We can align with your security process, including deployment/network boundary explanations, versioning and patching policy, and an agreed audit collaboration approach. The exact audit artifacts and scope depend on your requirements and the Enterprise Agreement.