Defense in-Depth
Defense in-Depth Concept
Strategy: apply multiple, independent security layers to protect assets
Goal: an attacker must bypass every layer to reach the internal (protected) network
Visualization: like peeling an onion—each layer is a distinct control category
Core Security Layers
Policies & Procedures: rules, standards, incident response plans
Physical Security:
Fences, gates, locks
Cameras, security guards, access logs
Perimeter (Network) Security:
Firewalls (single or multiple)
Demilitarized Zone (DMZ) for public-facing services
Internal/Protected Network: critical systems and data reside here
Castle Analogy (Layered Controls)
Moat with crocodiles → first barrier; deters/impedes approach
Drawbridge → single controlled entry point
Gate guards → identity checks before access
High outer walls → additional physical barrier
Watchtowers with armed guards → continuous monitoring & rapid response
Inner doors, locks, walls → further segmentation inside the castle (defense escalation)
Key Takeaways
Each layer compensates for potential failure of another
Depth increases overall resilience; no single point of failure
Real implementations mix policy, physical, and technical measures for comprehensive protection