1.)Implement A strong identity foundation:
Providing the least required permission and enforce separation of duties through.
2.)Enable traceability: Monitor, alert, and audit actions.
3.)Apply security at all layers:
Utilize multiple security controls.
4.)Automate security practices:
Automated security mechanisms to improve
security, scale more rapidly and be more cost effective.
5.)Protect data in transit and at rest:
Segregate data into sensitivity levels and use encryption and access control for data protection.
6.)Keep people away from data:
Eliminate the need for direct access or manual processing of data.
7.)Prepare for security events:
Create incident management and investigation policy