Defense-in-depth
In this lesson, you'll learn about the defense-in-depth security strategy, which employs multiple layers of defense to protect information and prevent unauthorized access. By understanding each layer and its role, you can better implement security measures that ensure the integrity and confidentiality of your data.
Layers of Defense-in-Depth
Defense-in-depth can be visualized as concentric layers, with the data to be protected at the center. Each layer adds a level of security to protect the core data.
- Physical Security
- Protects computing hardware and datacenter facilities.
- Physical safeguards prevent unauthorized access to hardware.
- Example: Secure access to buildings, controlled access to server racks.
- Identity and Access
- Controls who can access the infrastructure and make changes.
- Includes single sign-on (SSO) and multifactor authentication (MFA).
- Logs sign-in events and changes to infrastructure.
- Example: Role-based access controls (RBAC), identity management solutions like Microsoft Entra ID.
- Perimeter Security
- Protects against network-based attacks.
- Uses distributed denial of service (DDoS) protection to filter large-scale attacks.
- Perimeter firewalls identify and alert on malicious traffic.
- Example: Firewalls, DDoS protection services.
- Network Security
- Limits communication between resources through segmentation and access controls.
- Default denies all inbound and outbound traffic unless explicitly allowed.
- Example: Network security groups, virtual network peering.
- Compute Security
- Ensures virtual machines and endpoints are secure.
- Implements endpoint protection and keeps systems patched.
- Example: Antivirus software, patch management systems.
- Application Security
- Ensures applications are free of vulnerabilities and securely developed.
- Stores…
No comments yet. Add the first comment to start the discussion.