Trust internal users and allow the application the
user accesses to determine whether access is allowed based on credentials
and possibly on IP address rules. | An attacker gains access to a data center endpoint
and then moves laterally to any other data center endpoint to exploit
stolen credentials or server-side vulnerabilities. Unknown users
gain access to data center endpoints. | Enable User-ID, block unknown users, and whitelist access
for sanctioned users. Create separate identity domains for employees,
partners, and contractors. Use multi-factor authentication (MFA)
for partner, contractor, and sensitive server access. |