Determine if protection and detection capabilities are consistent with organization-level cybersecurity architecture