Assignment ContentRefer toNIST SP 800-53 (Rev. 4)[https://nvd.nist.gov/800-53] for the 18 candidate security control families and associated security controls.Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities.For this assignment, use the organization you choose.Part I: Mapping Vulnerabilities to Security ControlsChoose 5 distinct security control families as specified in NIST SP 800-53 (Rev. 4) that are most applicable to your organization’s known vulnerabilities.Create a 1-page spreadsheet in Microsoft® Excel® that identifies the following criteria for each family:Control IDControl NameVulnerabilityRecommended mitigation (refer to your Week 3 assignment; refine them for this mitigation)Part II: Security Controls TestingProvide a 2- to 3-page table in Microsoft Word including each family, and describe the testing procedure that will mitigate the vulnerability. Annotate whether the testing procedure is an interview, observation, technical test, or a combination.Example of Security Controls Testing Table:Part III: Penetration Testing and Vulnerability ScanningProvide a 1-page description of penetration testing and vulnerability scanning processes.Describe how they are used as part of the organization’s testing and assessment strategy.Format your citations according to APA guidelines.