Configuration management practices are established and applied.
Software is maintained, replaced, and removed based on risk.
Hardware is maintained, replaced, and removed based on risk.
Log records are generated and made available for continuous monitoring.
Secure software development practices are integrated and their performance is monitored throughout the entire software lifecycle.