An architecture that uses technology and procedures to limit the opportunities for an adversary to compromise an organizational system and to achieve a persistent presence in the system.
Source(s):
NIST SP 800-172
NIST SP 800-172A