Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.