This is an excellent read. It goes into various defences that can be utilised.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a
d