Building defensive depth

No single control stops determined attackers. Layered defences force attackers to defeat multiple obstacles, increasing detection chances.

Prevention controls

Identity and access management: Multi-factor authentication, least privilege access, privileged access management (PAM), just-in-time access.

Patch management: Prioritise critical vulnerabilities, deploy patches systematically, test before production deployment, maintain asset inventory.

Endpoint hardening: Application whitelisting, disable unnecessary services, enable exploit protections (ASLR, DEP), remove local admin rights.

Network segmentation: Separate sensitive systems, restrict lateral movement, enforce micro-segmentation for critical assets, monitor inter-segment traffic.

Email security: Anti-phishing tools, attachment sandboxing, link analysis, SPF/DKIM/DMARC, security awareness training.

Detection controls

SIEM (Security Information and Event Management): Centralise logs from all sources, correlate events across systems, alert on suspicious patterns, provide investigation interface.

EDR (Endpoint Detection and Response): Monitor endpoint activity, detect malicious behaviours, enable rapid response, provide forensic visibility.

NDR (Network Detection and Response): Monitor network traffic, detect lateral movement, identify command and control, detect data exfiltration patterns.

Deception technology: Honeypots, honey tokens, decoy credentials. Attackers interacting with decoys generate high-confidence alerts.

Threat intelligence platforms: Aggregate external threat feeds, enrich alerts with context, identify known-bad infrastructure.

Response capabilities

Incident response team: Defined roles, documented procedures, regular training and exercises, 24/7 availability for critical incidents.

Forensic capabilities: Tools and skills for investigation, secure evidence handling, timeline reconstruction, root cause analysis.

Automation and orchestration (SOAR): Automate common response tasks, orchestrate cross-tool workflows, reduce time to respond for known scenarios.

Communication plans: Internal stakeholders notification, customer communication, regulatory reporting, media handling, executive briefings.

Resilience measures

Backup and recovery: Regular backups, offline/immutable backups, tested restore procedures, documented recovery time objectives.

Business continuity planning: Alternative work processes, failover systems, manual procedures when systems unavailable.

Disaster recovery: Rebuild procedures, backup sites, recovery prioritisation, regular disaster recovery testing.