Study the security requirements of the device, system, task
We take into consideration and analyze every aspect of the device / system / task: communication between entities, authentication of entities within a system, creation and management of keys and storage of sensitive data.