(
)
Identify Vulnerabilities in Perimeter
Reduce the attack surface