Home / ISO 27001 Glossary of Terms / Defence in Depth

Defence in Depth

11/09/2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

Defence in Depth is a cybersecurity strategy that uses a series of security controls and countermeasures at multiple layers to protect an organisation’s assets. Instead of relying on a single security measure (like a firewall), this approach assumes that any single control might fail and therefore builds redundancy. The goal is to create multiple, overlapping barriers that an attacker must overcome, slowing them down and increasing the chances of detection.

Layers & Examples

  • Physical Layer: Securing the physical premises with fences, guards, and CCTV cameras.
  • Network Layer: Using firewalls and intrusion detection systems to protect the network perimeter.
  • Host Layer: Hardening individual servers and workstations with endpoint protection, patches, and strong passwords.
  • Application Layer: Implementing secure coding practices and access controls within applications themselves.
  • Data Layer: Encrypting sensitive data to protect it even if a breach occurs at another layer.

ISO 27001 Context

While not a specific clause in the ISO 27001 standard, Defence in Depth is a foundational concept that underpins many of its controls. Implementing a layered security approach is essential for meeting the standard’s requirements for risk mitigation and ensuring the confidentiality, integrity, and availability of information.

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.