Corey O’Connor, director of products at DoControl, said that for organizations adopting the zero-trust security model, enforcing least-privilege access has become a well-known best practice.
“For organizations adopting the zero-trust security model, extending least privilege to the identity, device, and network levels has become a great way to mitigate the risk of data leakage and noncompliance,” says Corey. “Having the right solutions, and the right processes in place will help ensure PII is never exposed to the wrong person.”