Takeaways:
- Don’t rely on DMZ and perimeter
- Bad actors are always present
- Never trust, always verify
Key Indicators
- Authenticate, authorization
- Whitelist, not blacklist
- Encrypt everything
- Minimize atatck surface
- Continuously Monitor Behavior
resources: