A method of Threat Mitigation that involves creating correct configurations to follow Principle of Least Privilege.
Benefits
- Standardization to benchmarks like CIS Benchmark
- Vulnerability mitigation
- Security Compliance adherence
- Easier automation
A method of Threat Mitigation that involves creating correct configurations to follow Principle of Least Privilege.