| 💼 Cost Efficiency & Optimization | 3 | | 67 | | no data |
|  💼 Resource Optimization | | | 24 | | no data |
|  💼 Resource Right-Sizing | | | 15 | | no data |
|  💼 Waste Reduction | | | 28 | | no data |
| 💼 Identity & Access Governance | 5 | | 88 | | no data |
|  💼 Credential Lifecycle Management | | | 23 | | no data |
|  💼 General Access Controls | | | 12 | | no data |
|  💼 Multi-Factor Authentication (MFA) Implementation | | | 16 | | no data |
|  💼 Role-Based Access Control (RBAC) Management | | | 18 | | no data |
|  💼 User Account Management | | | 19 | | no data |
| 💼 Logging & Monitoring | 2 | | 99 | | no data |
|  💼 Alerting and Notification | | | 27 | | no data |
|  💼 Logging and Monitoring Configuration | | | 72 | | no data |
| 💼 Resource Performance | 2 | | 28 | | no data |
|  💼 Performance Tuning | | | 4 | | no data |
|  💼 Workload Efficiency | | | 24 | | no data |
| 💼 Resource Reliability | 2 | | 80 | | no data |
|  💼 Infrastructure Modernization | | | 18 | | no data |
|  💼 System Configuration | | | 62 | | no data |
| 💼 Resource Security | 6 | | 345 | | no data |
|  💼 Data Encryption | | | 67 | | no data |
|  💼 Data Protection and Recovery | | | 18 | | no data |
|  💼 Microsoft Defender Configuration | | | 29 | | no data |
|  💼 Public and Anonymous Access | | | 114 | | no data |
|  💼 Secure Access | | | 70 | | no data |
|  💼 Threat Protection | | | 48 | | no data |
| 💼 Secret & Certificate Governance | 2 | | 24 | | no data |
|  💼 Cryptographic Configuration | | | 9 | | no data |
|  💼 Expiration Management | | | 15 | | no data |