This phase will take you through the following activities:
- Identifying customer expectations.
- Value ranking your customers.
- Impressing your customers with security.
Use this phase as part of the full blueprint, Satisfy Customer Requirements for Information Security.