Which of the following processes is the FIRST step in establishing an information security policy?