Cloud risk assessment
o Threat Modelling, risks, vulnerabilities
Cloud computing & security
Identity & access governance
o Joiner, mover, leaver,
o Provisioning & de-provisioning
o Platforms (Azure AD, applications, roles, groups etc.)
o AAA - Segregation of duty controls
Zero trust governance framework
a. Identity and Access Management (IAM)
b. Device and User Authentication
c. Network Segmentation
d. Network Visibility and Monitoring
e. Least Privilege Access
f. Continuous Authentication and Authorization
g. Policy Enforcement and Access Control
h. Threat Intelligence and Analytics
i. Change Management #5 Round table - Reflection & forging forward