SECURITY MUST BE CONTINUOUS And integrated throughout the IT lifecycle Identify security requirements & governance models
Revise, update, remediate as the landscape changes
DESIGN BUILD
ADAPT
Security policy, process & procedures
RUN
Built-in from the start; not bolted-on
Deploy to trusted platforms with enhanced security capabilities
MANAGE Automate systems for security & compliance 46