Assets, Attack Surfaces, and Trust BoundariesIdentify what you're protecting and where you're vulnerable