Assumption: patching is regular
Assumption: logs arrive on time
Assumption: someone owns this decision
Assumption: processes are followed
Assumption: backups exist
Assumption: staff know the plan
Assumption: network segmentation is enforced
Assumption: credentials are rotated
Assumption: monitoring is active
Assumption: backups are tested
Assumption: vendor access is controlled
Assumption: change management is followed
Assumption: patching is regular
Assumption: logs arrive on time
Assumption: someone owns this decision
Assumption: processes are followed
Assumption: backups exist
Assumption: staff know the plan
Assumption: network segmentation is enforced
Assumption: credentials are rotated
Assumption: monitoring is active
Assumption: backups are tested
Assumption: vendor access is controlled
Assumption: change management is followed