software assets, data protection, secure configuration, account management, access control, vulnerability security, human resource security, asset management, access control, cryptography, physical and environmental software assets, data protection, secure configuration, account management, access control, vulnerability security, human resource security, asset management, access control, cryptography, physical and environmental
Organization's digital assets against cyber threats by implementing and maintaining security controls Monitoring