Threats shall be identified and assessed in relation to all relevant assets, including software, network and system architectures, and facilities.
Threats shall be identified and assessed in relation to all relevant assets, including software, network and system architectures, and facilities.