You are only browsing one thread in the discussion! All comments are available on the post page.
Return
possiblylinux127 , 7 months ago Honestly start by thinking about what has access to what. From there you can focus on least privilege which will involve firewalls, vlans and isolation
Honestly start by thinking about what has access to what. From there you can focus on least privilege which will involve firewalls, vlans and isolation