Techniques Due Diligence Attestation and commitment to compliance Compliance Monitoring (Internal or External) Use Network Automation Enforce data breach protections first