-
Defense in Depth
- Organizations should use multiple overlapping security controls to achieve the same control objective. This is a layered approach to security, and protects against the failure of any single security control.
-
Examples:
-
Example 1: Implement protections against eavesdropping (MitM) attacks
-
Encryption
- HTTPS (Encrypted with TLS)
- VPN (Encrypted with IPsec)
-
VLANs
- Limit the damage that may be caused by an eavesdropping attack.
-
Example 2: Network Access Control
- 802.1x Authentication
-
Anti-Spoofing
- DHCP Snooping
- IP Source Guard
- unicast Reverse Path Forwarding
- Disable Unused Physical Ports
- MAC Address Filtering (Port Security)
-
Example 3: Protect the network perimeter
- Hardware Firewall
- Router ACLs
- IDS/IPS