Defense in depth (computing): Difference between revisions

Content deleted Content added
Previous edit provided a whole bunch of citations.
Line 50:
* [[Data-centric security]]
* [[Physical security]] (e.g. [[deadbolt]] locks)
 
=== Example ===
 
In the following scenario a web browser is developed using defense in depth -
 
* the browser developers receive security training
* the codebase is checked automatically using security analysis tools
* the browser is regularly audited by an internal security team
* ... is occasionally audited by an external security team
* ... is executed inside a sandbox
 
==See also==