Zero trust should be applied here, and the connection should be inaccessible. – Tom Roberto, Core Technology Solutions.

This article was originally published here