s , policy compliance targets, and network security goals (e.g., SLAs, KPIs, KRIs, OKRs) Install security measures and operate software to protect systems and information infrastructure, including assisting with firewalls security rules, and data security implementation. R egularly review and request updates of firewall rules and configurations to address emerging security