Defense In Depth
Defense in Depth & Security Controls ππ°¶
πΉ What is Defense in Depth (DiD)?¶
Defense in Depth (DiD) is a layered security approach where multiple security controls protect against cyber threats. If one layer fails, others continue to protect the system.
1οΈβ£ Layers of Defense in Depth & Security Controls¶
| Layer | Example Controls | Security Control Type |
|---|---|---|
| Physical Security | AWS Data Centers, SOC Compliance | Preventive |
| Network Security | Firewalls, VPC, Security Groups, AWS Shield | Preventive, Detective |
| IAM & Access Control | MFA, Least Privilege, IAM Roles | Preventive |
| Endpoint Security | GuardDuty, Systems Manager, Antivirus | Preventive, Detective |
| Application Security | WAF, API Gateway, Secure Coding | Preventive, Detective |
| Data Security | Encryption, Backups, RDS Snapshots | Preventive, Corrective |
| Monitoring & Response | CloudTrail, SIEM, Incident Response Plans | Detective, Corrective |
2οΈβ£ Types of Security Controls in Defense in Depth¶
πΉ Preventive Controls β Stop threats before they happen.
β‘ MFA, Firewalls, Least Privilege (PoLP), Endpoint Security.
πΉ Detective Controls β Identify security incidents.
β‘ SIEM, Intrusion Detection Systems (IDS), Audit Logs.
πΉ Corrective Controls β Mitigate and respond to attacks.
β‘ Incident Response, Backups, Patching.
πΉ Deterrent Controls β Discourage attackers.
β‘ Security Awareness Training, Legal Policies.
πΉ Compensating Controls β Alternative controls when primary security fails.
β‘ Extra monitoring if MFA isnβt available.
3οΈβ£ Real-World Example: AWS Cloud Security Implementation βοΈ¶

πΉ Physical Security (Preventive Control)¶
β AWS secures data centers with biometric access, surveillance, and armed guards.
πΉ Network Security (Preventive & Detective Controls)¶
β
VPC (Virtual Private Cloud) β Isolates environments.
β
Security Groups & NACLs β Control inbound/outbound traffic.
β
AWS Shield β Protects against DDoS attacks.
πΉ IAM & Access Management (Preventive Control)¶
β
IAM Policies & Roles β Enforce Least Privilege (PoLP).
β
MFA (Multi-Factor Authentication) β Prevent unauthorized access.
πΉ Endpoint Security (Preventive & Detective Controls)¶
β
Amazon GuardDuty β Detects threats in real time.
β
AWS Systems Manager (SSM) β Patches EC2 instances.
β
Bastion Host β Restricts direct SSH access.
πΉ Application Security (Preventive & Detective Controls)¶
β
AWS WAF (Web Application Firewall) β Blocks SQL Injection, XSS.
β
API Gateway + IAM Authorization β Secures API endpoints.
β
Code Scanning (CI/CD) β Detects vulnerabilities.
πΉ Data Security (Preventive & Corrective Controls)¶
β
S3 Encryption (AES-256, KMS) β Secures stored data.
β
Database Encryption (RDS, DynamoDB) β Protects sensitive records.
β
Backups & Snapshots (AWS Backup, RDS Snapshots) β Ensures disaster recovery.
πΉ Monitoring & Incident Response (Detective & Corrective Controls)¶
β
AWS CloudTrail β Logs all API activity.
β
Amazon CloudWatch + Alerts β Detects system anomalies.
β
SIEM (AWS Security Hub, Splunk, ELK Stack) β Centralized threat detection.
β
Incident Response Playbooks β Automate security actions.
4οΈβ£ How Defense in Depth & Security Controls Work Together¶
β Defense in Depth applies multiple security layers to protect systems.
β Security controls ensure protection at every layer.
β Combining DiD + Security Controls strengthens security in Cloud, DevOps, and IT environments.