Workflows
Adversaries
Assets
Attack vectors
Attacks
Threats
What is logged and can we gain access to some logs?