
- Infrastructure – Covers endpoint security, network firewalls, threat intelligence, and perimeter-level security.
- Data Security – Includes anti-malware, digital forensics, data backup, email security, and application whitelisting.
- Risk and Vulnerability Management – Consists of vulnerability scanning and patching, penetration testing, security policy reviews, and intrusion detection.
- Identity and Access Management – Covers user access and management rights, authentication and authorization, and data governance.