Assess
Audit what exists; identify critical gaps; verify access; validate backups and escalation contacts.
Stabilize
Create minimum viable runbook; lock credential control; establish change logging.
Handoff
Client baseline doc package, credential registry, and documented review cadence.