Model adversary capabilities and motivations - Identify highest-impact attack paths through the supply chain - Evaluate detection and response capabilities - Assess blast radius for supply chain compromise scenarios