1. Configure intuitive business security requirements
  2. Generate matching technical security policies automatically
  3. Enforce technical security policies transparently
  4. Audit technical security policies transparently
  5. Update technical security policies automatically