| 💼 Cost Efficiency & Optimization | 3 | | 64 | | no data |
|  💼 Resource Optimization | | | 24 | | no data |
|  💼 Resource Right-Sizing | | | 15 | | no data |
|  💼 Waste Reduction | | | 25 | | no data |
| 💼 Identity & Access Governance | 5 | | 78 | | no data |
|  💼 Credential Lifecycle Management | | | 18 | | no data |
|  💼 General Access Controls | | | 11 | | no data |
|  💼 Multi-Factor Authentication (MFA) Implementation | | | 16 | | no data |
|  💼 Role-Based Access Control (RBAC) Management | | | 14 | | no data |
|  💼 User Account Management | | | 19 | | no data |
| 💼 Logging & Monitoring | 2 | | 92 | | no data |
|  💼 Alerting and Notification | | | 27 | | no data |
|  💼 Logging and Monitoring Configuration | | | 65 | | no data |
| 💼 Resource Performance | 2 | | 28 | | no data |
|  💼 Performance Tuning | | | 4 | | no data |
|  💼 Workload Efficiency | | | 24 | | no data |
| 💼 Resource Reliability | 2 | | 61 | | no data |
|  💼 Infrastructure Modernization | | | 16 | | no data |
|  💼 System Configuration | | | 45 | | no data |
| 💼 Resource Security | 6 | | 276 | | no data |
|  💼 Data Encryption | | | 44 | | no data |
|  💼 Data Protection and Recovery | | | 18 | | no data |
|  💼 Microsoft Defender Configuration | | | 26 | | no data |
|  💼 Public and Anonymous Access | | | 101 | | no data |
|  💼 Secure Access | | | 57 | | no data |
|  💼 Threat Protection | | | 31 | | no data |
| 💼 Secret & Certificate Governance | 2 | | 21 | | no data |
|  💼 Cryptographic Configuration | | | 8 | | no data |
|  💼 Expiration Management | | | 13 | | no data |