Identify - Protect - Detect - Respond - Recover
Security by Design
Application and data security
Host security
Network security
Physical Security
Policy and procedures
Documentation is a critical and must not be ignored when it comes to security.
Internal documentation should be prepared with the goal to provide full understanding of the complete networking infrastructure.
Organizations should never allow their products or systems to compromise the privacy of the users.