Step 1 - Drawing our 'Security Perimeter'
Identifying the assets we want to protect