Actions performed during an investigation are recorded, and the records’ integrity and provenance are preserved
Backups of data are created, protected, maintained, and tested
Improvements are identified from security tests and exercises
Physical access to assets is managed, monitored, and enforced
Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties