8.3 Extending Security with Defense-in-Depth

We have now discussed security models in the context of computer security and model implementations in OSs. Knowing what countermeasures inherently exist helps us to determine the gaps and where we need to fill them with other countermeasures. We can assume that if we maintain OS patching and remain vigilant about the state of systems we use, we can attend to additional measures focused on users, operations, and data that need to be taken for defense-in-depth. The defense-in-depth concept incorporates all the systems and systems interfaces, including application program interfaces (APIs) at all layers: hardware, OSs, services, application programs, databases, workflows, integrated systems, and so ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.