date_gmt":"2026-03-11T09:38:03","guid":{"rendered":"https:\/\/www.mxblue.nl\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/"},"modified":"2026-03-11T10:57:21","modified_gmt":"2026-03-11T09:57:21","slug":"secure-by-design-in-mendix-from-reactive-security-to-built-in-control","status":"publish","type":"post","link":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/","title":{"rendered":"Secure by design in Mendix: from reactive security to built in control"},"content":{"rendered":"\n<section id=\"mxblue-post-base-block_462c79bb2dffb93317fc3b85db56ee32\" class=\"relative p-section bg-white mxblue-post-base alignfull\">\n   <div class=\"container flex flex-col items-center gap-y-10\">\n\n      <div class=\"flex flex-col w-full gap-12 lg:w-[calc(100%-200px)]\">\n                     <div class=\"aspect-3-125\">\n               <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"425\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog--1024x425.jpg\" class=\"aspect-3-125 rounded-lg object-cover w-full\" alt=\"\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog--1024x425.jpg 1024w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog--300x125.jpg 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog--768x319.jpg 768w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog--1536x638.jpg 1536w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg 1704w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>            <\/div>\n               <\/div>\n\n      <div class=\"post-content w-full lg:w-[calc(100%-400px)]\">\n\n                     <ul class=\"!mb-4 seperator !flex-row\">\n               <li><a href=\"https:\/\/www.mxblue.nl\/en\/category\/blog-en\/\">Blog EN<\/a><\/li>            <\/ul>\n         \n         <h1 class=\"mb-4\">Secure by design in Mendix: from reactive security to built in control<\/h1>\n         \n\n<p class=\"wp-block-paragraph\">Security in many organizations still operates as a reactive function. Vulnerabilities are discovered after applications are deployed and incidents trigger investigations. Security teams then respond with patches, additional controls, or process adjustments. This model worked when software changed slowly and application landscapes were relatively small, but it is far less effective in modern low code environments.    <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mendix applications evolve continuously. New features are deployed frequently, teams work in parallel across multiple applications, and integrations expand over time. In such an environment security that relies primarily on reacting to discovered problems becomes increasingly difficult to manage. The challenge is therefore no longer simply identifying vulnerabilities. The real challenge is ensuring that the conditions in which vulnerabilities can arise remain structurally under control. This shift defines the principle of secure by design.      <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"653\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-5-1.png\" alt=\"\" class=\"wp-image-4091\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-5-1.png 980w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-5-300x200.png 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-5-767x511.png 767w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security as a design property<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Traditional security approaches often treat security as a review phase. Applications are developed first and security validation takes place afterwards through testing, audits, or vulnerability scans. The problem with this model lies in the timing. By the time a vulnerability is discovered, the design decisions that allowed it may already be deeply embedded in the application architecture. Correcting the issue can require structural changes that are costly and disruptive.     <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Secure by design approaches the problem differently. Instead of identifying vulnerabilities after they appear, the goal is to structure systems so that many categories of vulnerabilities cannot easily occur in the first place. Security therefore becomes a property of the system\u2019s design rather than a reaction to discovered weaknesses.   <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-6-1024x683.png\" alt=\"\" class=\"wp-image-4093\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-6-1024x683.png 1024w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-6-300x200.png 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-6-768x512.png 768w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-6-1.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Mendix already provides a strong foundation<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The Mendix platform naturally supports several principles aligned with secure by design. The platform introduces clear abstractions around data models, access control, and deployment boundaries. Domain models define the structure of application data and access rules determine which roles can interact with specific entities or pages. Deployments occur within a controlled runtime environment. These characteristics provide a strong foundation.     <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">However, the platform alone does not guarantee secure outcomes. As Mendix landscapes grow, organizations often manage dozens or even hundreds of applications. Multiple development teams contribute to the environment, dependencies between applications increase, runtime configurations evolve, and operational complexity grows. At that point the challenge shifts from securing individual applications to maintaining consistent control across the entire application portfolio.    <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-8-1024x683.png\" alt=\"\" class=\"wp-image-4097\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-8-1024x683.png 1024w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-8-300x200.png 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-8-768x512.png 768w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-8-1.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The acceleration problem<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Low code accelerates development. That is precisely why organizations adopt platforms such as Mendix. However, speed also introduces new risks. When building applications becomes easier, the number of applications grows rapidly. Teams may implement similar functionality in different ways and security policies may be interpreted differently across projects. Configurations between environments can diverge and small deviations accumulate over time. Eventually the security posture across the landscape becomes inconsistent. What started as a design challenge gradually becomes a governance challenge. Secure by design requires organizations to address this reality directly.         <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Integrating security into the lifecycle<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In mature Mendix environments security cannot remain a periodic review activity. It must become part of the development lifecycle itself. Instead of evaluating security only after deployment, applications are continuously assessed against defined policies and standards.   <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This model typically includes several characteristics: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>security policies are explicitly and consistently defined <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>applications are automatically evaluated against those policies <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>deviations become visible immediately <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>remediation can occur quickly while the context of the change is still fresh <\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The result is not slower development. Development can continue at high speed while maintaining structural control. Security becomes an operational property of the platform rather than an after the fact intervention.   <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-7-1024x683.png\" alt=\"\" class=\"wp-image-4095\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-7-1024x683.png 1024w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-7-300x200.png 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-7-768x512.png 768w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/03\/image-7-1.png 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>From policy to operational control<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Many organizations already have security policies in place. That is a necessary first step. However, policies written on paper do not enforce themselves. When verification occurs only through manual reviews or occasional audits, compliance remains fragile. Effective governance requires operationalizing those policies.     <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In practice this means that: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>policies are translated into automated checks <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the state of applications is evaluated continuously <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>evidence of compliance is generated automatically <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>exceptions become visible as soon as they occur <\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Control therefore becomes continuous rather than periodic. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security as a governance capability<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Secure by design ultimately intersects with governance. Organizations must be able to demonstrate that their systems remain within defined security and compliance boundaries, not only during audits but at any moment in time. This requires visibility. Platform teams need to understand which policies apply, which applications are evaluated against those policies, where deviations occur, and how those deviations are resolved. Without this visibility governance remains reactive. With it governance becomes operational.     <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The broader implication<\/strong> <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">As Mendix adoption expands within organizations, the central question evolves. It is no longer only about whether individual applications are secure. The question becomes whether the entire Mendix landscape remains structurally within control boundaries as it continues to grow. Secure by design provides the conceptual framework to answer that question. Not by reacting faster to vulnerabilities, but by structuring systems so that many vulnerabilities never emerge in the first place. When this approach is combined with continuous governance and automated policy evaluation, organizations gain something many still lack today: continuous control.      <\/p>\n\n      <\/div>\n\n      \n   <\/div>\n<\/section>\n<section id=\"mxblue-cta-block_770f6727b2f2f2b33ce8c7e78be92536\" class=\"mxblue-block relative flex flex-col bg-brand-neutral-medium md:flex-row mxblue-cta alignfull\">\n\n   <div class=\"relative top-0 h-full aspect-video md:absolute bg-alert-light left-0 md:w-2\/5\">\n      \n      <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 183.81 132.68\" class=\"absolute h-[72px] w-auto -bottom-[29px] left-1\/2 z-10 md:w-[100px] md:-translate-y-1\/2 md:translate-x-0 md:top-1\/2 -translate-x-1\/2 md:-right-[50px] md:left-auto\">\n         <polygon class=\"fill-brand-heading\" points=\"22.22 132.68 64.25 45.89 80.8 80.06 55.31 132.68 77.53 132.68 91.91 103 106.28 132.68 128.5 132.68 103.02 80.06 119.56 45.89 161.59 132.68 183.81 132.68 119.56 0 91.91 57.11 64.25 0 0 132.68 22.22 132.68\" \/>\n      <\/svg>\n\n      <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"981\" src=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2.jpg\" class=\"absolute top-0 left-0 object-cover w-full h-full\" alt=\"\" srcset=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2.jpg 1920w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2-300x153.jpg 300w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2-1024x523.jpg 1024w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2-768x392.jpg 768w, https:\/\/www.mxblue.nl\/wp-content\/uploads\/2022\/12\/Kantoor-MxBlue-2-1536x785.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>   <\/div>\n\n   <div class=\"container flex justify-end\">\n      <div class=\"w-full md:px-4 md:py-12 md:w-3\/5\">\n         <div class=\"flex flex-col gap-y-8 p-section\">\n            \n\n<h2 class=\"wp-block-heading\">Make it happen with MxBlue<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Curious about the opportunities we see for your organization? Want to know more about the possibilities of Mendix? We can talk about that for hours, but we will keep it short. Promise.   <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.mxblue.nl\/en\/contact\/\">Get in touch<\/a><\/div>\n<\/div>\n\n         <\/div>\n      <\/div>\n   <\/div>\n\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":3940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[21],"tags":[],"class_list":["post-4100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure by design in Mendix: from reactive security to built in control - MxBlue<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure by design in Mendix: from reactive security to built in control - MxBlue\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/\" \/>\n<meta property=\"og:site_name\" content=\"MxBlue\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-11T09:38:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T09:57:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1704\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dieuwke Groot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dieuwke Groot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/\"},\"author\":{\"name\":\"Dieuwke Groot\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#\\\/schema\\\/person\\\/c8608753cf240287ea9e4e641b49e6cc\"},\"headline\":\"Secure by design in Mendix: from reactive security to built in control\",\"datePublished\":\"2026-03-11T09:38:03+00:00\",\"dateModified\":\"2026-03-11T09:57:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Andrew-blog-.jpg\",\"articleSection\":[\"Blog EN\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/\",\"url\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/\",\"name\":\"Secure by design in Mendix: from reactive security to built in control - MxBlue\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Andrew-blog-.jpg\",\"datePublished\":\"2026-03-11T09:38:03+00:00\",\"dateModified\":\"2026-03-11T09:57:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Andrew-blog-.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Andrew-blog-.jpg\",\"width\":1704,\"height\":708},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\",\"item\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure by design in Mendix: from reactive security to built in control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/\",\"name\":\"MxBlue\",\"description\":\"Mendix en Manufacturing - de digitale versneller \",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#organization\",\"name\":\"MxBlue\",\"url\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-favicon-mxblue.png\",\"contentUrl\":\"https:\\\/\\\/www.mxblue.nl\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-favicon-mxblue.png\",\"width\":512,\"height\":512,\"caption\":\"MxBlue\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mxblue.nl\\\/en\\\/#\\\/schema\\\/person\\\/c8608753cf240287ea9e4e641b49e6cc\",\"name\":\"Dieuwke Groot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g\",\"caption\":\"Dieuwke Groot\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure by design in Mendix: from reactive security to built in control - MxBlue","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/","og_locale":"en_US","og_type":"article","og_title":"Secure by design in Mendix: from reactive security to built in control - MxBlue","og_url":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/","og_site_name":"MxBlue","article_published_time":"2026-03-11T09:38:03+00:00","article_modified_time":"2026-03-11T09:57:21+00:00","og_image":[{"width":1704,"height":708,"url":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg","type":"image\/jpeg"}],"author":"Dieuwke Groot","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dieuwke Groot","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#article","isPartOf":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/"},"author":{"name":"Dieuwke Groot","@id":"https:\/\/www.mxblue.nl\/en\/#\/schema\/person\/c8608753cf240287ea9e4e641b49e6cc"},"headline":"Secure by design in Mendix: from reactive security to built in control","datePublished":"2026-03-11T09:38:03+00:00","dateModified":"2026-03-11T09:57:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/"},"wordCount":888,"publisher":{"@id":"https:\/\/www.mxblue.nl\/en\/#organization"},"image":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg","articleSection":["Blog EN"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/","url":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/","name":"Secure by design in Mendix: from reactive security to built in control - MxBlue","isPartOf":{"@id":"https:\/\/www.mxblue.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#primaryimage"},"image":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg","datePublished":"2026-03-11T09:38:03+00:00","dateModified":"2026-03-11T09:57:21+00:00","breadcrumb":{"@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#primaryimage","url":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg","contentUrl":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2026\/02\/Andrew-blog-.jpg","width":1704,"height":708},{"@type":"BreadcrumbList","@id":"https:\/\/www.mxblue.nl\/en\/secure-by-design-in-mendix-from-reactive-security-to-built-in-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"","item":"https:\/\/www.mxblue.nl\/en\/"},{"@type":"ListItem","position":2,"name":"Secure by design in Mendix: from reactive security to built in control"}]},{"@type":"WebSite","@id":"https:\/\/www.mxblue.nl\/en\/#website","url":"https:\/\/www.mxblue.nl\/en\/","name":"MxBlue","description":"Mendix en Manufacturing - de digitale versneller ","publisher":{"@id":"https:\/\/www.mxblue.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mxblue.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mxblue.nl\/en\/#organization","name":"MxBlue","url":"https:\/\/www.mxblue.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mxblue.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2023\/01\/cropped-favicon-mxblue.png","contentUrl":"https:\/\/www.mxblue.nl\/wp-content\/uploads\/2023\/01\/cropped-favicon-mxblue.png","width":512,"height":512,"caption":"MxBlue"},"image":{"@id":"https:\/\/www.mxblue.nl\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mxblue.nl\/en\/#\/schema\/person\/c8608753cf240287ea9e4e641b49e6cc","name":"Dieuwke Groot","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffb8b456770820e39cb882e14ccf802532256bdf82437dd7decf0d8b1324b60e?s=96&d=mm&r=g","caption":"Dieuwke Groot"}}]}},"_links":{"self":[{"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/posts\/4100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/comments?post=4100"}],"version-history":[{"count":3,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/posts\/4100\/revisions"}],"predecessor-version":[{"id":4104,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/posts\/4100\/revisions\/4104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/media\/3940"}],"wp:attachment":[{"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/media?parent=4100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/categories?post=4100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mxblue.nl\/en\/wp-json\/wp\/v2\/tags?post=4100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}