control design and effectiveness. Analyze system access, change management procedures, security configurations, and third-party/vendor...