Defense in Depth

Text transcript

Audio transcript

Strategies

Defense in Depth strategies include protection of information and information systems through:

  • Planning
  • Organizing
  • Manning
  • Equipping
  • Training

Approaches

Defense in Depth approaches use technical solutions to:

  • Ensure network and infrastructure services provide appropriate confidentiality
  • Defend the perimeters of well-defined information enclaves
  • Provide appropriate degrees of protection to all computing environments
  • Make appropriate use of supporting IA infrastructures

Defense in Depth provides successive layers of protection for GIG components, and positions safeguards at different locations and in different ways, so that a single breach will not affect an entire system.

Defense in Depth integrates the capabilities of people, operations, and technology to ensure the security of information and information systems.


Next Information Assurance page 2 Main Menu Resources Glossary