5. The number and types of layers needed for defense in depth are a function of:
a. Asset value, criticality, reliability of each control and degree of exposure.
b. Threat agents, governance, compliance and mobile device policy.
c. Network configuration, navigation controls, user interface and VPN traffic.
d. Isolation, segmentation, internal controls and external controls.