
-
Information Risk Assessment
-
Deployment of Controls
-
Monitoring of Controls
-
Training and Awareness to Process and Control Owners
-
Training and Awareness to End Users
-
Vulnerability Assessment and Penetration Testing (VA-PT)
-
Secure SDLC Process implementation
-
DevSecOps implementation
-
Process Definition
-
Process Documentation