1. Network Monitoring and Security
2. Vulnerability Management
3. Access Control and Authentication
6. Security Training and Awareness
7. Documentation and Reporting
8. Third-party Service Provider Management
9. System Configuration and Management
10. Review of Policies and Procedures