Skip to content
This repository has been archived by the owner on Nov 2, 2024. It is now read-only.

Latest commit

 

History

History
executable file
·
38 lines (21 loc) · 1.37 KB

010-Defense-in-Depth.md

File metadata and controls

executable file
·
38 lines (21 loc) · 1.37 KB

Defense in Depth

In access control, organizations employ a defense-in-depth strategy, integrating people, technology, and operations across multiple layers. This aims to prevent or deter cyberattacks by implementing various permissions in building, server rooms, networks, and applications.

  • Multi-Factor Authentication (MFA) Example

    • Combines username/password with a phone-sent code.
    • Implements two-layered authentication: something you have and something you know.
  • Firewall Implementation for Network Security

    • Adds firewalls to segregate untrusted and trusted networks.
    • Validates network traffic with rules on multiple firewalls, especially for sensitive data.

For a non-technical example, consider the multiple layers of access required to get to the actual data in a data center.

  • Physical Barrier

    • Door lock restricts physical entry to data storage devices.
  • Technical Access Rule

    • Network-based rule limits access to data.
  • Administrative Control (Policy)

    • Defines access rules for authorized individuals.

This layered approach ensures comprehensive protection, combining physical, technical, and administrative controls.


Back to main page