In this blog, we discuss the defense in depth principle and its related information security practices.