The economics of defense
Before choosing any control, ask whether it is worth the cost. The formula that guides this decision is:Risk = Threat × Vulnerability × Cost
- Threat — who wants to attack you, and what are they after?
- Vulnerability — how exposed are you to that threat?
- Cost — what do you lose if the attack succeeds?
| Response | What it means | Example |
|---|---|---|
| Mitigate | Reduce likelihood or impact to an acceptable level | Add MFA to reduce credential-theft risk |
| Avoid | Stop the activity that creates the risk | Don’t store credit card numbers at all |
| Accept | Cost of the fix exceeds the impact | A low-traffic site accepts the risk of a minor DDoS |
| Transfer | Move the risk to a third party | Purchase cyber insurance |
Defense in depth
Defense in depth (DiD) is a layered approach where multiple independent controls protect the same asset. If one layer fails, others still stand. Think of it as an onion: each ring is a different category of control. By type:- Physical controls — locks, access cards, security cameras, guards
- Technical controls — firewalls, encryption, access control, IDS/IPS, MFA
- Administrative controls — security policies, staff training, incident response plans, audits
- Preventive — stop attacks before they reach assets (firewalls, access control, input validation)
- Detective — identify and log attacks in progress (IDS, monitoring, anomaly detection)
- Corrective — contain damage and restore normal operation (backups, incident response, patching)
Core design principles (Saltzer & Schroeder)
Implementing DiD well means following these foundational principles:- Least privilege — grant each user or process only the minimum access required. A web server process that runs as root gives an attacker root on compromise; one that runs as a limited service account does not.
- Fail-safe defaults — default to no access; grant it explicitly. It’s easy to notice when someone has too little access (they complain), but no one complains about having too much.
- Economy of mechanism — keep designs as simple as possible. Complexity hides vulnerabilities.
- Complete mediation — check every access to every resource for authorization, every time.
- Open design — security must not depend on keeping the design secret. Security through obscurity is not reliable.
Zero Trust vs. Castle and Moat
These two models represent a fundamental shift in how you think about network perimeters.- Castle and Moat (traditional)
- Zero Trust (modern)
The Castle and Moat model treats your internal network as the castle and your perimeter defenses (firewalls, IDS) as the moat. If you’re inside the perimeter, you are trusted.How it works:
- Strong perimeter defenses keep attackers outside
- Devices and users inside the network are implicitly trusted
- Access controls focus on the boundary
- Assumes threats come only from outside — internal threats or compromised insiders are not addressed
- A single breach of the moat gives an attacker relatively free movement inside
- Cloud services, remote work, and BYOD make the perimeter impossible to define cleanly
- Lateral movement after initial compromise is easy
Most real-world organizations operate somewhere on a spectrum between these two models. Zero Trust is a goal, not a binary state. You can adopt its principles incrementally — start with MFA everywhere, then move toward micro-segmentation and least-privilege enforcement.
The 3-2-1 backup rule
Ransomware specifically targets backups before encrypting production data. A backup that lives on the same machine it protects is not a backup — it is a second copy that gets encrypted alongside the first. The 3-2-1 rule is the minimum viable backup strategy:- 3 copies of your data (1 production + 2 backups)
- 2 different storage media types (e.g., local disk and cloud, or disk and tape)
- 1 copy stored offline and physically separated from the others
Immutable backups take this further: they cannot be altered or deleted — even by an administrator — for a defined retention period. Ransomware cannot encrypt what it cannot write to.
Frameworks and standards
You do not need to design a security program from scratch. Established frameworks provide prioritized, auditable checklists of controls:- NIST Cybersecurity Framework (CSF) — Identify, Protect, Detect, Respond, Recover
- ISO/IEC 27001 — international standard for Information Security Management Systems (ISMS)
- CIS Controls — prioritized technical controls ranked by defensive value
- OWASP Top 10 — the ten most critical web application security risks