Evaluate your current security posture
Assess how well your network is segmented to contain potential breaches and limit lateral movement.
Evaluate your identity management, authentication, and authorization controls.
Assess your ability to detect, log, and analyze security events in real-time.
Evaluate your preparedness to respond to and recover from security incidents.