![]() ![]() ![]() ![]() Typical organization I have worked with uses MCAS for cloud security monitoring & governance purposes. Blocking access to the cloud environment can be efficiently done with other methods, such as Conditional Access policies, and use cases for using MCAS Access Policies are rare, but there are a few interesting ones. In recent years, I have written +20 Cloud App Security (MCAS) related blog posts but never touched deeply on Access Policies. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |