In this lesson students will learn about the importance of Protective Technology that has been implemented to save guard information assets from the loss of confidentiality, integrity, and availability in support of the overarching NIST CSF Program. In this lesson we will clarify some of the technical requirements used with Protective Technology. These requirements include audit logging, controlling removeable media, limiting access to assets, controlling telecommunications, and the use of infrastructure to strengthen resilience. In this lesson we will review many valuable considerations for the establishment of Protective Technology. We will also provide an exercise for students to practice their newfound knowledge and develop new Cybersecurity skills.