Implement least privilege and zero trust controls
Exfiltration thrives on excessive access. When internal users, human or machine, have permissions they don’t need, attackers get a wider attack surface. Implementing least privilege ensures that even if credentials are compromised, the scope of what can be exfiltrated is reduced.