Previous Topic

Next Topic

Book Contents

Design multiple layers of protection

When designing a secure deployment, design multiple layers of protection. For example, if someone were to gain unexpected access to a layer, such as the application server, the person should not automatically have access to other layers, such as the database server.

Providing multiple layers of protection might include the following activities:

Send Feedback