Defining your security requirements