Implementing and Auditing the Critical Security Controls - In-Depth