Architectural diagrams, schematics, specifications, code, or other resources are reviewed to ensure that relevant security controls have been properly implemented within the system. Our team will collaborate with yours to understand the system and share best security practices and implementation techniques that can be applied to the control structure.