Tightly control identities ... roles and overprovisioned access. Protect data stores: Apply defenses in layers to data stores ...