Prepare for Collection
Collect Data & Analyze Results
Determine Corrective Action
Submit Report to Stakeholders
Discuss Requirements with all Stakeholders
Review current system security policies and technical documentation
Evaluate customer cloud architecture to identify gaps and vulnerabilities
Conduct a Vulnerability Assessment
Submit Final report with identified vulnerabilities and corrective actions
Cloud Compliance Review – Ensure compliance with applicable regulatory frameworks (ex. NIST)