Designing in secure spaces: How to be user-centred when user access is limited
Designing in secure environments is complex. But by leaning on user-centred principles, your team can make confident, informed decisions. Here, one of our senior UX/UI designers explains how.
Working on sensitive projects — think border security, national security, or the wider public sector — often means hitting a wall of access restrictions. Although this is perfectly understandable, it makes it difficult to get close to the people you’re designing for; the end users.
But with the right approach, designing in secure environments doesn’t have to feel like designing in the dark.
At its heart, user-centred design (UCD) is about understanding the people who will use a service — their goals, behaviours, and pain points — and using those insights to guide every decision.
Challenges in secure environments
In secure environments, UCD fundamentals still apply but they’re harder to put into practice. Teams must navigate restrictions on access, data sensitivity, and time — all while staying focused on real user needs rather than assumptions.
Strict security controls
Project files, prototypes, and meetings (essentially all forms of communication) require careful handling, adding an extra layer of complexity. A secure environment can mean you can’t access certain tools and even setting up a meeting to bring the right people together can prove tricky.
Limited user access
It’s not always possible to test products directly with representative end users, which restricts user research. Iterative feedback cycles are also harder without access to user data or analytics.
Partial information
Security restrictions can limit important context – such as workflows, technical constraints, or organisational realities – making it harder to get a complete understanding of the problem space.
Even when participants are willing to share, security protocols can force them to give vague answers. For example, workflows may differ slightly between departments but participants cannot always provide full details.
Despite these limitations, the insights can still help teams identify key pain points, missing functionality and areas where prototypes need further changes.
What tools and techniques can you use to design systems within security constraints?
Even in secure environments, it’s possible to take a user-centred approach.
Over time, we’ve designed and refined approaches that consistently help teams surface assumptions, ideate collaboratively, and validate solutions – all without compromising security.
Collaborate early and often
Collaboration is the best tool you have. When user access is limited, working together becomes one of the most effective ways to understand the people you’re designing for.
Bringing colleagues and clients into the process early helps align priorities, surface assumptions, and fill gaps left by missing data or restricted user access.
At Zaizi, we’ve found that facilitating workshops with clients alongside our own teams clarifies goals, builds shared understanding, and captures context that we might otherwise miss.
Maintaining regular communication – through secure boards, check-ins, or shared documents — keeps everyone focused on the same objectives and ensures progress continues even under constraints.
Collaboration doesn’t replace direct user insight. But it ensures that every design decision is grounded in a shared understanding and informed by the best available knowledge.
Test with real users to de-risk designs
There’s no user-centred design without users. Getting prototypes in front of a small number of end users allows you to uncover usability issues, validate design decisions, and reveal new opportunities you may never have anticipated. Even limited testing provides crucial evidence to guide your design and strengthen confidence in your decisions.
Recently, one of our teams conducted remote user testing via video calls. Due to security restrictions, some of the participants’ cameras were turned off, limiting our ability to observe non-verbal cues. They also couldn’t interact directly with the prototype, so the team guided them step-by-step through screenshots of the prototype to collect feedback.
Despite this, the sessions still surfaced valuable insights into workflows, clarified pain points and informed future design decisions.
Let the content define the interface, not the other way around
Start with the problem you’re trying to solve and the content needed to address it. Jumping straight into high-fidelity design can backfire — especially in secure environments.
Focusing too early on aesthetics pulls attention away from validating the underlying content and user needs. A content-first approach ensures early designs remain adaptable, reducing wasted effort on visual details.
You may lack access to real content or live data but you can work with generalised, representative placeholders that mirror the structure, tone, and constraints of the eventual content without exposing sensitive information. This keeps prototypes realistic enough for meaningful feedback while ensuring you stay compliant with strict security requirements.
Leverage design systems to focus on solving the core problem
Mature design systems, such as GOV.UK or the Intelligence Community Design System (ICDS), help speed up the design process and embed accessibility and usability best practices.
This frees up time to solve the core problem rather than reinvent individual components. They’re an essential tool for building consistent user experiences.
Engage with the wider design community
There’s a wealth of knowledge in the design community. Reach out, share ideas and learn from others to navigate the problem.
Zaizi operates a community of practice model, where groups focused on specific areas of expertise meet to share knowledge and support each other across projects.
The UCD community of practice, for example, provides a space for peer collaboration. It’s a sounding board for complex design challenges.
Recent sessions have included show-and-tell demonstrations on running co-design workshops and exploring AI-assisted design tools safely and transparently.
How to work confidently in secure environments
Designing in secure spaces isn’t just about following rules or checking boxes. It’s about a mindset that thrives under constraints and turns limitations into opportunities to uncover insights, collaborate effectively, and deliver user-centred solutions.
Advocate for the users
Limited access to users makes it tempting to rely on assumptions.
Be the voice of the user when they can’t be in the room. Ask questions, challenge decisions, and keep their needs central to every conversation.
Focus on evidence, not assumptions
Even when evidence is partial, documenting what you know – and noting assumptions or gaps – helps ensure decisions are rooted in the best available knowledge. It keeps the team aligned and makes reasoning behind choices transparent.
Insights don’t have to come only from direct user contact. Other useful sources include:
- historical user feedback
- analytics, however limited
- internal knowledge and observations
- subject matter expertise
- desk research on the problem
- relevant guidelines or best practices
- lessons from comparable projects
Be adaptable with your approach
Security restrictions often mean traditional UCD methods don’t fit perfectly. Adapt rather than abandon them. Shorter sessions, anonymised data, or remote walkthroughs can generate valuable insights within the limits you’re working under.
By framing your approach around these principles, your team’s mindset can shift from what you can’t do, to what you can – empowering you to confidently deliver effective, genuinely user-centred solutions.
What next?
- In a few weeks, we’ll share a follow-up post diving deeper into the practical lessons from early user and client collaboration on secure projects so that you can apply them in your own work. Subscribe for updates on our next blog.
- Want to find out more about our secure projects? We’ve put together this ebook to share some examples of how we help keep the UK safe.
Related content
-
Modernising government for AI: What key challenges do departments face?
-
Which AI workflow works best to train public sector developers? Our Cyberfirst interns find out
-
Digitisation and legacy modernisation: Setting the foundations for government AI
-
The great legacy escape: Ditch the spreadsheets, drop the paper
-
From ScanApp to Lego demos — What you need to know about Security & Policing 2025
-
Truth, trust and transformation — 4 key takeaways from Zaizi’s AI in government event