Defense in Depth
https://www.youtube.com/watch?v=CHKS2FcEMek&list=PLlVtbbG169nED0_vMEniWBQjSoxTsBYS3&index=37
When thinking about security, imagine an onion with layers
Data is the most important inner layer
After that you might have application -> compute -> network -> perimeter -> identity/access -> physical security (responsibility of cloud provider)
CIA
Confidentitaility - least privilidged access and only when you need it
Integrity - nothing is tampering with data in rest or in transit
Availability - being able to access your data even in the event of a DDoS attack or something similar
Last updated