software or changes should be investigated; (5) procedures to monitor and verify threat intelligence to make all relevant users become aware of threats. 8.3 Backup Objective: To protect against loss of data