Defense In Depth

February 13, 2023
Defense In Depth

How to Implement a Defense in Depth Strategy

“Layering security defenses in an application can reduce the chance of a successful attack. Incorporating redundant security mechanisms requires an attacker to circumvent each mechanism to gain access to a digital asset. For example, a software system with authentication checks may prevent an attacker that has subverted a firewall. Defending an application with multiple layers can prevent a single point of failure that compromises the security of the application.”

– CISA

 

→ Access the eBook Here (PDF)