Process Flow - Security recommendations and score
Start Security Scan
Collect Security Data
Analyze Configurations
Generate Recommendations
Calculate Security Score
Display Results
User Applies Fixes?
No→End
Yes
Re-scan and Update Score
End
The process starts with scanning security data, analyzing it, generating recommendations, calculating a score, and optionally rescanning after fixes.