Discovery: Who has access to what and how?
In the previous post, we explored some recommendations to help lower the risk of unwanted access to company resources. Here we will dive a bit deeper into the first of these recommendations: "Understanding who has access."
To aid us, we will use a mo...
blog.cheltenham.dev4 min read