Which of the following is a fundamental principle of defense-in-depth architecture as it applies to Certified Cybersecurity Professional?