1. The Open Group. (2018). The TOGAF® Standard, Version 9.2. Van Haren Publishing. In Part III, Chapter 22, "Security Architecture," the methodology describes identifying security "building blocks" (services) and ensuring they are positioned correctly within the Business, Data, Application, and Technology Architectures. This aligns with defining what services are provided and where.
2. Voerman, J., & Baars, H. (2020). Information Security based on ISO/IEC 27002:2022. Van Haren Publishing. Control A.8.25, "Architecture and engineering principles," emphasizes the need to establish and apply principles for engineering secure systems, which includes the architectural design of security services as a foundational step.
3. Sabsa.org. (2009). The SABSA Method. The SABSA framework, a widely recognized methodology for security architecture, begins with a contextual layer (business requirements) and moves to a conceptual layer where business services, including security services, are defined. This supports the idea of first defining which services are provided.