24 Hour Support Desk (905) 307-4357



What is the Difference between Layered Security and Defense in Depth?


What is the Difference between Layered Security and Defense in Depth?

This entry was posted on by Maria Kelebeev.

Difference between Layered Security and Defense in Depth. With security talk being on top of mind and breaches becoming more and more frequent, there are now best practices for safeguarding business data and keeping the business safe from predators. The two terms that are floating around and sometimes wrongly used interchangeably are Layered Security and Defense in Depth. While there is overlap in the two theories, there are differences that need to be addressed as well as a relationship between them that is key.

Layered Security

Layered security is a practice of making sure that there are multiple implementations put in place to catch the failing of any individual aspect. If at one layer there is a failure or breach, there are deeper layers to catch or at least slow down the invasion. This works together providing a more than the sum of the parts kind of protection.

Layered security is just as applicable if you are alone at a coffee shop accessing the internet, running the systems for a small business or managing a 10 thousand user enterprise. While the implementation may vary, this approach will improve your security.

One thing to consider is that layered security is NOT implementing the same defense multiple times, true layering is about multiple types of security measures, each protecting against a different vector for attack. Levels of focus may be concerned with safeguarding on the following levels:

  • Perimeter Defense
  • Network Defense
  • Host Defense
  • Application Defense
  • Data Defense
  • Physical Security

Defense in Depth

shield

Originally coined in a military context, when addressing more depth security measures. Security in Depth would be closer to a multifaceted strategic plan where layered security would be one aspect of defense. Defense in Depth is concerned with more than just the immediate intrusion but also assumes a broader and more variable source of defense. For example, if there was a physical theft, how can information be guarded against a forensic recovery of data. Among other concerns are threat delay, rapid notification and response when attacks and disaster underway. Some of the aspects of this strategy include:

  • Monitoring, alerting and emergency response
  • Authorized personnel activity accounting
  • Disaster recovery
  • Criminal activity reporting
  • Forensic analysis

The difference:

While there are a few sources that will mention these terms or even use them mistakenly interchangeably, and while there are similarities in the concept and there is overlap, there is a distinct difference and that is in the broadness of the scope of the concerns. It is more important to understand the relationship to know where and how to best utilize these concepts.

Interested in talking to cyber security experts to verify that you are doing all that you can to safeguard your business? Contact MBC Cyber Security experts and get a free Assessment of your current lay of the land.

Facebook Twitter Linkedin
Maria Kelebeev on EmailMaria Kelebeev on Linkedin
Maria Kelebeev
Maria Kelebeev
Digital Marketing Manager at MBC Managed IT
For more information call us at: (905) 307-4357 or fill out our contact form and we’ll reach out to you.
Latest tweets from MBC:

#MBCSecurtyTIps – When using a public hotspot, make sure to do it safely. Disable file and printer sharing, enable two factor authentication, use VPN and check that you are using https sites only. #cybersecurity #hotspotsaftey pic.twitter.com/9hy49dVe2x

From MBC's Twitter via Hootsuite

Join our newsletter!