Defense-in-depth

1. Also called the “Castle” approach. Multiple levels of logical and physical security measures that deny a single point of security failure in a system. Examples include the combined use of passwords, encryption, lock-and-key access, security seals, and logs.

Source: Election Terminology Glossary - Draft, National Institute of Standards and Technology (NIST), https://pages.nist.gov/ElectionGlossary/

2. Also called the “Castle” approach. Multiple levels of logical and physical security measures that deny a single point of security failure in a system. The use of passwords, encryption, lock-and-key access, security seals, and logs, represents a defense in-depth approach to securing voting and election systems.

Source: Information Technology Terminology, U.S. Election Assistance Commission, https://www.eac.gov/documents/2017/09/21/information-technology-terminology-security