An enterprise recently experienced a targeted attack where an employee unknowingly installed malicious software via a phishing link. The malware bypassed endpoint antivirus and gained limited access to internal systems. The CISO wants to redesign controls to reduce the likelihood of this type of compromise in the future.
Which design principle BEST addresses this goal?
A. Security through obscurity
B. Defense in depth
C. Fail-safe defaults
D. Least common mechanism