Defense in Depth
What is Defense in Depth?
Defense in depth is a strategy that leverages multiple security measures to protect an organization's assets. The thinking is that if one line of defense is compromised, additional layers exist as a backup to ensure that threats are stopped along the way. Defense in depth addresses the security vulnerabilities inherent not only with hardware and software but also with people, as negligence or human error are often the cause of a security breach.
Today’s cyber threats are growing rapidly in scale and sophistication. Defense in depth is a comprehensive approach that employs a combination of advanced security tools to protect an organization's endpoints, data, applications, and networks. The goal is to stop cyber threats before they happen, but a solid defense-in-depth strategy also thwarts an attack that is already underway, preventing additional damage from taking place.
Antivirus software, firewalls, secure gateways, and virtual private networks (VPNs) serve as traditional corporate network defenses and are certainly still instrumental in a defense-in-depth strategy. However, more sophisticated measures, such as the use of machine learning (ML) to detect anomalies in the behavior of employees and endpoints, are now being used to build the strongest and most complete defense possible.
A Changing Work Environment and Threat Landscape
Defense in depth is needed now more than ever as more employees work from home and as organizations increasingly rely on cloud-based services. With employees working from home, organizations must address the security risks associated with employees using their own devices for work and their home Wi-Fi connection to enter the corporate network.
Even with IT resources in place, vulnerabilities are inherent in devices used for both work and personal use—vulnerabilities exploited by cyber criminals. Further, with more companies using cloud-hosted, Software-as-a-Service (SaaS) applications, many of which are mission-critical, the privacy and security of an increasing amount of data entered through websites remain difficult to manage.
Defense in Depth is Similar To Physical Security
The concept of defense in depth is no different from physical security, such as that used for a building or to start work in an office environment. Building security has many layers, some of which may be considered redundant:
- An employee uses a key card to enter the building.
- A security guard keeps watch in the lobby.
- Security cameras record all movements in the lobby, on each floor, and in the elevator.
- Once arriving at her floor, an employee must use her key card to open the door to the office floor.
- Once at her desk, the employee turns on her computer and enters her password and temporary four-digit code (two-factor authentication) to log in to the company network.
These are, of course, just a handful of security steps that the employee must take to begin work for the day. Some of these may seem unnecessary and some measures may seem stronger than others, but taken together, they are analogous to a defense-in-depth strategy in place within organizations.
Common Cybersecurity Issues
The following are some common issues organizations have to deal with when implementing a cybersecurity strategy:
- Anti-malware software has not been updated or is not installed on all devices.
- Employees have not been trained and are falling victim to phishing schemes.
- Software patches are not being updated or are ignored.
- Security policies are not enforced or even known by employees.
- Missing or poorly implemented encryption.
- Remote employees are connecting to unsecured networks, such as the public internet.
- Physical security flaws, such as unsecured server rooms.
- Business partners, such as cloud service providers, are not fully secure.
Imagine all of these issues taking place at once. The only way for an enterprise to defend itself from vulnerabilities is with a solid, comprehensive defense-in-depth strategy. If one measure fails, another measure is on standby ready to take action.
The Different Elements of a Defense-in-Depth System
The multi-tiered approach to security in a defense-in-depth system incorporates elements from the following areas:
- Physical controls: Examples include key cards to enter a building or scanners to read fingerprints.
- Network security controls: This is software that authenticates an employee to enter the network and use a device or application.
- Administrative controls: This authorizes employees, once authenticated, to access only certain applications or parts of the network.
- Antivirus: This is the tool that stops malicious software from entering the network and spreading.
- Behavioral analysis: Algorithms and ML can detect anomalies in the behavior of employees and in the applications and devices themselves.
How Does Defense in Depth Help?
By layering and even duplicating security processes, the likelihood of a breach is minimized. Most organizations recognize that a single layer of security or a single point product (e.g., a firewall) does not go far enough to protect the enterprise from the increasing sophistication of today's cyber criminals.
For example, if a hacker successfully infiltrates an organization's network, defense in depth gives administrators time to launch countermeasures. Antivirus software and firewalls should be in place to block further entry, protecting the organization's applications and data from compromise.
Redundancy in security may, at first glance, seem wasteful. However, a defense-in-depth strategy prevents threats because when one security product fails, another security product is in place to take over.
What is Layered Security and How Does it Relate To Defense in Depth?
Though used interchangeably (and incorrectly), the term "layered security" is not the same as defense in depth.
Layered security is having multiple products in place to address one single aspect of security. The products may be very similar and aim to do the same job, but in a layered security strategy, they are both necessary. Using seemingly redundant products strengthens the enterprise's defense against threats.
For example, a gateway and a firewall both determine which data should be allowed to enter the network. There are certainly differences between the two—a gateway is hardware while a firewall is both hardware and software—but they both aim to restrict access to certain websites and applications. Once the gateway and firewall have done their jobs—an employee has been allowed to visit a particular website, for example—another security product or service will have to take over if the employee wants to enter a password to log in to that website.
The next security product can be multi-factor authentication (MFA), which prevents access to a website unless multiple credentials are provided. In other words, layered security only addresses one dimension of security or one vector of attack while defense in depth is broader, multi-faceted, and more strategic in scope. It can also be said that layered security is a subset of defense in depth.
A layered security strategy is evaluated in three different areas: administrative, physical, and technical. Administrative controls include the policies and procedures needed to restrict unauthorized access, such as role-based access control (RBAC) or employee training to protect against phishing scams. Physical controls incorporate physically securing access to the IT system, such as locking server rooms, while technical controls include the mix of products and services the organization selects to address security.
What Are the Essentials Layers in a Defense-in-Depth Mechanism?
Core layers to carry out a defense in depth strategy should include:
- Strong, complex passwords
- Antivirus software
- Secure gateway
- Patch management
- Backup and recovery
- The principle of least privilege, or giving a user the minimum access level or permissions needed to do his or her job
As companies grow and the number of devices, applications, and services used across the organization increases, these serve as important security layers in a defense-in-depth strategy:
How Fortinet Can Help
The Fortinet Security Fabric is a cybersecurity platform that delivers broad visibility of an enterprise's attack surface and the automated workflows to increase response speed. The ability to identify and assess the risk of all endpoints and applications across the network is key to the success of a defense-in-depth strategy. As the attack surface grows in size and complexity, cyberattackers use sophisticated strategies to exploit weaknesses across the organization.
The Fortinet Security Fabric is an integrated solution that helps organizations manage and optimize several different point products, such as firewalls, network switches, and VPNs.
What is a defense-in-depth strategy?
A defense-in-depth strategy uses multiple security measures to protect 100% of an organization's assets.
What are the three elements of layered security?
Layered security requires administrative, physical, and technical controls. Administrative controls consist of the policies and procedures that have to be in place to minimize vulnerabilities. These can include automated access to applications based on the employee's role or employee training to identify phishing scams.
Physical controls include securing physical access to the IT system, such as locking server rooms or IT storage facilities. Technical controls are often the most complex and include the mix of products and services the organization adopts to address security.
What is the difference between layered security and defense in depth?
Layered security leverages multiple security products to address only one security aspect, such as detection intrusion or email filtering, while defense in depth is broader and more strategic in scope. Defense in depth incorporates all of the organization's security measures to address all issues related to endpoint, application, and network security.
Put another way, layered security is one aspect of security while defense in depth is a comprehensive strategic plan. Defense in depth covers more than just handling an attack and presumes a predictive, broader, and more varied view of defense.