The framework is built around five core functions: Identify, Protect, Detect, Respond, and Recover. Each applies directly to production systems that face real-world traffic and threats every day.
Identify means mapping assets, applications, and dependencies in production. This includes knowing which services are internet-facing, the data they store, and how they connect to internal systems. You can’t defend what you can’t see.
Protect focuses on hardened configurations, least privilege access, and encryption in transit and at rest. In production, it also means enforcing secure CI/CD pipelines and automated checks before deployment. All changes should require multi-factor authentication for approval.
Detect requires timely monitoring. Use centralized logging, anomaly detection, and alerting tuned for your production environment’s normal activity. The faster you detect anomalies, the smaller the blast radius.