The preferred candidate is identified with explicit consideration of key security considerations of assurance, trustworthiness, effectiveness, and risk. The Decision Management process, informed by the System Analysis process, is used to perform the selection.