Coordinate pieces; defend by reducing threats
Attacking demands force concentration and open lines; defending removes key attackers and blocks files/diagonals.