01. Configuration Management
Apply secure system settings that reduce vulnerabilities and prevent unauthorised changes.
02. Patch and Update Control
Maintain timely patching across applications and devices to close known security gaps.
03. Access and Privilege
Restrict administrative access and enforce least-privilege principles for critical systems.
04. Monitoring and Validation
Continuously verify compliance with hardening baselines through automated checks and review.



