Core information security practices such as least privilege, separation of duties, and defense-in-depth are important to deny attackers access to environments.