Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)