8. Plan the security requirements

Review your security requirements with your security administrator. You may also need to consult with your network administrator.