Predict security concerns and possible vulnerabilities associated with system hardening.
Examples: weak configurations, open ports and services, third-party risks