IDENTIFY the gaps and what needs protection
PROTECT vital assets through awareness,
RECOVER from attacks
procedures and solutions
DETECT threats and continuously monitor
RESPOND robustly and immediately
Including monitoring and alerting of the system health of all managed technologies
And deployment, rule changes, tuning, and repair support
And Mitigation Recommendations
Against global benchmarks