The document discusses an active security management strategy with 4 key steps:
1) Security risk management to identify, assess, and mitigate risks.
2) Operations management to configure, operate, and monitor security controls.
3) Incident management to collect, correlate, investigate, and remediate security incidents.
4) Business-driven management to fully embed security in business processes and integrate security tools with business systems.