01
![sca-planning-how-we-work-min sca-planning-how-we-work-min](https://scasecurity.com/wp-content/uploads/elementor/thumbs/sca-planning-how-we-work-min-pnp86j0vt1bpb9d2mt98lleth47nd7b3u98ieq0bzs.jpeg)
Planning
All parties gain a comprehensive understanding of the scope and purpose of the engagement.
02
![Security Compliance Associates Controls](https://scasecurity.com/wp-content/uploads/elementor/thumbs/controls-plax4c27yt4hm5g9g0679trcms4xeok1trcs4nfkhs.jpg)
Discovery
Gather and analyze all pertinent information and supporting documentation.
03
![Security Compliance Associates Professional Services](https://scasecurity.com/wp-content/uploads/elementor/thumbs/professional-services-plax48auyp8203yz66dgkmxu1rt4tjhzavtsz9hp6g.jpg)
Reporting
Document findings and strategize the best course of action for remediation.
04
![people-process-technology people-process-technology](https://scasecurity.com/wp-content/uploads/elementor/thumbs/people-process-technology-plax5578c7qy99jfhf43rjxzgntyi020mhewgsf95c.jpg)
Communication
Present and discuss the findings and recommendations to client project owner(s), executive management and Board of Directors.