Checklist for a successful security assessment