(Unit 7 of 8) Defense-in-depth Flashcards

1
Q

What is the Defense-In-Depth strategy?

A

Defense-in-depth as a set of layers, with the data to be secured at the center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name and Describe the layers of defense in the strategy (7
)

A

Physical security - access to buildings and controlling access to computing hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name and Describe the layers of defense in the strategy (6
)

A

Identity and access - ensuring that identities are secure, that access is granted only to what’s needed, and that sign-in events and changes are logged. (SSO etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name and Describe the layers of defense in the strategy (5
)

A

Perimeter - protects from network-based attacks against your resources. (DDoS , Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name and Describe the layers of defense in the strategy (4
)

A

Network - limiting the network connectivity across all your resources to allow only what’s required and reduce risk of attack spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name and Describe the layers of defense in the strategy (3
)

A

Compute - making sure that your compute resources are secure (Endpoint protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name and Describe the layers of defense in the strategy (2
)

A

Application - Integrating security into the application development lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly