Skip to main content

The Solution

Defence in Depth is an essential cybersecurity strategy for organisations of all sizes.

Assume that a cybercriminal can enter your network. What is in place to limit them and keep the risk contained?

Defence in Depth ensures that security is applied at all levels. This is an extension of the asset management discussion in a previous Snapshot.

Best practices for Defence in Depth that prevent cybercriminals from doing much damage:

  • Utilise endpoint detection and response (EDR)
  • Install security patches rapidly
  • Reduce the number and usage scope of domain admin accounts
  • Limit users’ permissions and access 
  • Harden security configurations of systems, applications and cloud resources
  • Segment your network using strict filtering rules 
  • Implement secure backup solutions that prevent users from altering or deleting backups 
  • Have a documented and properly tested disaster recovery plan


The information set forth in this document is intended as general risk management information. It is made available with the understanding that Beazley does not render legal services or advice. It should not be construed or relied upon as legal advice and is not intended as a substitute for consultation with counsel. Beazley has not examined and/ or had access to any particular circumstances, needs, contracts and/or operations of any party having access to this document. There may be specific issues under applicable law, or related to the particular circumstances of your contracts or operations, for which you may wish the assistance of counsel. Although reasonable care has been taken in preparing the information set forth in this document, Beazley accepts no responsibility for any errors it may contain or for any losses allegedly attributable to this information.