The purpose of this activity is to evaluate the tested solution against its acceptance criteria, and to produce a
detailed and thorough analysis of both the resultant solution and its associated operational documentation.
Any recognized security vulnerabilities and risks should be highlighted in the review results.
|