Determine if hardware, operating systems, and software applications adequately address cybersecurity requirements