IT and Business Insights for SMB Solution Providers

What is Defense in Depth and How Can You Achieve It? Pro Tips for Proactive Cybersecurity

<img src="/%3Ca%20href%3D"https://comptiacdn.azureedge.net/webcontent/images/default-source/blogs/defense-in-depth.png?sfvrsn=14ec0310_4"">https://comptiacdn.azureedge.net/webcontent/images/default-source/blogs/... data-displaymode="Original" alt="Woman working on a computer and laptop with cybersecurity software." title="Defense in depth"><p>Cybersecurity is a topic that is tough to stay on top of. <a href="/%3Ca%20href%3D"https://www.comptia.org/content/articles/cyberattack-stats/">New">https://www.comptia.org/content/articles/cyberattack-stats/">New threats</a> emerge all the time and it can sometimes feel like you are constantly reacting to threat after threat, scrambling to clean up the mess left by attackers and the incidents they leave in their wake. Instead of only focusing on <a href="/%3Ca%20href%3D"https://www.comptia.org/blog/security-awareness-training-incident-response-plans">incident">https://www.comptia.org/blog/security-awareness-training-incident-respon... response</a>, you should take the more proactive approach of preventing attacks from taking place in the first place. That’s where defense in depth comes in.</p> <p>Attackers are a savvy bunch, constantly coming up with new ways to penetrate your environment. But <a href="/%3Ca%20href%3D"https://www.comptia.org/blog/the-top-9-jobs-in-cybersecurity">cybersecurity">https://www.comptia.org/blog/the-top-9-jobs-in-cybersecurity">cybersecurity pros</a> are no slouches either and there are ways they can combat whatever nefarious things come their way. When you need a comprehensive approach, jam-packed with security measures designed to combat a threat onslaught, you need defense in depth.</p>

<center><blockquote class="center">Defense in depth is about more than protecting your perimeter, it’s about adding defenses as you get closer to your critical assets. <br><em>- Chris Cochran</em> </blockquote></center>

<h2>What is Defense in Depth? Moving Beyond the Surface</h2>

<p>Defense in depth is a cybersecurity approach that involves protecting your environment under several layers of security protocols, rather than relying on a single protective measure. This method yields greater protective force against attacks because you have redundant safeguards throughout your environment or even on a single device—like posting sentries at each door throughout a home, rather than only at the front door. </p> <p>Because no single security measure can block all attacks, defense in depth is a way to thwart attacks that get past your initial security measures. <a href="/%3Ca%20href%3D"https://www.linkedin.com/in/chriscochrancyber">Chris">https://www.linkedin.com/in/chriscochrancyber">Chris Cochran,</a> founder of <a href="/%3Ca%20href%3D"http://www.hackervalley.com/">Hacker">http://www.hackervalley.com/">Hacker Valley Studio,</a> advises that businesses of all sizes adopt defense-in-depth methods for fortifying systems, from enterprises down to <a href="/%3Ca%20href%3D"https://www.comptia.org/blog/what-small-business-owners-should-know-about-cybersecurity">small">https://www.comptia.org/blog/what-small-business-owners-should-know-abou... businesses</a> and even individual users. </p>

Cochran offers us several tips for implementing a defense-in-depth approach.<p><span style="font-size: 18px;"><br>Stepping Up Your Cybersecurity With Defense in Depth</span><br></p> <p>Every tech environment is different and tech stacks vary significantly. Regardless of your configuration, you can implement a defense-in-depth approach to make it more difficult to penetrate your environment. </p> <p>Cochran recommends a few steps to help you identify what defense in depth might look like on your own systems.</p> <ol> <li><strong>Create a threat hypothesis based on your environment.</strong> Begin by identifying what malicious activity might look like. What do anomalies look like? Pinpoint what constitutes abnormal behavior and normal behavior as a benchmark so that you can nail down anomalies when they occur.</li> <li><strong>Identify your crown jewels or critical assets.</strong> What is the most important data or systems that need protecting? Locate your critical components and build layers of security out from that core. </li> <li><strong>Implement anomalous detection measures.</strong> What intrusion detection systems can you implement? You need to consider prevention measures at the perimeter, but also at levels throughout your environment.</li> <li><strong>Test your own system.</strong> Perform regular penetration testing on your environment. Get familiar with your own tech stack and it will become easier to detect anomalies and identify vulnerabilities. “The more you test your own systems, the better you understand your own environment and the more quickly you can identify what different looks like,” noted Cochran.</li> </ol> <h2>Defending Better with Best Practices</h2> <p>Cochran is a director of security engineering who secures environments every day. These are some of the defense-in-depth best practices he recommends.</p> <h3>Adopt a Hacker Mindset</h3> <p>If you want to protect your assets, don’t think like a protector, <a href="/%3Ca%20href%3D"https://www.comptia.org/blog/think-like-a-hacker-3-cybersecurity-models-used-to-investigate-intrusions">think">https://www.comptia.org/blog/think-like-a-hacker-3-cybersecurity-models-... like a hacker</a>. To shift yourself into that mode, ask yourself these questions.</p> <ul><li>How do you make it more difficult each step down the kill chain?</li><li>How do you make it harder to exploit something in your environment?</li><li>How do you make it more difficult to traverse in your environment?</li><li>How can you strengthen things to make it more difficult to find and extract data from your environment?</li><li>Ultimately, how do you make a hacker’s job so tough that they give up and go somewhere else?</li></ul> <h3>Use Deception Ops</h3> <p>Cochran recommends using canaries in your environment to alert you when an unwanted person is nosing around where they shouldn’t be. </p> <p>“Its only purpose is to lie in wait,” he said. “Once it's ‘touched,’ it sends a high alert to your security practitioners, letting you know that someone is in your network.” This is a deception technique that works in your favor.</p> <h3>Strengthen Your Onboarding Procedures</h3> <p>Cochran also suggests that organizations work closely with vendors to maximize the utility and security of any solution in your environment. </p> <p>“So often people buy solutions and those just sit around not doing what they’re supposed to be doing,” he said. “Really do some due diligence, all the way from the perimeter down to the virtual asset. If everyone did that, we’d be in a good place.”</p> <p>Using defense in depth helps put you in a proactive place, rather than a reactive one. It helps organizations identify, contain and resolve much more quickly. </p> <p>“Defense in depth really helps when prevention is no longer possible,” Cochran said. “With defense in depth, put a focus into detection to learn when malicious things are happening. You can bring it to a close more quickly and it’s cheaper to handle.”</p> <p><em><strong>Get more articles like this delivered right to your inbox.&nbsp;<a href="/%3Ca%20href%3D"https://certs.comptia.org/it-career-news-blog-subscription/">Subscribe">https://certs.comptia.org/it-career-news-blog-subscription/">Subscribe to CompTIA’s IT Career News</a>&nbsp;and save 10% on your purchase of CompTIA training or exam vouchers.</strong></em></p>

About the Author

With more than 2,000 members, 3,000 academic and training partners and tens of thousands of registered users spanning the entire information communications and technology (ICT) industry, CompTIA has become a leading voice for the technology ecosystem.

ChannelPro SMB Magazine
SUBSCRIBE FREE!

Get an edge on the competition

With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.