Review and evaluate the current architecture and security configurations of your GCP environment, as compared to industry standards and GCP security best practices.
Capture findings and develop a report with recommendations to improve the security of your GCP environment.
Review high level recommendations with a list of security action items and implementation next steps.