ABSTRACT
Diversity in information security is a practice that can greatly improve the security of an organization’s
information assets. Using different techniques and controls can multiply the effectiveness of security
controls in an increasingly diverse risk environment. Using overlapping controls can also provide
redundancy that is important if a control should fail. Information technology security controls and
response processes address different areas within an environment. These include network controls,
operating system controls, and application level controls, as well as monitoring and responses to security
events. Attention must also be paid to the coverage of the different controls, as the failure to provide
protection for one piece of the application or service may lead to compromise of other areas. Providing
adequate protection for all the pieces of an application will ensure its proper functioning and reduce the
risk of its being compromised. It is also possible for one control to provide overlapping protection for
other areas. Maximizing the overlapping protection and providing diversity within each one of these
controls and processes are important to minimizing the risk of a security failure with regard to the
information or services being protected. In addition, response and monitoring processes must also be
able to address incidents and provide solutions in a timely manner. These controls and processes can also
take advantage of diversity to reduce the risk of a single point of failure. Together, these controls and
processes work to provide confidentiality, integrity, and availability of the information or service
being secured.