| 💼 Cost Efficiency & Optimization | 3 | | 68 | | no data |
|  💼 Resource Optimization | | | 25 | | no data |
|  💼 Resource Right-Sizing | | | 18 | | no data |
|  💼 Waste Reduction | | | 25 | | no data |
| 💼 Identity & Access Governance | 5 | | 102 | | no data |
|  💼 Credential Lifecycle Management | | | 29 | | no data |
|  💼 General Access Controls | | | 18 | | no data |
|  💼 Multi-Factor Authentication (MFA) Implementation | | | 18 | | no data |
|  💼 Role-Based Access Control (RBAC) Management | | | 28 | | no data |
|  💼 User Account Management | | | 9 | | no data |
| 💼 Logging & Monitoring | 2 | | 120 | | no data |
|  💼 Alerting and Notification | | | 42 | | no data |
|  💼 Logging and Monitoring Configuration | | | 78 | | no data |
| 💼 Resource Performance | 2 | | 30 | | no data |
|  💼 Performance Tuning | | | 6 | | no data |
|  💼 Workload Efficiency | | | 24 | | no data |
| 💼 Resource Reliability | 2 | | 76 | | no data |
|  💼 Infrastructure Modernization | | | 18 | | no data |
|  💼 System Configuration | | | 58 | | no data |
| 💼 Resource Security | 7 | | 344 | | no data |
|  💼 Data Encryption | | | 61 | | no data |
|  💼 Data Protection and Recovery | | | 23 | | no data |
|  💼 Microsoft Defender Configuration | | | 29 | | no data |
|  💼 Network Exposure | | | 132 | | no data |
|  💼 Public Data Access | | | 12 | | no data |
|  💼 Secure Access | | | 56 | | no data |
|  💼 Threat Protection | | | 31 | | no data |
| 💼 Secret & Certificate Governance | 2 | | 39 | | no data |
|  💼 Cryptographic Configuration | | | 18 | | no data |
|  💼 Expiration Management | | | 21 | | no data |