The approach aims to slow down an attack’s progress and provide security personnel with sufficient time to detect and respond to threats. Defence in Depth encompasses a combination of physical, technical, and administrative controls, ranging from perimeter defences like firewalls, to internal network segmentations, antivirus software, intrusion detection systems, and user training and policies.
By implementing security at various levels within the IT infrastructure, organisations can ensure redundancy in their defensive mechanisms, making it much more difficult for attackers to compromise a system fully.
- Layered Security: Employs multiple layers of security controls and measures across an organisation’s systems and processes.
- Prevention and Response: Aims to both prevent attacks and to establish effective response mechanisms in the event of a security breach.
- Diverse Controls: Integrates a variety of control types, including physical, technical, and administrative.
- Holistic Approach: Covers all aspects of security, from the perimeter to the endpoint, internal networks, data, applications, and people.
- Real-World Example: A bank uses multiple security measures such as secure authentication, encrypted transactions, intrusion detection systems, strict access controls, and continuous monitoring to protect against cyber threats.
- Hypothetical Scenario: An organisation implements Defence in Depth by securing the IT infrastructure through network firewalls, segregating internal networks, enforcing strong password policies, and regularly updating and patching all systems.
- Layered Security: Similar to Defence in Depth, it refers to using multiple, overlapping security measures to protect the integrity of information.
- Security Perimeter: The boundary where an entity’s network interfaces with the rest of the cyberspace, often fortified as part of the Defence in Depth strategy.
- Intrusion Detection System (IDS): A device or software application that monitors network or system activities for malicious activities or policy violations.