Defense in Depth

Old but still Powerful.

Defense in depth (DiD) is an attack mitigation strategy that helps organizations and even individual computer users to protect their valuable information and systems from cyber-attacks. Defense in depth practices involve placing multiple layers of security measures to prevent cyber-attacks. These layers include different security techniques and multiple layers from the same technique. The simple idea is, if one security control fails, then there are multiple security layers that prevent cyber-attack. This approach is also called the castle approach because it aims on arranging layers of security measures similar to a castle where there are multiple strengthened walls. This type of security placement will help to protect resources from attacks that originated in various ways and in an attack situation it will buy more time for security engineers to initiate countermeasures. There is no single solution ever implemented that can protect valuable information with one single setup unless you place a computer where nobody can reach, disconnected from any communication channel. If so we could guarantee that the machine is fully secured. However, nobody is ever going to get any service from that type of a machine.

Layers of security controls can be mainly categorized into three groups based on their placement and what type of security risk that the control can handle. Security control categories are namely, Administrative controls, Technical controls, and Physical controls. Let’s get some idea about each layer and what controls we can use at each layer. 

layered security architecture

Physical controls focus on protecting the systems from any type of physical disruption. Physical disruption could happen due to a physical attack or environmental disaster. Physical disruption causes higher magnitude damage than other disruptions. Common techniques that are used to prevent physical attacks mainly focus on access controlling and real-time monitoring of user activities. Techniques used under physical controls include placing barriers, gates, using different flavors of locking mechanisms, employing security service personnel, monitoring user behaviors, and similar activities.

Technical controls focus on protecting resources from disruptions coming mainly through communication channels. Disruptions caused by malware, unauthorized access attempts, and service interruption are the main focus of technical controls. Controls that come under this category mainly divide into hardware-based controls and software-based controls. Hardware controls include firewalls, segregation networks, implement DMZ, place IDS/IPS boxers, and similar controls. Installing malware protection software such as antivirus software, network monitoring tools, web/email scanners, hashing, encryption, timely backup come under software-based controls. 

Administrative controls focus on implementing policies and procedures that limit and guide user behavior. Sometimes user behaviors could lead to service disruption. These disruptions could happen due to three main reasons. First, users purposely carry out disruptive actions against organizational resources, unintentional user actions cause system disruption, and user actions open loopholes that make threat actors to conduct disruptive actions. To prevent those types of disruptions we need to implement administrative controls. Administrative control includes identity/privilege management, patch management, two-factor authentication, timely access management, and similar controls.

References

Comments

  1. Informative Osura. Can this defense in depth be applied in website protection too?

    ReplyDelete
    Replies
    1. Thanks for asking this question. Yes of course we can apply DiD to protect websites. As practice organizations place their public-facing resources such as web pages in DMZ. Creating DMZ and placing websites in there is adding an extra layer of security for the websites. In an attack, the attacker needs to pass the perimeter firewall and security measures in DMZ to do any harm to the organization's websites.

      Delete
  2. Comprehensive article osura. Why do you think defense in depth is more suitable for an oragnization than any other layered security architecture ?

    ReplyDelete
    Replies
    1. Good question Suranga, defense in depth (DiD) also a layered security architecture. The way these layers organized and what are the security techniques used in each layer could vary from industry to industry depending on industries requirements and the investment that the organization can allocate for the implementation. In general, DiD more effective because of two reasons according to my view. First, the attacker has no idea about security layers that he or she needs to face this makes that the threat actor need to be highly skilled to bypass multiple security measures. Second, DiD will by security engineers fairly enough time to execute a counter-attack.

      Delete
  3. Very informative Osura, you have explained that defense in depth is suitable for individual computers also. can that price is affordable. how much the cost nearly?

    ReplyDelete
    Replies
    1. Thanks for asking this question Rajitha, I think it is affordable because we already have multiple layers built-in when we take a personal computer. we have protection at the network layer from the network modem, we can add extra layers of protection by modifying the default setting for more security. Almost all personal computers nowadays have a built-in firewall, else that we can configure a lot of restrictions by properly configuring OS options already available. Then if you think still you need more security you can subscribe to antivirus applications. These applications are not that much expensive as we think, the price will vary based on the vendor but range between 40-100 dollars per year. If you are using windows 10 based computer I think windows defender is more than enough to protect your PC. It is frequently updated and offers very good protection. It is true early versions of Defender do not have a good image but now it is quite good.

      Delete

Post a Comment

Popular posts from this blog

How Cloud Resiliency organized in Microsoft Azure

Network Traffic Identification and Classification with Machine Learning

MalLocker.B