Monitoring security access Maintain access controls based on a predefined policy Security and risk assessments (applications and systems as part of EWASP) Auditing of systems internally/externally Run vulnerability scans on workstations, servers, and VDI environments and