. . . "The outcome of the process also requires participation of various people in your organization such as system and security architects, data experts, IT operations, and data and system testers." . .