There are five surfaces:
- Perimeter layer
- Network layer
- Endpoint layer
- Application layer
- Data layer
The perimeter layer involves authentication systems that validate user access.
The network layer is made up of technologies like network firewalls and others.
The endpoint layer comprises devices on a network, like laptops, desktops, or servers.
The application layer is software.
The data layer is information, whether stored, in transit, or in use.