Watch this video on YouTube
What is the FIRST step in determining security compliance and other requirements for a new system implementation?