Episode 8 — Design defensible security architecture by mapping threats to layered controls

This episode focuses on making architecture choices defensible under audit and incident pressure, which GSOM tests by asking you to pick controls that reduce risk without relying on a single point of failure. You’ll define layered defense as coverage across prevention, detection, response, and recovery, and then practice mapping threats to control types such as segmentation, identity hardening, endpoint controls, logging, and safe administrative pathways. We’ll use scenarios to show how architecture affects SOC outcomes: a flat network increases containment cost, weak key management undermines encryption claims, and missing centralized logging turns investigations into guesswork. You’ll also cover best practices for trust boundaries, least privilege, and secure management planes, plus troubleshooting considerations like exception sprawl and “shadow” paths that bypass intended controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 8 — Design defensible security architecture by mapping threats to layered controls
Broadcast by