As shown in Figure 14 above, this stage consists of three activities that are performed to define and validate the safe operating concept for an AS. The artefacts generated from this stage are used to instantiate the SOC assurance argument pattern as part of Activity 12.