What is defense in depth?

  1. Home
  2. What is defense in depth?

Go back to Tutorial

In this tutorial, we will get an understanding of defense in depth. and its other features.

Rather than depending on a single perimeter, defense in depth employs a tiered approach to protection. Furthermore, it employs a number of measures to stifle an attack’s progress. Each layer offers protection such that even if one is penetrated, an attacker will not be able to get unauthorized access to data.

Example layers of security might include:
  • Firstly, physical security like limiting access to a datacenter to only authorized personnel.
  • Secondly, identity and access security controlling access to infrastructure and change control.
  • Thirdly, perimeter security including distributed denial of service (DDoS) protection for filtering large-scale attacks before they can cause a denial of service for users.
  • Fourthly, network security can limit communication between resources using segmentation and access controls.
  • Next, the compute layer can secure access to virtual machines either on-premises or in the cloud by closing certain ports.
  • Then, application layer security ensures that applications are secure and free of security vulnerabilities.
Practice tests
  • Lastly, data layer security controls access to business and customer data, and encryption to protect data.
Defense in depth uses multiple layers of security to protect sensitive data
Image Source: Microsoft

Confidentiality, Integrity, Availability (CIA)

  • Firstly, Confidentiality refers to the need to keep confidential sensitive data such as customer information, passwords, or financial data. Here, you can encrypt data to keep it confidential. But then you also need to keep the encryption keys confidential. Confidentiality is the most visible part of security.
  • Secondly, Integrity refers to keeping data or messages correct. When you send an email message, you want to be sure that the message received is the same as the message you sent. Further, when you store data in a database, you want to be sure that the data you retrieve is the same as the data you stored. Encrypting data keeps it confidential, but you must then be able to decrypt it so that it’s the same as before it was encrypted. Lastly, Integrity is about having confidence that data hasn’t been tampered with or altered.
  • Lastly, Availability refers to making data available to those who need it. It’s important to the organization to keep customer data secure, but at the same time, it must also be available to employees who deal with customers. While it might be more secure to store the data in an encrypted format, employees need access to decrypted data.
sc-900 online course

Reference: Microsoft Documentation

Go back to Tutorial

Menu