Matching business solutions to security solutions • Identification of potential security architecture and/or solutions • Link architecture/solutions to identified business solutions • Utilize problem/benefits chains