Applying The Layered Approach - Defence In Depth
In line with the theme of field based technologies, the need to interact with field-data hosted beyond domain networks is reviewed here. Traditional networks that housed core data structures are likely to have implemented security segments similar to figure 1. With the advancement of users ability to access and interact with data outside the traditional network, the need for defence in depth as a method to review security posture becomes appealing as it allows you to take multi-layered approach to security, similar to figure 2. Below are some steps your Security Operations Center can use to review application/technology deployment projects: 1.Identify the bare essential critical core components required for a transaction to occur within your application. 2.How would services dependant on Non…