To provide a better understanding of the potential relative security of an application or service and to identify potential red flags. To provide a risk assessment from an IT perspective before ...