- Information Risk Assessment
- Deployment of Controls
- Monitoring of Controls
- Training and Awareness to Process and Control Owners
- Training and Awareness to End Users
- Vulnerability Assessment and Penetration Testing (VA-PT)
- Secure SDLC Process implementation
- DevSecOps implementation
- Process Definition
- Process Documentation