Inventory: Asset management
Assess: Detailed risk assessment
Secure: Essential security
Detect: Threat and anomaly detection
Audit: Security audits and compliance
Enhance: Zones and conduits
Monitor: Mature security operations
Prepare: Fault tolerance and readiness