The total number of possible entry points an attacker could exploit across systems, applications, users, devices, and cloud services.