What "Defense in Depth" Actually Means
Defense in depth is the principle that no single control should be the only thing standing between an attacker and what they want. You build security in layers — each one redundant, each one capable of catching what the previous layer missed.
The metaphor people usually reach for is a medieval castle: moat, walls, gates, guards, inner keep. Knock out one and you still have four to go.
Three Types of Controls (You Need All Three)
- Preventive — stop the bad thing from happening. (Firewalls, MFA, encryption, code review.)
- Detective — notice when the bad thing happens anyway. (SIEM alerts, EDR, audit logs, anomaly detection.)
- Corrective — recover quickly when it does. (Backups, incident response runbooks, automated isolation.)
A strategy that's all preventive ("build the wall higher") and no detective ("now we have no idea who's already inside") is brittle. So is the reverse — detection without prevention is just expensive forensic work.
Where the Layers Live in a Modern Stack
For a typical cloud-native company in 2026, the layered model looks like this:
- Identity layer — SSO, phishing-resistant MFA, conditional access, just-in-time privileges.
- Network layer — segmentation, private endpoints, egress controls, WAF.
- Application layer — secure coding, dependency scanning, runtime protection.
- Data layer — encryption at rest and in transit, DLP, classification, key management.
- Monitoring layer — endpoint EDR, cloud audit logs, SIEM, SOAR.
- Recovery layer — immutable backups, tested DR plans, runbooks.
Where Teams Get Defense in Depth Wrong
- Stacking the same kind of control. Three different brands of perimeter firewall isn't depth — it's redundancy at one layer.
- Detection without response. Alerts pile up in a queue no one reads. Detection without an IR runbook is theatre.
- Skipping the recovery layer. Modern attackers will get in eventually. If you can't restore in hours, prevention wasn't enough.
- Forgetting humans. Awareness training is a layer too — and the cheapest one.
A Starter Checklist If You're Building This From Scratch
- Phishing-resistant MFA on every workforce identity
- Centralized logging from cloud, identity provider, and endpoints
- EDR on every workstation and server
- Patch SLA: 24h critical / 7d high / 30d medium for internet-facing systems
- Quarterly tabletop exercise on at least one IR scenario
- Tested, immutable backups with documented restore time