Determine if research and design processes and procedures are accurately followed by cybersecurity staff when performing their day-to-day activities