Q: What controls are in place to prevent unauthorised access?

Q: What controls are in place to prevent unauthorised access?

A: Controls include conditional access (IP whitelisting, device compliance policies), Just-In-Time (JIT) access for virtual machines, continuous threat detection with Microsoft Defender for Cloud, and regular access reviews.