Identification should include
consideration of safety standards (e.g., OSHA regulations)
threats to physical security
threats to digital security.