It's one of the cornerstones of Zero Trust (probably the most important one) and it's the one thing every IT security professional start with: identity. "Make sure you have strong identity controls" ...