I will have to agree with everyone that the security has to design/implementation concern by everyone and it must cross all of the layers. I work for a very large company working on very large internal web applications, where everyone using the system is a trusted person, and security is still a top concern.
Here is how it breaks down on my web apps from layer perspective. When a request is sent to the web application there is company wide security at the sub-domain level which only only allows SSL (HTTPS) communication to the server. There is also another server that intercepts the requests to the application and managed people logging into the application based on the username and password and the URL they are going to.
When the request hits the UI layer it runs through another security check to validate the user credentials sent when the user logged in. This is to determine what actions the user can do in the system.
In the business service layer we implement business security logic to filter out certain data that the user is not allowed to see (such as information about his/her self). This will allow the filtering to be done in one place even if it is being called by different place from the UI.
At the data access layer or SQL the company only allows stored procedures. This makes sure that the DBA is aware of all calls to the database (DBA is the only person who has access to make changes to the DB) and that none of the developers can sneak in bad SQL. TO access the database we use a special user ID and a password that is encrypted in a config file (company policy).
When the data comes back to the screen to displayed we will occasionally add a custom hash to some of the data that we do not want tampered with.
Security is something that should be part standard for the company and part application specific. The architect will help you define where you need security in the different use cases and where you need to override the default security provided by the infrastructure. When it comes to the actual code it is the developer who generally figures out how implement the security in the specific flow and to find the flows that need the security as identified by the architect.
Not really sure if this answers your question...