home.aspx
 
. https://www.teal-consulting.de/index.php/en/blog-en/assume-breach-secure-it-infrastructure-using-the-teal-security-assessment
article
SHARESHARESHARE
ASSUME BREACH  SECURE IT INFRASTRUCTURE USING THE TEAL SECURITY ASSESSMENT
The damage caused by cyber attacks is increasing every year and it is only a matter of time before a company is successfully attacked. Not only Microsoft says again and again that a paradigm shift is necessary in dealing with IT security. "Assume Breach" is more present than ever. Our world is becoming more and more complex, cloud services have become an integral part of most IT landscapes and security boundaries are regularly shifting as a result of merger or acquisition projects. One could say that data theft is more likely than getting the flu and in any case more expensive. That's why we have been blogging since May 2018 about secure IT infrastructure based on the Microsoft ESAE model. We call our form of the Microsoft ESAE model, Secure Administration Environment (SAE), because most enterprise environments are heterogeneously equipped with Windows, Linux and MacOS and therefore have to be considered holistically. In the SAE blog series, we explain the basics of secure IT operations and discuss the individual technical and organizational security measures. The blog series was very well received by our customers and we were often asked if we could explain the SAE principles in more detail and help plan a project to improve security levels. READ MORE