possiblylinux127 ,
@possiblylinux127@lemmy.zip avatar

Honestly start by thinking about what has access to what. From there you can focus on least privilege which will involve firewalls, vlans and isolation

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • All magazines