A user should only have the minimum level of access necessary to do their job. This limits the "blast radius" if an account is compromised. 5. The Aftermath: Incident Response

Technology alone cannot save a system. Security starts with . This involves:

The system must know who you are (ID) and you must prove it (via passwords, tokens, or biometrics).