| 💼 Cost Efficiency & Optimization | 3 | | 67 | | no data |
|  💼 Resource Optimization | | | 25 | | no data |
|  💼 Resource Right-Sizing | | | 17 | | no data |
|  💼 Waste Reduction | | | 25 | | no data |
| 💼 Identity & Access Governance | 5 | | 97 | | no data |
|  💼 Credential Lifecycle Management | | | 28 | | no data |
|  💼 General Access Controls | | | 18 | | no data |
|  💼 Multi-Factor Authentication (MFA) Implementation | | | 18 | | no data |
|  💼 Role-Based Access Control (RBAC) Management | | | 24 | | no data |
|  💼 User Account Management | | | 9 | | no data |
| 💼 Logging & Monitoring | 2 | | 119 | | no data |
|  💼 Alerting and Notification | | | 42 | | no data |
|  💼 Logging and Monitoring Configuration | | | 77 | | no data |
| 💼 Resource Performance | 2 | | 29 | | no data |
|  💼 Performance Tuning | | | 6 | | no data |
|  💼 Workload Efficiency | | | 23 | | no data |
| 💼 Resource Reliability | 2 | | 74 | | no data |
|  💼 Infrastructure Modernization | | | 18 | | no data |
|  💼 System Configuration | | | 56 | | no data |
| 💼 Resource Security | 7 | | 338 | | no data |
|  💼 Data Encryption | | | 61 | | no data |
|  💼 Data Protection and Recovery | | | 21 | | no data |
|  💼 Microsoft Defender Configuration | | | 29 | | no data |
|  💼 Network Exposure | | | 132 | | no data |
|  💼 Public Data Access | | | 11 | | no data |
|  💼 Secure Access | | | 53 | | no data |
|  💼 Threat Protection | | | 31 | | no data |
| 💼 Secret & Certificate Governance | 2 | | 38 | | no data |
|  💼 Cryptographic Configuration | | | 18 | | no data |
|  💼 Expiration Management | | | 20 | | no data |