Human trust is flawed. Assume the attacker is already inside the system.

Principles

  1. Never trust, always verify. Every connection attempt should be authenticated and authorized. Use Adaptive Identity
  2. Implement Principle of Least Privilege. Give them the least amount of access for them to do their job
  3. Assume breach. Micro segmentation through Planes of Operation and PEP to allow traffic only from specific sources

Concepts

Tools