Verify Explicitly

Use Least Privilege Access

Mitigate Insider Threats

Assume Breach

Azure Integration