{"id":2783,"date":"2023-11-02T09:55:56","date_gmt":"2023-11-02T13:55:56","guid":{"rendered":"https:\/\/cybermike.io\/?p=2783"},"modified":"2024-06-22T09:57:02","modified_gmt":"2024-06-22T13:57:02","slug":"cybersecurity-defense-in-depth","status":"publish","type":"post","link":"https:\/\/cybermike.io\/?p=2783","title":{"rendered":"Cybersecurity Defense in Depth"},"content":{"rendered":"\n<p>When the threat actors break down your door, make sure you have another door.<\/p>\n\n\n\n<p><strong>Defense in depth<\/strong>\u00a0is a security approach that involves deploying multiple layers of security tools, mechanisms, and policies in tandem. The goal is to create a robust defense system where if one layer fails, others will step in to protect against threats.<\/p>\n\n\n\n<p><strong>Analogies<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Imagine a medieval castle with multiple moats, walls, and parapets. Each layer adds an additional barrier for attackers.<\/li>\n\n\n\n<li>In military terms, it\u2019s akin to a defending army strategically retreating into its homeland\u2019s interior, trading space for time.<\/li>\n<\/ul>\n\n\n\n<p><strong>Example<\/strong>:<\/p>\n\n\n\n<p><strong>PERIMETER SECURITY<\/strong><br>Firewall, Penetration Testing, IDS\/IPS, DDoS Protection<\/p>\n\n\n\n<p><strong>NETWORKING SECURITY<\/strong><br>VPN, Wi-Fi Security, Secure DMZ, MDR, Continuous Monitoring<\/p>\n\n\n\n<p><strong>ENDPOINT SECURITY<\/strong><br>NGAV\/EDR, Asset Tracking, Rogue Device Monitoring, Patch Management, MFA, Endpoint Encryption<\/p>\n\n\n\n<p><strong>DATA SECURITY<\/strong><br>PAM, MFA, Email Encryption, Data Backups, Database Monitoring, SIEM<\/p>\n\n\n\n<p><strong>BUSINESS OPERATIONS<\/strong><br>Service Desk, SOC, Business Continuity, Disaster Recovery, Policies &amp; Procedures, Governance, User Training, Vulnerability Management<\/p>\n\n\n\n<p><strong>PHYSICAL SECURITY<\/strong><br>CCTV Security System, Access Control System, Guest Management, Alarm System, Power Backup, Fire Suppression<\/p>\n\n\n\n<p>Defense in depth isn\u2019t about relying on a single tool it\u2019s about creating a resilient fortress where attackers face relentless obstacles. If you environment, account, resource, application is defeated by one single point of failure you need better defense in depth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When the threat actors break down your door, make sure you have another door. Defense in depth\u00a0is a security approach that involves deploying multiple layers of security tools, mechanisms, and policies in tandem. The goal is to create a robust defense system where if one layer fails, others will step in to protect against threats. Analogies: Example: PERIMETER SECURITYFirewall, Penetration Testing, IDS\/IPS, DDoS Protection NETWORKING SECURITYVPN, Wi-Fi Security, Secure DMZ, MDR, Continuous Monitoring ENDPOINT SECURITYNGAV\/EDR, Asset Tracking, Rogue Device Monitoring, Patch Management, MFA, Endpoint Encryption DATA SECURITYPAM, MFA, Email Encryption, Data Backups, Database Monitoring, SIEM BUSINESS OPERATIONSService Desk, SOC, Business<span class=\"more-dots\">&#8230;<\/span> <span class=\"more-tag d-block mt-05\"><a class=\"more-link\" href=\"https:\/\/cybermike.io\/?p=2783\">Read More<span class=\"screen-reader-text\"> \"Cybersecurity Defense in Depth\"<\/span><\/a><\/span><!-- .more-tag --><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2783","post","type-post","status-publish","format-standard","hentry","category-cyber-mike","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/posts\/2783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2783"}],"version-history":[{"count":1,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/posts\/2783\/revisions"}],"predecessor-version":[{"id":2784,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/posts\/2783\/revisions\/2784"}],"wp:attachment":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}