Defense in depth is one of those concepts that everyone agrees with and few implement well. The idea is straightforward: no single security control should be the only thing standing between an attacker and your data. In practice, most organizations have one or two strong layers and then nothing.

A firewall and antivirus is not defense in depth. A well-architected system where an attacker who breaches the perimeter still faces authentication barriers, network segmentation, encrypted data at rest, and monitoring that detects lateral movement: that is defense in depth.

The layers

Think of security architecture as concentric rings. Each ring assumes the one outside it has already been compromised. This is not pessimism. It is engineering.

  • Perimeter: firewalls, WAF, DDoS protection, DNS filtering. Keeps out automated attacks and casual probing.
  • Network: segmentation, VLANs, zero-trust network access. Limits lateral movement once inside.
  • Identity: MFA, SSO, role-based access control, privileged access management. Ensures the right people access the right things.
  • Application: input validation, parameterized queries, secure session management, API authentication. Prevents exploitation of business logic.
  • Data: encryption at rest and in transit, tokenization, data loss prevention, backup integrity. Protects what actually matters.
  • Monitoring: SIEM, endpoint detection, log aggregation, anomaly detection. Catches what the other layers miss.

Where to start

You cannot implement every layer at once, and not every layer has equal value for every organization. The priority depends on where your data lives, how users access it, and what the most likely attack vectors are.

For most companies, identity and access control is the highest-value investment. Stolen credentials are the initial access vector in more than 60% of breaches. MFA alone eliminates a huge portion of the attack surface.

After identity, focus on the layer closest to your most sensitive data. If you are a SaaS company, that is application security. If you are running on-premises infrastructure with sensitive records, that is network segmentation and data encryption.

Zero trust is not a product

Zero trust has become a marketing term. Every security vendor claims to sell it. In reality, zero trust is an architecture principle: never trust, always verify. Every request is authenticated and authorized, regardless of where it originates.

Implementing zero trust means replacing implicit trust with explicit verification. An employee on the corporate network does not automatically get access to internal services. A microservice calling another microservice presents credentials and is authorized for the specific action it needs to perform. Trust is scoped, short-lived, and continuously verified.

  • Authenticate every user and every service on every request
  • Authorize at the resource level, not the network level
  • Encrypt all traffic, including internal east-west traffic
  • Log everything and alert on anomalous access patterns
  • Assume breach: design as if the attacker is already inside

Building it in, not bolting it on

The most effective security architecture is the one built into the system from the beginning. Retrofitting security onto an existing system is always more expensive and less complete. If you are building new infrastructure or rewriting a service, that is the time to embed security into every layer.

We design security architecture as part of the build, not as an afterthought audit. The result is systems where security controls are part of the deployment pipeline, access policies are defined in code, and monitoring is wired in from day one. Not because it is best practice, but because it is cheaper and more effective than fixing it later.