home/glossary/layered protection

layered protection

nouncandidate·updated May 9, 2026

As relying on any single defence against a cyber threat may be inadequate, an FMI can use a series of different defences to cover the gaps in and reinforce other protective measures. For example, the use of firewalls, intrusion detection systems, malware scanners, integrity auditing procedures and local storage encryption tools can serve to protect information assets in a complementary and mutually reinforcing manner. May also be referred to as “defence in depth”.

MWE

Classifications

Entity Type

Control85%llm-generatedllm:claude-haiku-4-5
?unassignedlast reviewed

Sensitivity

unclassified

Information Class

unclassified

Variants

plural
layered protections
possessive
layered protection's
pluralpossessive
layered protections'