Get complete visibility of your assets, applications, network and their interaction with users. Threat identification, enforcement of controls and data flow restrictions are must do’s. Focus on attack behaviors at multiple stages and create enough opportunities’ to identify attack during all 4
Know you assets and applications running on Endpoints Have a working change management process for security updates deployment Have a well-defined and easy to execute patch management process Harden endpoints by disabling ports/protocols not in use Enable Firewall on endpoints Updated AV and