A method of Threat Mitigation that involves creating correct configurations to follow Principle of Least Privilege.
Benefits
- Standardization to benchmarks like Center for Internet Security Benchmarks
- Vulnerability mitigation
- Security Compliance adherence
- Easier automation