8 best practices for CISOs conducting risk reviews

Source: Microsoft Security Blog

Author: Rico Mariani

URL: https://www.microsoft.com/en-us/security/blog/2026/04/29/8-best-practices-for-cisos-conducting-risk-reviews/

ONE SENTENCE SUMMARY:

Microsoft Deputy CISO Rico Mariani outlines eight structured risk-review areas to shift security from reactive fixes toward proactive Zero Trust controls.

MAIN POINTS:

  1. Start by identifying and scoping the critical assets attackers most want.
  2. Enumerate all applications and microservices that expose interfaces and reach assets.
  3. Prefer standards-based token authentication using proven issuers like Microsoft Entra.
  4. Minimize token power through fine-grained scoping, short lifetimes, and limited audiences.
  5. Enforce authorization consistently with declarative patterns to reduce code bugs.
  6. Apply strong network isolation to constrain lateral movement and limit reachable systems.
  7. Build threat-model-driven detections across perimeter and internal signals to alert on attacks.
  8. Maintain robust auditing logs to determine breach extent, impact, and notification needs.
  9. Include overlooked areas like backups, support systems, and privileged operational tools.
  10. Scrutinize development and test environments because buggy code can expose production assets.

TAKEAWAYS:

  1. Consistent risk-review questions convert security data into proactive posture improvements.
  2. Least-privilege tokens and standard libraries shrink blast radius after inevitable compromise.
  3. Simple, repeatable authorization patterns reduce exploitable mistakes in enforcement logic.
  4. Segmentation plus logging makes attacker footholds less useful and improves hunting.
  5. Comprehensive inventories must cover backups, support, and nonproduction systems to avoid blind spots.