Days 1-30
Asset and systems inventory. Risk register, populated with named owners. Policy baseline (information security policy, acceptable use, access control). Stakeholder map for board, customers, auditors. One working customer security questionnaire answered end-to-end.