When most people think about securing a website, they think about firewalls, penetration tests, and vulnerability scanners. But the most powerful security decision you can make happens before you write a single line of code: choosing the right architecture.
For my personal portfolio, I made a deliberate choice to build a static frontend — a site with no database, no server-side code, and no user authentication. This wasn't a limitation. It was a security strategy.
Before building anything, a security-conscious developer should ask: what are the realistic threats, and what am I protecting?
For a personal portfolio, the threat model is straightforward:
| Asset | Threat | Likelihood |
|---|---|---|
| Visitor data | Data breach | Low — no data collected |
| Site availability | DDoS attack | Medium — mitigated by CDN |
| Site integrity | Defacement / XSS | Low — no user input stored |
| My reputation | Impersonation | Low — HTTPS + domain lock |
| My email | Spam / phishing | Medium — public contact info |
Understanding this threat model shaped every technical decision that followed.
A static site has no backend server processing requests, no database executing queries, and no session tokens to steal. This eliminates entire categories of attack:
This is the principle of minimising the attack surface — one of the foundational concepts in security engineering. Every component you add to a system is a potential vulnerability. The fewer components, the smaller the surface.
All traffic to my portfolio is encrypted via TLS (HTTPS). This is non-negotiable in 2025. HTTPS protects visitors from:
My hosting provider (Manus) enforces HTTPS automatically, which means TLS certificates are provisioned and renewed without manual intervention — removing the human error risk of expired certificates.
The contact form on my portfolio is intentionally minimal. It collects a name, email, and message — nothing more. I do not:
This follows the data minimisation principle from GDPR and ISO 27001 — only collect what you genuinely need. Less data collected means less data that can be breached, misused, or subpoenaed.
A Content Security Policy is an HTTP header that tells browsers which sources of scripts, styles, and media are trusted. It is one of the most effective defences against Cross-Site Scripting (XSS) attacks.
For a static site like mine, the CSP is relatively simple — all assets are loaded from known CDN URLs and no inline scripts are executed. This means even if an attacker somehow injected a script tag into the HTML, a properly configured CSP would block it from executing.
My portfolio is built with React and a small set of well-maintained libraries. Every dependency is a potential supply chain risk — the npm ecosystem has seen numerous incidents where malicious packages were published under trusted names.
My approach:
npm audit to catch known vulnerabilitiesThis reflects the principle of least privilege applied to the software supply chain.
My email address is publicly visible on the portfolio. This is a deliberate trade-off — I want recruiters and collaborators to reach me easily. But it comes with risks:
Mitigations I use:
This is a real-world example of security vs. usability trade-offs — a concept central to GRC and security architecture roles.
Beyond showcasing my projects, this portfolio itself is a demonstration of security thinking:
These are not just portfolio talking points. They are the same principles that drive decisions in SOC environments, GRC frameworks, and security architecture reviews.
Security is not a feature you bolt on after the fact. It is a mindset you bring to every decision from the very beginning. Building this portfolio taught me that even a simple personal website is an opportunity to practice and demonstrate that mindset.
If you are a cybersecurity student or professional building your own portfolio, I encourage you to think about your threat model first. Ask yourself: what am I protecting, from whom, and what is the cost of failure? The answers will guide every technical decision that follows.

Thierry Nimubona
Aspiring Cybersecurity Expert