07. Exercise Solution: Defense in Depth Introduction

Defense in Depth Introduction Exercise Solution Heading

Defense in Depth Introduction Exercise Solution

ND545 C02 L01 A06 Defense In Depth Introduction Exercise Solution

Defense in Depth Introduction Exercise Solution Summary

Recap

Because the HQ office has traffic from the branch offices, it will require a more powerful firewall than if it were just processing the HQ traffic.
Any server room should have physical security in the form of controlled access, preferably a code-based or card-based method.
The servers, both cloud and on premises will need permissions set accordingly, we'll learn more about that in the next lesson.
When laptops are entered into the cybersecurity equation, things get more complicated. The disks will need to be encrypted, antivirus should be cloud-based and you will need to consider VPN access.
The branches will need firewalls and the entire organization will need secure wireless access.
Finally, there are stories every week of cloud data leaking, so be sure to perform an audit of the cloud systems.

Don't worry if your answer doesn't match mine. We'll cover all of that information and more as we proceed.