Defense in Depth Security Architecture

Layered security controls from perimeter to identity. Six layers: Perimeter (DDoS, WAF, Firewall), Network (segmentation, NACLs), Host (hardening, AV/HIDS), Application (OWASP, SAST/DAST), Data (encryption, tokenization, DLP), and Identity (MFA, RBAC, PAM).

general · architecture diagram.

About This Architecture

Layered security controls from perimeter to identity. Six layers: Perimeter (DDoS, WAF, Firewall), Network (segmentation, NACLs), Host (hardening, AV/HIDS), Application (OWASP, SAST/DAST), Data (encryption, tokenization, DLP), and Identity (MFA, RBAC, PAM).

Defense in Depth Security Architecture

AutoCurated TemplateSecurity
1 views0 favoritesPublic

Created by

February 9, 2026

Updated

February 13, 2026 at 5:47 PM

Type

architecture

Need a custom architecture diagram?

Describe your architecture in plain English and get a production-ready Draw.io diagram in seconds. Works for AWS, Azure, GCP, Kubernetes, and more.

Generate with AI
Defense in Depth Security Architecture — Architecture Diagram | Diagrams.so