This assessment provides a security-focused evaluation of network-based computing environments and concentrates on the security of your network from both architectural and operational perspective. It helps identify vulnerabilities that may exist at various stages, including design, deployment, and operational levels of the network.