Depth of Security

Concentric perimeters of security having different or increasingly stringent access methods. An inner area is protected both by its own access methods and by those of the areas that enclose it and must therefore be entered first