1.2.4. Identify Hazards and vulnerability context