possiblylinux127 , 7 months ago Honestly start by thinking about what has access to what. From there you can focus on least privilege which will involve firewalls, vlans and isolation
Honestly start by thinking about what has access to what. From there you can focus on least privilege which will involve firewalls, vlans and isolation