by enabling the appropriate security controls ● Testing and identifying network and system vulnerabilities standards accordingly ● Routinely conduct penetration testing ● Taking appropriate security measures to ensure infrastructure and existing data are kept safe ● Conducting testing and scans to identify any vulnerabilities in the