After threats are determined, manufacturers have to develop and put into action suitable control actions to mitigate these threats. This may involve layout features such as redundant techniques, alarm mechanisms, or automated security controls. Digital document-holding programs need to be validated to make sure they satisfy these prerequisit