- Description: Conduct a thorough security assessment across different platforms, including network devices, cloud infrastructure, and applications, to identify vulnerabilities and recommend security enhancements.
- Format: Detailed assessment report with findings, recommendations, and prioritized action items.
- Revisions: One round of revisions included.