The defense-in-depth approach
Although you might think that this is an old method and it doesn’t apply to today’s demands, the reality is that it still does, although you won’t be using the same technologies that you used in the past. The whole idea behind the defense-in-depth approach is to ensure that you have multiple layers of protection, that each layer will have its own set of security controls, which will end up delaying the attack, and that the sensors available in each layer will alert you to whether or not something is happening. In other words, breaking the attack kill chain before the mission is fully executed.
Below you have an example of a layered approach to defense in depth:
Layer |
Security Controls |
Data |
Access control list, encryption, rights management |