Implementation Actions Implement MFA and conditional access.Use role-based authorization.Recertify access periodically.