Skip to main content

004: Discover and triage legacy apps

Overview

Create an inventory of applications and resources in the environment that use legacy protocols (Windows Integrated Authentication, NTLM, etc.). As part of a zero trust strategy, this inventory is important for planning, triage and strategize the approach and controls to align to zero trust principles (as much as possible/feasible per the technical constraints specific applications)

Reference