Specifying priorities for mitigating threats to applications
Everything that you access during the day is an application. Whether you have this application installed on your computer or accessing the application through a browser, these applications are how we do business either personally or professionally. Word, PowerPoint, SharePoint, Teams, Excel, and others are all applications that you use daily. These applications use our identities for access, authentication, and authorization to access data that may or may not be confidential or sensitive.
Because of the importance of protecting identity and data within the company, protecting against threats to your applications should be prioritized to identify the risks and mitigate the vulnerabilities and threats. The following sections will provide some guidance for protecting applications from threats and vulnerabilities.
Identity and secrets handling and use
The further that you move away from the physical infrastructure and...