Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of the organization.
Source(s):
NIST SP 800-161
under Defense-in-Depth
from
CNSSI 4009, NIST SP 800-53 Rev. 4
NISTIR 7622
under Defense-in-Depth
from
CNSSI 4009-2010, NIST SP 800-53
Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.
Source(s):
CNSSI 4009-2015
from
NIST SP 800-53 Rev. 4
NIST SP 800-172
NIST SP 800-30 Rev. 1
under Defense-in-Depth
from
CNSSI 4009
NIST SP 800-39
under Defense-in-Depth
from
CNSSI 4009
NIST SP 800-53 Rev. 4
[Superseded]
under Defense-in-Depth
An information security strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.
Source(s):
NIST SP 800-53 Rev. 5
under defense in depth
The application of multiple countermeasures in a layered or stepwise manner to achieve security objectives. The methodology involves layering heterogeneous security technologies in the common attack vectors to ensure that attacks missed by one technology are caught by another.
Source(s):
NISTIR 8183
under Defense-in-depth
from
ISA/IEC 62443, ISO/IEC 62443 1-1
NISTIR 8183 Rev. 1
under Defense-in-depth
from
ISA-62443-1-1
NISTIR 8183A Vol. 2
under Defense-in-depth
from
ISO/IEC 62443 1-1
NISTIR 8183A Vol. 3
under Defense-in-depth
from
ISO/IEC 62443 1-1