1. Garcia, M. L. (2008). The Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann. In Chapter 2, "Systematic Approach to Physical Protection System Design," the process begins with "Determination of physical protection system objectives," which is fundamentally about defining the problem by characterizing the facility and identifying threats (pp. 15-17).
2. Uptime Institute. (2018). Tier Standard: Topology. The standard emphasizes that the entire data center design, including physical security, must be based on the owner's business objectives and risk tolerance. This initial requirements-gathering phase is equivalent to defining the problem the facility must solve (Section 2.0, "Basis of the Tiers").
3. National Institute of Standards and Technology (NIST). (2020). NIST Special Publication 800-53, Revision 5: Security and Privacy Controls for Information Systems and Organizations. The Risk Management Framework (RMF) described, which is a foundational model for security, begins with the "Prepare" step. This step is dedicated to carrying out essential activities at the organization and system levels to help manage security and privacy risks, which is synonymous with defining the problem space (Chapter 2, "The Framework," p. 13).