Covers managing security posture, identifying and remediating vulnerabilities, and implementing threat protection.