Produce a timeline and delegate duties (compliance automation software could make this action significantly less time intensive) Build firewalls and router requirements, which set policies for allowing for and denying access to your techniques. Firewall configurations need to be reviewed bi-annually to make certain there aren't any faulty access policies, https://www.nathanlabsadvisory.com/blog/tag/compliance/