Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Encryption for all data in transit
  • Use Micro-segmentation
  • Authentication and authorization of all servicesUse Multi-factor authentication
  • Least privileges
  • Logging and monitoring of security events

...