The principle of defense in depth states that an organization shouldn’t rely on a single line of defense to protect it against potential threats. The issue with a single line of defense is that, if it fails, the organization is vulnerable to defense.
With defense in depth, the organization will layer multiple lines of defense throughout the organization. This way, there is a greater probability that, if an attacker slips past one line of defense, a later one will block or detect the attack.
The cyber threat landscape is constantly evolving, and companies are facing more numerous and sophisticated cyber threats than ever before. As a result, traditional cybersecurity strategies focused on protecting the perimeter are no longer effective. In many cases, attackers are inside the perimeter, or vital corporate assets — such as cloud computing — are outside of it.
Defense in depth involves building multiple lines of defense to protect the organization against potential threats. This can include steps such as network segmentation but also should incorporate various types of security technologies. For example, network-level defenses against malware can be augmented by endpoint security solutions such as antimalware, endpoint protection platforms (EPP), and endpoint detection and response (EDR).
Ideally, an organization will be able to identify and block attempted attacks at the network level before they reach an organization’s devices and have potential impacts. However, defense in depth provides the ability to detect and block an ongoing attack that has slipped past an organization’s defenses.
Organizations can implement defense in depth across their IT environments. The following are some examples of strategies for implementing defense in depth to address various threats.
Account takeover attacks are a common threat to an organization that runs the risk that an attacker will gain access to a legitimate user’s account with all of its associated permissions. An example of a defense in depth strategy for account security would be:
Data is most companies’ most valuable asset. Defense in depth for data security may include the following controls:
Corporate devices may be targeted by malware and other threats. Elements of a defense in depth strategy for endpoint security include:
Network security protects the organization against internal and external threats. Solutions that can be used to implement defense in depth for the network include:
Defense in depth requires an array of security solutions and the ability to monitor and manage them all effectively. Check Point’s Harmony Suite of solutions offers the capabilities that organizations need and the ability to operate them as a single, integrated security architecture.
To learn more about Check Point Harmony’s capabilities, sign up for a free demo. Then, register for a demo of Check Point’s unified security platform to see how to architecture, monitor, and secure a defense in depth architecture at scale.