Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.