004: Discover and triage legacy apps
Overview
Create an inventory of applications and resources in the environment that use legacy protocols (Windows Integrated Authentication, NTLM, etc.). As part of a zero trust strategy, this inventory is important for planning, triage and strategize the approach and controls to align to zero trust principles (as much as possible/feasible per the technical constraints specific applications)