IT system security control
Application security controls
Application information security
Medical devices and other external devices
Infrastructure access control
Authentication management
Multifactor authentication
Application access rights and login
Login failures and alerts
Data quality and integrity