Technological Controls
User endpoint devices
Priviliged access rights
Information access restriction
Access to source code
Secure authentication
Capacity management
Protection against malware