Technology

Technologies that are used to implement security controls, including restriction of access, authentication of identity, verifying access authorization, and assessing threat.