ADVANCED // ENTERPRISE
MODULE 05 // PROTECTION

Security Hardening.

Implement enterprise security controls.

SECURITY ARCHITECTURE

Enterprise security requires defense in depth: network segmentation, encryption everywhere, strict access control, and comprehensive audit logging.

Principle of least privilege: every component gets minimum permissions required. Default deny, explicit allow. Regularly review and revoke unused access.

Assume breach. Design systems so that compromising one component doesn't compromise everything. Segment networks, encrypt data at rest, and monitor for anomalies.

NETWORK SEGMENTATION

Isolate ABIS in dedicated network segment. Firewall rules restrict traffic to necessary paths.

PERIMETER

ENCRYPTION

TLS 1.3 for transit. AES-256 for data at rest. Key rotation every 90 days.

DATA

ACCESS CONTROL

RBAC with least privilege. MFA for all access. Just-in-time privileged access.

IDENTITY

AUDIT LOGGING

Log all access and changes. Immutable logs to separate storage. Retention per compliance.

MONITORING
KNOWLEDGE CHECK // Q05
Why assume breach when designing security architecture?