
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Defense in depth is a security strategy that deploys multiple layers of controls throughout an environment. Rather than relying on a single perimeter to stop all attacks, it assumes any individual control can fail and builds redundancy to catch what slips through.
Imagine a medieval castle. It doesn't rely solely on outer walls—there's a moat, then outer walls, then inner walls, then the keep itself. An attacker who crosses the moat still faces walls. An attacker who scales the walls finds more defenses inside. Each layer slows the attack and provides opportunities for defenders to respond.
Modern security follows the same principle. A firewall might block most attacks, but some will get through—perhaps through a misconfiguration, a zero-day exploit, or simply legitimate-looking traffic. If the firewall were your only defense, those attacks succeed completely. With defense in depth, attacks that bypass the firewall encounter additional controls: endpoint detection, network segmentation, application-level security, and more.
Network perimeter controls include firewalls, web application firewalls, and intrusion prevention systems. They filter traffic entering and leaving the network, blocking known malicious patterns and enforcing access policies.
Network segmentation divides the internal network so that compromising one system doesn't grant access to everything. Critical servers sit in protected segments. Development environments are separated from production. An attacker who compromises a workstation can't immediately reach the database server.
Endpoint protection runs on individual systems—workstations, servers, laptops. Traditional antivirus has evolved into endpoint detection and response (EDR) platforms that monitor system behavior, detect suspicious activity, and enable rapid response.
Application security protects the applications themselves. Input validation prevents injection attacks. Authentication controls restrict access. Encryption protects data in transit and at rest.
Identity and access management ensures only authorized users access resources they need. Multi-factor authentication makes stolen passwords insufficient. Least privilege limits damage from compromised accounts.
Data protection represents the innermost layer. Encryption renders data useless even if attackers exfiltrate it. Data loss prevention detects and blocks unauthorized transfers. Backups enable recovery from ransomware or destruction.
Each defensive layer generates data useful for security monitoring. Firewalls log blocked and allowed connections. EDR agents report process execution and file modifications. Identity systems record authentication attempts. Applications log user actions.
Defense in depth isn't just about prevention—it's about detection. When attacks bypass one control, other layers might detect abnormal behavior. The firewall allowed the traffic, but the endpoint agent noticed suspicious process activity. The authentication succeeded, but anomaly detection flagged unusual access patterns.
Security operations ties these layers together. The SOC collects data from all layers, correlates events across sources, and detects attacks that no single layer would catch. Defense in depth creates the visibility that makes effective detection possible.
What are the main security risks associated with defense in depth?
Use the terminal to enumerate the target system. What services are running?
Based on your findings, what attack vectors might be available?
Attempt to exploit a vulnerability and capture the flag.