The next step is the proposition of security policies in mitigating APT via spear phishing attack,
followed by the evaluation and benchmarking of these policies in accordance to quality metrics such as
degree of least privilege support, degree of duty separation support and other metrics.