When onboarding ISPM, it would be helpful to have an extra set of eyes to look over conditional access policies to confirm that they are not unintendedly opening up security gaps.