Defense in Depth is the philosophy that no single security measure is enough. Instead, you layer multiple defenses so that if one fails, others still protect you. Think of it like a medieval castle: moat, walls, towers, guards, and a final keep. Attackers must breach ALL layers.
Imagine your security like an onion (or if you prefer, an ogre - they have layers too). Each layer an attacker must peel through increases their chance of detection and decreases their chance of success. A firewall is great, but what happens when someone walks in with a malicious USB? That's why we need layers.
The Swiss Cheese Model
The Security Layers
Think of this like protecting a diamond in a museum. The building has locks (physical), alarm systems (perimeter), security cameras (network), guards (endpoint), a glass case (application), and the diamond is in a vault (data). Plus there's a policy that guards must check every visitor.
The Cyber Kill Chain
Developed by Lockheed Martin, the Cyber Kill Chain describes the stages of a cyber attack. Understanding this helps us know WHERE to place defenses and HOW to detect attacks at each stage.
Left of Boom
MITRE ATT&CK Framework
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a knowledge base of real-world attacker behaviors. It's like a detailed catalog of every trick attackers use, organized by what they're trying to accomplish.
Using ATT&CK for Defense
ATT&CK Navigator
Types of Security Controls
Controls Must Overlap
Practical Example: Phishing Defense
Assume Breach Mentality
Modern security thinking assumes that attackers WILL get in. It's not about if, but when. This mindset shifts focus from only prevention to detection, response, and limiting damage.
Dwell Time
Building Defense in Depth
Implementing Defense in Depth
Knowledge Check
Challenges
Key Takeaways
- Defense in Depth = multiple security layers, not relying on one control
- The Cyber Kill Chain describes attack phases - break any link to stop the attack
- MITRE ATT&CK catalogs real attacker techniques for better detection
- Security controls are preventive, detective, corrective, deterrent, or compensating
- Assume Breach mentality focuses on detection and limiting damage
- No single layer is enough - controls must overlap and complement each other