Defense in Depth Security Architecture
About This Architecture
Layered security controls from perimeter to identity. Six layers: Perimeter (DDoS, WAF, Firewall), Network (segmentation, NACLs), Host (hardening, AV/HIDS), Application (OWASP, SAST/DAST), Data (encryption, tokenization, DLP), and Identity (MFA, RBAC, PAM).
Architecture prompt
Layered security controls from perimeter to identity. Six layers: Perimeter (DDoS, WAF, Firewall), Network (segmentation, NACLs), Host (hardening, AV/HIDS), Application (OWASP, SAST/DAST), Data (encryption, tokenization, DLP), and Identity (MFA, RBAC, PAM).
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.