Home SecurityOS Security Applying a ‘three-box solution’ to identity security strategies