- Defense-In-Depth Security
- Properly Designed, Implemented and Enforced Security Policies
- Security Architectures
- Appropriate Configuration
- Right Selection of Security Controls
- Incident Response
- Forensics Investigation
- Business Continuity (BC)
- Disaster Recovery (DR)
- Traffic Monitoring
- Log Management
- Log Monitoring
- Anomalies Detection
- Risk and Vulnerability Assessment
- Attack Surface Analysis
- Threat Intelligence