Any effective IT security program for companies must be based on certain basic principles. These safety principles have proven themselves over decades. These include in-depth defense, least privileged access, role segregation, and secure outage. One of the most important basic principles of IT security is securing the weakest link.
A company’s IT security infrastructure is not a monolith. It is made up of several parts that must work together to minimize the chance of harming a company’s defenses. These different parts have different degrees of complexity and different vulnerabilities. You can see these different parts as a chain that is “only as strong as the weakest link”.
The attraction of the weakest link
To better understand the weakest link principle, let’s consider a hypothetical scenario. Imagine you have been hired to move a valuable art collection from a rundown remote warehouse to a highly secure bank …