Defense in Depth
Defense in depth is a cybersecurity strategy that places multiple layers of security controls throughout a system or network so that if one control fails, others remain in place to limit the impact. The approach is designed so that an attacker must overcome several independent barriers rather than a single line of defense. This concept is adapted from a military strategy that aims to delay rather than solely prevent an adversary's advance.
Defense in depth is an information security architecture principle in which multiple independent, overlapping security controls are deployed across different layers of a system, including endpoints, applications, data, and network boundaries. The layered structure is intended to ensure that the failure or bypass of any single control does not result in full compromise, as subsequent controls continue to provide detection or containment capability. Controls across layers may include technical, administrative, and physical mechanisms, and they are typically designed to be redundant in coverage so that gaps in one layer are addressed by another. The strategy accepts that no individual control is sufficient in isolation and prioritizes resilience through diversity and redundancy of defenses.
Why it matters
No single security control is reliable enough to serve as the sole barrier against a determined attacker. Vulnerabilities are discovered in software, misconfigurations occur, and human error introduces gaps that any individual control may fail to catch or stop. Defense in depth exists to ensure that the failure of one control does not translate directly into a full compromise, by requiring an attacker to defeat multiple independent barriers before reaching sensitive assets.
Who it's relevant to
Inside Defense in Depth
Common questions
Answers to the questions practitioners most commonly ask about Defense in Depth.