An inherently secure system fully integrates cyber security mechanisms with system functionality and other properties. This may involve tailoring security mechanisms to system characteristics to achieve both security and functionality.
For example, partitioning can be used to both prevent corruption of data and enforce separation of access for processes that are not allowed to share data. Critical systems whose failure or corruption would cause severe consequences require high-assurance design and development. High-assurance systems should be subjected to rigorous design and implementation checking, and control steps should go beyond routine processes used in developing software. A provably secure system is one whose security mechanisms can be proven not to fail in certain modes that would allow inappropriate access or modification of data, or would otherwise disrupt the integrity of system function and data.