Techniques Segmentation Access Control Isolation Patching Encryption SIEM Security Orchestration Automation and Response Principle of Least Privilege Configuration Enforcement Decommissioning EDR Host-Based Intrusion Prevention System