What are we defending against?
The castle shown about is used to defense against enemy attack. What about in the Information Security world? Who is the enemy?
You may say the enemy is the hacker. While this is true, the exact term used should be threats. Threat by itself is a subjective word. Threat can be remote, threat can be big or it can be small.
In the Information Security world, 3 terms are used together:
In fact there is a formula for these 3 terms:
Risk = Threat X Vulnerability
For example, when you kept your front door unlock it is a vulnerability but you live in a safe neighborhood your threat is low and thus your risk will not be high. On the other hand if you keep your front door unlock and you live in a high crime area then your risk is very high.
Note: Security is all about mitigation of risk. We can never be 100% secure. The objective of information security is to mitigate all know risk factor to the minimal.
Defense in Depth
Defense in Depth is a security best practice.I have heard the late CEO of Apple Inc Steve Jobs had a security guard to stay within a few feet of his laptop all the time when he is speaking at conferences. I am sure his laptop is both password protected and encrypted, adding another layer of defense will not hurt.
There are 4 kinds of Defense in Depth:
- Uniform Protection
- Protected Enclaves
- Information Centric
The easiest and most common form is uniform protection where all the resources or data are treated as equally important. With this approach, it is more vulnerable for malicious insider because everything is being treated as equal, an development engineer can gain access to the data in the HR department.
With this approach, resources/data are segmented. It enforces the principle of least privilege so that user can only access what they need to access. So in this case a development engineer cannot gain access to the data in the HR department. The Pentagon has a classify network and a non classify network. One time I was there for on site support and since I did not have security clearance, I have to step out of the room when we debug the classify network and tell the guy that has security clearance to type in the debug command and he will have to ready the output for me. That was quite an experience debugging the classify network.
Data or asset are tagged with different values. We can envision an onion which has different layers. The most important asset will be in the center where more protection is deployed. Each layer has it own security implemented with this defense in depth concept.
image source: http://www.sentrillion.com/images/img_defense-in-depth.jpg
This approach identify attack vector where the threat can be present. Similar to the Information centric approach but the emphasis is on the attach vector such as thumb drives, smartphone that can take pictures.
Role-base Access Control
While this is not usually looked at as a defense in depth model but in principle this is form having multiple ways of gaining access. With the data/resource segmented, after a user is logged into the system with the proper credential, the user is assigned a role and this role can be in a form of a access token is to determine what resource the user is able to access giving an additional level of access control. Microsoft's Kerberos and OpenStack uses this Role-base Access Control.
Information Security Basics Part 1: Security Models
Information Security Basics Part 3: Cryptography
Information Security Basics Part 4: Public Key Infrastructure (PKI)