Security management in the information system used to provide a key service
Development, implementation, and updating of cybersecurity documentation for the information system used to provide a key service
Cybersecurity incident handling
Reporting a cybersecurity incident to the appropriate Computer Security Incident Response Team (CSIRT)
