| Security governance | Sharing security work and responsibility |
| Security assurance | Automate Evidence Gathering |
| Identity and access management | IAM Data Perimeters IAM Policy Generation Pipeline Temporary Elevated Access |
| Threat detection | Threat Intelligence Network Flows analysis (VPC Flow Logs) |
| Vulnerability management | Vulnerability Management Team |
| Infrastructure protection | Zero Trust Access Use abstract services |
| Data protection | GenAI Data protection |
| Application security | Forming a Red Team (Attacker's Point of View) |
| Incident response | Forming a Blue Team (Incident Response) Advanced security automations Security Orchestration & Ticketing Automate deviation correction in configurations |
| Resiliency | Multi-region Disaster Recovery Automation Chaos Engineering |