Some goals that you identify might have implicit security issues that should be emphasized. Call out specific security goals essential to the solution. For example:
Authorized access to proprietary information
Role-based access to confidential information
Secure communication between remote locations
Invocation of remote applications on local systems
Secure transactions with third-party businesses and organizations
Enforcement of security policies