Content deleted Content added
ClueBot NG (talk | contribs) m Reverting possible vandalism by Hausmaus7 to version by FedericoCeratto. Report False Positive? Thanks, ClueBot NG. (3834405) (Bot) |
m Dating maintenance tags: {{Cn}} |
||
(48 intermediate revisions by 28 users not shown) | |||
Line 1:
{{Short description|Concept in information security}}
'''Defense in depth''' is a concept used in [[
▲'''Defense in depth''' is a concept used in [[Information security]] in which multiple layers of security controls (defense) are placed throughout an [[information technology]] (IT) system. Its intent is to provide redundancy in the event a [[Security controls|security control]] fails or a vulnerability is exploited that can cover aspects of ''personnel'', ''procedural'', ''technical'' and ''physical'' security for the duration of the system's life cycle.
== Background ==
The idea behind the defense in depth approach is to defend a system against any particular attack using several independent methods.<ref name=schneier2006>[https://www.schneier.com/blog/archives/2006/02/security_in_the.html Schneier on Security: Security in the Cloud]</ref> It is a layering tactic, conceived<ref>{{
[[File:Defense In Depth - Onion Model.svg|thumb|right|The [[onion model]] of defense in depth]]An insight into defense in depth can be gained by thinking of it as forming the layers of an onion, with data at the core of the onion, people the next outer layer of the onion, and [[network security]], host-based security, and [[application security]] forming the outermost layers of the onion.<ref>{{Cite book|chapter=Security Onion Control Scripts|date=2014|chapter-url=http://dx.doi.org/10.1016/b978-0-12-417208-1.09986-4|title=Applied Network Security Monitoring|pages=451–456|publisher=Elsevier|doi=10.1016/b978-0-12-417208-1.09986-4|isbn=978-0-12-417208-1|access-date=2021-05-29}}</ref> Both perspectives are equally valid, and each provides valuable insight into the implementation of a good defense in depth strategy.{{cn|date=July 2025}}
== Controls ==
Defense in depth can be divided into three areas: Physical, Technical, and Administrative.<ref>{{cite book |
=== Physical
Physical controls<ref name="nsa1" /> are anything that physically limits or prevents access to IT systems.
=== Technical
Technical controls are hardware or software whose purpose is to protect systems and resources. Examples of technical controls would be disk encryption,
=== Administrative
Administrative controls are
== Methods ==
* [[Antivirus software]]
* [[Authentication]] and [[password]] security
Line 30 ⟶ 27:
* [[Multi-factor authentication]]
* [[Vulnerability scanner]]s
* [[Timed access control]]
* [[Internet Security Awareness Training]]
* [[Sandbox (computer security)|Sandbox]]ing
* [[Intrusion detection system]]s (IDS)
* [[Firewall (computing)|Firewall]]s (hardware or software)
* [[DMZ (computing)|Demilitarized zones]] (DMZ)
* [[Virtual private network]] (VPN)
* [[Data-centric security]]
* [[Physical security]] (e.g. [[deadbolt]] locks)
==See also==
*[[Defense strategy (computing)]]
==References==
{{Reflist}}
[[Category:Computer network security]]
[[Category:Computer security procedures]]
|