Act as a security architect. Draft a security overview for customer due diligence: network diagram, authN/Z, secrets management, key rotation, audit logging, disaster recovery RTO/RPO, and vulnerability management cadence. Include a concise one-pager summary.