12. A bad guy stole credentials from a partner who you provide
remote access to for an application. The bad guy, gets
network access and is able to move laterally within the
network and find other systems like the point of sale system.
The partner credentials put the bad guy in the trusted zone so
why not give them full access?