Which of the following tools BEST demonstrate the effectiveness of the information security program?