Rene is correct. From the definition:
Security Sub-Tower: Resources for setting policy, establishing process and means, measuring compliance and responding to security breaches and providing real-time operational security such as vulnerability scanning, managing firewalls, intrusion prevention systems, and security information and event management (SIEM). Optional Level 3 categories include: Cyber Security.
The operational tools to manage infrastructure or implementation actions defined by security policies (e.g. mitigating security breaches by applying patches) are not included in the Security sub-tower and are part of the respective towers where the actions take place (e.g. Compute, Storage, Network).
#CostingStandard(CT-Foundation)