While the defense-in-depth strategy sounds good, it is hard to implement. No engineering methodology for designing a syste to execute this strategy exists today. Moreover, as the capabilities of attackers increase, deployed security architectures must be reevaluated to determine whether they remain effective.