Verifying the integrity, confidentiality, and availability of critical data and assessing the organization's security controls, including access controls, encryption, backup procedures, and disaster recovery plans.