A Step-by-Step Guide to Conducting a Comprehensive Cybersecurity Architecture Review