Application Security
Backup and Retention
Logging and Monitoring
Physical Security and Visible Identification
Background Checks
Access Control
Defence in Depth for Endpoints and Network
Vulnerability and Patch Management