Seeking answers to these questions at an early point in the design has an unintended, but extremely valuable side-effect: the inception of reference architectures and company-wide security standards.
To avoid having to reinvent the wheel, writing down these decisions and reusing them in your next project saves time and money for a very obvious reason: There is now a documented, agreed upon, and correct way to solve a software design problem that recurs in your line of business. While threat modeling a system the next time, a security champion aware of these standard security requirements can solve this problem in a heartbeat: They can provide a (largely pre-threat-modeled !) building block that prevents having to spend time pondering vague solutions to vague issues. In more giant corporations, we even see accompanying central code libraries that can be imported to handle security-critical operations.
For example, this can entail a ready-to-go encryption library with built-in secure key management and -rotation functionalities, pre-approved by your CISO and your DPO!