Surface
What's exposed to an attacker. Public ports, legacy authentication, published apps, conditional access exemptions, dormant admin accounts, external mail forwarding. Every one of these is an opportunity you can shrink before anyone tries to use it.
