(Unit 7 of 8) Defense-in-depth Flashcards
What is the Defense-In-Depth strategy?
Defense-in-depth as a set of layers, with the data to be secured at the center
Name and Describe the layers of defense in the strategy (7
)
Physical security - access to buildings and controlling access to computing hardware
Name and Describe the layers of defense in the strategy (6
)
Identity and access - ensuring that identities are secure, that access is granted only to what’s needed, and that sign-in events and changes are logged. (SSO etc)
Name and Describe the layers of defense in the strategy (5
)
Perimeter - protects from network-based attacks against your resources. (DDoS , Firewall)
Name and Describe the layers of defense in the strategy (4
)
Network - limiting the network connectivity across all your resources to allow only what’s required and reduce risk of attack spreading
Name and Describe the layers of defense in the strategy (3
)
Compute - making sure that your compute resources are secure (Endpoint protection)
Name and Describe the layers of defense in the strategy (2
)
Application - Integrating security into the application development lifecycle