What are the differences between perimeter defense and core configuration controls?

Category: Security and Privacy

Security and privacy controls should function to reduce or eliminate external and internal threats – doing so through a combination of perimeter defense and internal configuration control. Controls should also support rapid bounce-back capabilities (called resilience) when incidents occur – from minor to major in scope. When done correctly, controls can serve to detect and deter unauthorized access attempts, denial of service attacks, malware insertion attempts, spoofing, phishing, and virus attacks, and code manipulation attempts.

Tag: Security