This section includes the following topics:
Preparing for risk assessment
Assessing the compliance and the risk posture of the system
Simplifying the remediation process
Identifying possible threats in the access control system