- Penetration testing - Questionnaire to identify I.T. pain points and opportunities for improvement. - User verification - Workstation verification - Administrator audit