{"id":110968,"date":"2018-08-30T07:47:07","date_gmt":"2018-08-30T14:47:07","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/"},"modified":"2018-08-30T07:47:07","modified_gmt":"2018-08-30T14:47:07","slug":"security-governance-strategy","status":"publish","type":"power-automate","link":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/","title":{"rendered":"Power platform Security & Governance: Deploying a Defense in Depth Strategy"},"content":{"rendered":"

A common cyber security approach used by organizations to protect their digital assets is to leverage a defense-in-depth strategy. The SANS Institute defines<\/a> defense-in-depth as \u201cprotecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.\u201d<\/p>\n

When customers ask how to best secure and govern their Power platform\u00a0environments (which includes Microsoft Flow and PowerApps), we provide similar guidance. The following list represents different layers that you can use to protect your digital assets and apply governance to ensure your organization\u2019s interests are met.<\/p>\n