Introducing Defence In Depth Flashcards
What is Defense in Depth, and what is its objective?
Defense in Depth is a security strategy aimed at slowing or stopping unauthorized data access through layered defense mechanisms. The objective is to ensure that if one layer is breached, other layers can still stop attacks.
What are the layers of Defense in Depth?
The layers include Physical Security, Identity and Access, Perimeter, Network, Compute, Application, and Data.
What is the role of the Physical Security layer in Defense in Depth?
The Physical Security layer serves as the first line of defense, controlling building and hardware access to prevent unauthorized entry.
What is the focus of the Identity and Access layer in Defense in Depth?
The Identity and Access layer focuses on securing identities and granting account access only to what is needed, minimizing the risk of unauthorized access.
What makes the Data layer a primary target in Defense in Depth?
The Data layer is a primary target as it involves securing databases, disks, and SaaS applications, controlling access to sensitive information.
What security aspects are customers always responsible for across different models?
Customers are always responsible for the security of information and data, devices (mobile and PCs), and accounts and identities in all models (SaaS, PaaS, IaaS, and On-prem).
In SaaS and PaaS models, what aspect of security is a shared responsibility between the customer and the Cloud Provider?
The security of the “Identity and Directory Infrastructure” is a shared responsibility in SaaS and PaaS models.
What summarizes the essence of Defense in Depth?
Defense in Depth involves layered defenses aimed at protecting data. It requires understanding how different layers work together to enhance overall security.
What is the main objective of defense in depth?
Defense in depth aims to protect data by implementing multiple layers of security measures to prevent unauthorized access and mitigate cyber threats.
How is defense in-depth illustrated using a medieval castle example?
In the castle defense system, multiple layers of defense, such as moats, walls, guards, and fortifications, are employed to protect the king from attackers, ensuring that even if one layer is breached, others can still thwart the attackers’ progress.
What are the seven layers of defense in depth?
The seven layers are:
1. Physical security
2. Identity and access
3. Perimeter
4. Network
5. Compute
6. Application
7. Data
Explain the role of physical security in defense in depth
Physical security serves as the first line of defense, guarding access to physical assets such as data centers and servers, typically managed by the cloud vendor in the cloud model.
What is the purpose of the identity and access layer?
The identity and access layer focuses on securing user identities and access permissions, ensuring that users have access only to the resources they need, on a need-to-know basis.
: Describe the function of the perimeter layer in defense in depth.
The perimeter layer protects against network-based attacks from the outer edge or public internet, utilizing measures like DDoS protection and firewalls to identify and thwart attacks.
What does the network layer primarily entail?
The network layer focuses on limiting network connectivity within the network and across resources, allowing only necessary traffic and implementing secure connectivity to on-premises networks.