Defense In Depth – Another Interpretation
May 7, 2010Identify and potentially mitigate risk at all layers
Perimeter Defenses: Packet Filtering, Stateful Inspection of Packets, Intrusion Detection
Network Defenses: VLAN Access Control Lists, Internal Firewall, Auditing, Intrusion Detection
Host Defenses: Server Hardening, Host Intrusion Detection, Auditing
Application Defenses: Validation Checks, Verify HTML / Cookies Source, Secure IIS
Data and Resources: Databases, File Shares, Access Control, Auditing