Practical scenario: interplay of responsibilities
- Last UpdatedNov 26, 2025
- 1 minute read
As an example, during a phishing attack:
Microsoft Azure
-
Ensures that the infrastructure remains operational and protected.
AVEVA
-
Monitors for unusual application activity.
-
Identifies suspicious behavior.
-
Implements application-level mitigations.
Customers
-
Ensure users are trained to recognize phishing attempts.
-
Report incidents promptly.