Team 1 - Principles of Information Securety
Team 1 - Principles of Information Securety
SECURITY
MODEL
Team
1
OUR
GROUP
Bui Thu Phuong-22070013
SECURITY model.
MODEL:
III. IMPLEMENT LEAST
PRIVILEGE ACCESS
CONTROLS, CONTINUOUS
VERIFICATION, NETWORK
SEGMENTATION, AND USE
MULTI-FACTOR
• Least Privilege Access: Allow users and
devices to access only necessary
resources, reducing access points to
sensitive data and saving time and
resources by limiting MFA usage.
ACCESS
CONTROLS:
• Identify Users and Devices: Always know
who and what is connecting to the
business network, especially important
with remote workforces.