This is a concept that refers to implementing layers of technical, organizational, and operational security controls, requiring breaches to penetrate several layers in sequence beginning at the border or perimeter of the network. Can be used in conjunction with an Assurance Framework's credential strength.

Source: http://identityaccessman.blogspot.com/2006/08/identity-dictionary.html