Beyond Perimeter Defense: Defense-in- Depth Leveraging Upstream Security