Security requirements warrant separate discussion. These requirements are described in detail in Chapter 7, Identifying Security Requirements.