Human trust is flawed. Assume the attacker is already inside the system.

  1. Never trust, always verify. Every connection attempt should be authenticated and authorized

  2. Implement Least Privilege. Give them the least amount of access for them to do their job

  3. Assume breach. Micro segmentation which only allows traffic from specific sources