![]() Physical Access: Locked rooms and restricted areas. ![]() You need to create security layers around each of the following components in your IT environment: This same principle needs to be applied in the IT and data security space. As you know, an onion has multiple layers that completely wrap around its heart. In order to understand the general idea of this new concept, imagine for a moment that the data you are trying to protect is at the heart of an onion. I want to share a model called “defense in depth” that I learned from my security courses at the SANS Institute and have since used in my daily job. They struggle to come up with a security strategy that covers all parts of their environment. Many people I know get easily overwhelmed when they talk about IT and data security.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |