security

Defense In Depth – Another Interpretation

May 7, 2010

Identify and potentially mitigate risk at all layers

Perimeter Defenses: Packet Filtering, Stateful Inspection of Packets, Intrusion Detection

Network Defenses: VLAN Access Control Lists, Internal Firewall, Auditing, Intrusion Detection

Host Defenses: Server Hardening, Host Intrusion Detection, Auditing

Application Defenses: Validation Checks, Verify HTML / Cookies Source, Secure IIS

Data and Resources: Databases, File Shares, Access Control, Auditing