Security configuration review of firewall and VPN, security scan over a defined number of IP addresses and multiple penetration tests of different applications and their associated systems