1. List of essential use cases 2. Use cases - required technology 3. Description of data flow for each use case 4. Description of security for each use case 5. Deployment Architecture Plan