Identity & Access Management
Identity is the new perimeter. I start every engagement by mapping who has access to what — and why.
Using Microsoft Entra ID, I set up Conditional Access policies that check device health, location, and risk level before granting access. Privileged Identity Management limits admin rights to exactly when they are needed.
Every design follows Zero Trust principles: verify every request, use least privilege, and always assume breach.

































