consultants will identify and detail security vulnerability areas in the paper and provide recommendations for security improvement by initiating and/or updating specific physical
· Based on the results of the risk assessment
· Based on the results of the risk assessment