All of the classical design patterns have different instantiations to fulfill some information security goal: such as confidentiality, integrity, and availability.
In addition, it also establishes set standards, responsibilities, authorities and functions, the various definitions in information security, and an annual independent evaluation.: 11.
This approach is consistent with the governments strategic view of cyberspace that is articulated in strategies such as the doctrine of information security.