Episode 39 — Apply Defense-in-Depth, Zero Trust, and Secure-by-Default in Real Designs

This episode explains how to apply defense-in-depth, zero trust, and secure-by-default in practical architecture decisions, because ISSEP tests whether you can implement these concepts without turning them into slogans. We define defense-in-depth as layered controls that reduce dependence on any single barrier, zero trust as continuous verification and minimal implicit trust across boundaries, and secure-by-default as configurations and workflows that start safe without requiring heroic user behavior. You’ll learn how to choose layers that are independent enough to matter, such as identity, segmentation, device posture, application authorization, and monitoring, and how to avoid stacking redundant controls that all fail the same way. We also cover best practices for defaults: reducing initial attack surface, forcing explicit enablement for risky features, and ensuring logging and access control are on by default. Troubleshooting includes common gaps like “zero trust” that ignores admin paths, or secure defaults that get overridden by convenience exceptions with no traceability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 39 — Apply Defense-in-Depth, Zero Trust, and Secure-by-Default in Real Designs
Broadcast by