Best practice guidance, regulations and compliance documentation all provide critical input into the process, but to achieve adequate security in depth???a single layer is not usually enough???means you have to assess the specifics relating to items such as your geography, communications infrastructure, employee policies and control, technical architecture, protocol support, physical access, train