Security-by-design within project scope (as defined in the quote):
Least privilege access & access controls
Backup/recovery approach (if agreed) and monitoring basics
Secure configuration, secrets handling, update processes
Documented handovers and traceable deployments