The 7 defense-in-depth layers (data at the center)Each layer protects a different part of the stack. Physical security. Identity and access. Perimeter. Network. Compute. Application. Data.