The architecture of the system, software, and hardware is refined. Consistency and bidirectional traceability are established between cybersecurity requirements and system architecture, software architecture and components of hardware architecture; consistency and bidirectional traceability are established between cybersecurity requirements and software detailed design and hardware detailed design. Appropriate cybersecurity controls are selected. Weaknesses are analyzed. Detailed design of software and hardware is refined. Consistency and bidirectional traceability are established between the software architecture and software detailed design; and consistency and bidirectional traceability are established between the components of hardware architecture and hardware detailed design. The agreed cybersecurity implementation is communicated to all affected parties.