Attackers trying to compromise your domain infrastructure have read the same security frameworks you have.
They know what NIST recommends.
They know what CIS benchmarks look like.
They test their exploits against compliant configurations before they deploy them.
When everybody follows the same playbook, the playbook becomes a roadmap for your adver...