The proactive planning and integration of all security disciplines and other defensive methods into the defense acquisition process to protect weapons systems and related sensitive technology; technical information such as research data with military applications; and support systems from foreign intelligence collection, unauthorized disclosure, sabotage, theft, or damage throughout the technology’s life cycle.