Identify mitigations

Expected mitigations for for example “Unauthorised access”, are expected to be in the areas of

  • Lock down environment

  • Establish and maintain control over all inputs

  • Establish and maintain control over all outputs