A combination of proposed procedures for info technology and operational technology entrepreneurs, like a prioritized list of security procedures. Logs are saved in a very central program, for instance a security data and function management tool or central database, and may only be accessed or modified by authorized and authenticated users. Lo