Identification should include
- facility characterization
- undesired events/critical assets identification
- consequence determination
- threat definition; likelihood of an attack
- protection system effectiveness analysis: detection, delay, response
- risk estimation upgrades and impacts: system
- upgrades, upgrade impact, methodology summary.