Advanced Security #defence-in-depth #SIEM #cloud-security #controls

Defence in Depth

5 exercises — master defence-in-depth vocabulary: layered security architecture, preventive / detective / corrective control classification, WAF vs application-layer limits, complete logging pipeline requirements, and the cloud shared responsibility model.

0 / 5 completed
Defence in depth quick reference
  • Defence in depth — multiple, independent, overlapping controls; attacker must defeat every layer. No single control is sufficient.
  • Layers — Perimeter (firewall/WAF) → Host (OS hardening/EDR) → Application (auth/input validation) → Data (encryption/least privilege) → Detective (SIEM/logs) → Corrective (IR/backups).
  • Preventive — stops attacks: auth, rate limiting, parameterised queries, WAF.
  • Detective — identifies attacks: SIEM, audit logs, anomaly detection, IDS. Requires: structured logs + immutable storage + alert rules + response playbook.
  • Corrective — limits damage, restores service: account lockout, circuit breaker, backup restoration, IR plan.
  • WAF limitation — covers known signatures; cannot replace application-level input validation, CSRF protection, IDOR checks, or business logic validation.
  • Shared responsibility — CSP = infrastructure security; Customer = IAM, application, data encryption, configuration, logging, IR.
1 / 5

A CISO presents the company's security strategy and says: "Our primary architectural principle is defence in depth. This means we don't rely on any single control — we have multiple overlapping layers."

What does this mean in practice, and why is it necessary?