- Transition to a “never trust, always verify” security model.
- Use identity-based access controls and micro-segmentation.