Governance & Risk Management
Leadership accountability, risk framework, and security policies
Access Control
Identity management, authentication, and privilege control
Network & Boundary Security
Firewalls, network segmentation, and perimeter defences
Secure Configuration
Hardening, baseline configurations, and change management
Patch & Update Management
Vulnerability management, patching cadence, and software lifecycle
Incident Response
Detection, response, recovery, and reporting capabilities
Third-Party & Supply Chain
Vendor risk management, contracts, and ongoing oversight