A cybersecurity team at a financial institution is conducting a security review to identify vulnerabilities within their internal network. They perform vulnerability scanning, log analysis, and penetration testing without involving external consultants. The goal is to strengthen their security posture by proactively identifying weaknesses before an actual attack occurs. What type of assessment is being conducted?