21
Take a look at this diagram. It is like many that float about, which provide a great technical view of cybersecurity, but fully ignoring the behavioral/cognitive aspects. That makes this very shortsighted. Even if you had perfect technology controls for everything listed, an admin making a mistake or purposeful attack, would bypass everything.