It includes the development of information security management controls and procedures, cyber security systems, identity and access management systems