Run the Best Practice Assessment (BPA), prioritize security
improvements, implement best practices, and then repeat the process
to enhance your security posture.
After you implement control over
your network traffic—applications, content, threats, and users—start
fine-tuning the controls and implement additional functionality
to improve your security posture.
If you haven’t converted internal applications to custom
applications to gain visibility into and control of the traffic,
convert internal applications to custom applications.