• A Number of roles
  • B Number of lines of code
  • C Size of the attack surface
  • D Size of the chroot jail