Governance model Policies / regulation / processes Cybersecurity Assessment of Maturity Security by design approach Processes Operational improvement Security Operations Center (SOC) functions Design Build Transition Operation model