Layers of Defense

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Intermediate
Video Transcription
00:00
>> Hi and welcome to Module 2.
00:00
In Module 2, we're going to talk about defense in depth.
00:00
What we mean by that is we don't ever want to have
00:00
one single control that is protecting important data.
00:00
We want to have a depth of control.
00:00
We want to have many different layers of control.
00:00
If the attacker gets through one thing,
00:00
we want there to be something else to stop them.
00:00
If they get through that, maybe something else.
00:00
Maybe we have a chance of stopping the attacker
00:00
at each milestone along the way,
00:00
but we also have a chance of identifying
00:00
an attack along the way too if
00:00
we put more than one control.
00:00
You never want to have a single point of failure.
00:00
We said in the beginning of Module 1 that
00:00
infrastructure securities are very large and
00:00
complex thing and that stands true.
00:00
For that reason, no one can
00:00
ever fully protect everything out there.
00:00
We can't ever say that everything in
00:00
our environment is a 100 percent protected all the time.
00:00
I mean, at the end of the day,
00:00
we have to allow
00:00
access to our environment in order to do business,
00:00
in order to communicate with the outside world,
00:00
we have to have some holes opened up.
00:00
The most secure environment in the world
00:00
is a system that is shut off and buried in a lead box,
00:00
a 100 feet underground encased in concrete,
00:00
but it's not very available.
00:00
Vice versa, the most available
00:00
system in the world is one that's
00:00
just open to the Internet and doesn't have
00:00
any firewall and no controls on it,
00:00
but it's not very secure.
00:00
Infrastructure security is about finding
00:00
that balance between availability and security.
00:00
It's about putting the right components in place based on
00:00
your resources and your budget and
00:00
the things that you're trying to protect.
00:00
The first concept we want to talk
00:00
about when we talk about defense
00:00
in depth is the concept of layers of defense.
00:00
Again, this is a conceptual way to think about things.
00:00
But when we think about defense,
00:00
it's sometimes helpful if we think about
00:00
it in layers and we can think about
00:00
components at each one of those layers and how to
00:00
put those together into an effective security strategy.
00:00
The very first layer to visualize is
00:00
the perimeter and the perimeter is simply where
00:00
our internal environment comes into contact
00:00
with the untrusted external environment,
00:00
where trusted things come into contact with untrusted.
00:00
This could be between our environment and the Internet.
00:00
It can be between our company and another company.
00:00
If we have a B2B connection
00:00
anywhere where a trusted entity,
00:00
meets and untrusted entity, that's the perimeter.
00:00
The network layer is
00:00
the routers and switches and
00:00
the network that ties all of that together,
00:00
that connects us with the outside world.
00:00
It's also the layer that
00:00
connects our internal components to each other.
00:00
Just conceptualize that whole thing as the network layer.
00:00
Then on the network, we have endpoints.
00:00
Endpoints are just those compute devices.
00:00
Those are the servers and databases, and laptops,
00:00
and bad readers and printers and all of
00:00
those things connected to the network.
00:00
Those are the endpoints.
00:00
On those endpoints, we have applications.
00:00
We've got an operating systems and
00:00
SQL databases and Oracle databases and
00:00
web applications and all these different applications,
00:00
all of these software components that run on
00:00
the end point that those make up the application layer.
00:00
Then finally, we have the data.
00:00
At the end of the day, the data
00:00
is what we're trying to protect.
00:00
This is the actual bits and bytes,
00:00
the actual one's and two's data that we are trying
00:00
to protect from would-be attackers.
00:00
As we go through.Module 2,
00:00
we're going to cover each one of these layers.
00:00
We have a section on each one of these layers.
00:00
We're going to talk about the different components
00:00
in each one of these layers.
00:00
But always keep in the back of your mind
00:00
this visualization of the layers of defense.
00:00
As we talk about components at each one,
00:00
you don't necessarily need to put every component in
00:00
place to have a comprehensive security posture.
00:00
But you need to understand
00:00
how component at one layer is going to interact
00:00
with a component at another layer and provide you
00:00
overall security to that data
00:00
that you're trying to protect.
00:00
Next up we're going to go into Lesson 2.2.
00:00
We're going to talk about our first layer,
00:00
which is the perimeter.
Up Next
Firewalls
DMZ
IPS/IDS
Honeypots
Remote Access Part 1