www.ManagedSecurityServices.org  
Managed IT Services Governance Risk Compliance (GRC), Audit Account Planning  What, When, How, Who
Strategic Priorities
Stakeholder Management Stakeholder Heatmap
RACI
Contractual Deliverable Management SLA and KPI Management
Contractual Deliverables
Contract Change Management
Risk Management Business Risk
Operational Risk
Compliance Management Security Policy
Hardening Standards
Secure Software Development Framework (SSDF)
Compliance Gap assessment and Remediation
Reporting and Communication Daily, Weekly, Monthly, Quarterly meeting
Periodic Reports
Ad hoc Reports & Meeting
Audit Management Internal Review & Audit
External, Regulatory, Compliance Audit 
Audit Gap and Remediation
Issue Management Service Improvement Plan (SIP)
Back to Green Plan
Resiliency, Business Continuity Plan (BCP) Annual DR Drill
Table Top Drill
Vendor Management  
People Process Technology Automation and Continous Improvement  
People Management Onboarding and Offboarding
Skill Gap assessment, Training, and Career Planning
Attrition and Knowledge Management
Work Shift Management, Team Building, Team Motivation
Agile Squad, Social Contract, Daily Standup
Process and Documentation Standard Operating Procedures (SOP)
Architecture and Technical documents
Process Owner, Document Owner
Periodic Review and Sign Off
Artifacts/Documents Secure Storage & Management
Asset & Inventory Management Hardware Assets
Software Assets
Third Party Vendor Products
Finance Mgmt. & Upsell Revenue Management Base Contract Revenue
New Business & RFS Management
Fixed Baseline Revenue
Variable Revenue
Cost Management Labor Cost
Hardware Cost
Software Cost
3rd Party Vendor Cost
Rated Services Cost
Capex Spending
SLA Penalty
Forecasting, Manage Plan Vs Actual  
Billing, Billing Dispute Management  
Client Management Client Relationship Relationship Mapping
Client Satisfaction Objective Setting
Quantitative Feedback Survey
Medallia Net Promoter Score
Informal / Qualitative / Subjective feedback
Client Communication & Reporting Communication Plan
Client Escalation & Compliant Escalation Matrix
Contract Negotiation  
Third Party Security Third Party Security Assessment (TPSA)  
Gap Analysis and Remediation  
Physical Security 24x7 Physical Security Monitoring  
Physical Media Management  
Physical Device Security  
Perimeter Security  
Access Control  
Natural Disaster  
Manmade Disaster  
IOT, OT Security  
Human Resource Security Screening & Onboarding  
Security Awareness & Training  
Offboarding  
Defense against Social Engineering  
Application Architecture (TOGAF)  
Agile Application Development DevSecOps
Design
Build
Test & Quality
Release Management
Application Maintenance  
Application Lifecyle Management  
Vendor Products & Services  
24x7 Operations  
Dev, Test, Integration, Prod environment mgmt.  
Cloud & Infrastructure, Network Compute  
Storage  
Backup Periodic Restoration Test
Network Routers, Switches, Loadbalaner, Wifi
SDWAN, MPLS
24x7 IT Operations Incident Management
Major Incident Management
ITIL Management functions RCA/Problem Management
Change Management
Capacity Management
On-prem Cloud Migration & Integration  
Cyber Security 24x7 Security Operations Center (SOC) - SIEM, XDR, SOAR Detection & Analysis
Incident Response & Recovery
Major Incident Management (MIM)
Cyber Threat Intelligence (CTI) Open Source Intelligence (OSINT)
CTI Vendors
Internal Source
Indicators of Compromise (IoC)
Tactics Techniques and Procedures (TTP)
Advanced Persistent Threats (APT)
Offensive Cyber Defense Red Teaming/Purple Teaming/Pentest/Ethical Hacking
Honeypots
Attack Vectors and Counter Measures
Vulnerability Management Vulnerability Scanning
Vulnerability Assessment (CVE)
Risk based Prioritisation
Remediation Plan
Risk based Patching, Hotfix, Periodic system reboot
Rescan to validate, Ongoing Monitoring
Identity and Access Management (IAM) Previlige Access Management
Password Policy and Enforcement
Quarterly Access Revalidation
BAU Security Operations  RCA/Problem Management
Change Management
Capacity Management
Release Management
EOS/EOL Management
Security Design, Build, Transition, Retire Security Design & Building
Project Implementation
Security Service Onboarding
Secure Decommission & Disposal
Application Security DevSecOps
Application Security Testing (Static, Dynamic, Automated, Manual)
API Security
DDoS Protection
Web Application Firewall (WAF)
Application Whitelisting
Network Security Physical & Virtual Firewall
Intrusion Prevention System (IPS), Intrusion Detection System (IDS)
Routers, Switches, Loadbalancer Security
Wifi Intrusion Prevention System
Wireless, Bluetooth Security
Data Loss Prevention (DLP)
Zero Trust Network Access (ZTNA)
Micro-Segmentation
Cloud & Infrastructure Security DMZ Architecture
Backup & Restoration
Cloud Security Controls
Cloud Access Security Broker (CASB)
Next-Generation Secure Web Gateway (NG SWG)
End Point Security Email Security
Browser Isolation
Anti-virus
Remote Access, Virtual Private Network (VPN)
Bring Your Own Device (BYOD)
Mobile Device Security
Device Encryption
Security Log Management