IT security audit of a collaboration environment by analyzing various concept documentations (ISDS concept, architectural concept and user authorization concept) and various configurations (firewall, load balancer and SharePoint), which were supplemented by a technical penetration test