Security patches are applied regularly. Access policies are updated. Systems are protected against emerging threats.