Concept Flow - Defense in depth strategy
Identify assets
Apply multiple security layers
Physical security
Network security
Endpoint security
Application security
Data security
Monitor & respond
Attack attempt
Blocked by one or more layers
If breach occurs, next layer protects
Reduce risk of full compromise
Improve overall security posture
Defense in depth uses many security layers to protect assets, so if one fails, others still defend.