Defense in Depth Model

Defense in Depth Model as below:

1.Policies, Procedures, Awareness - User education;

2. Physical Security - Guards, locks, tracking devices;

3. Below 3rd layer:

  • Data - ACLs, encryption, EFS; 
  • Application - Application hardening, antivirus;
  • Operating Systems - OS hardening, authentication, patch management, HIDS;
  • Internal Network - Network segments, IPSec, NIDS;
  • Perimeter - Firewalls, Network Access Quarantine Control;

 Using this model to consider security stratege and ISA implemention.

 

你可能感兴趣的:(in,Model,depth,Defense)