The application of multiple layers of protection wherein a subsequent layer will provide protection if a previous layer is breached is:
Defense-in-depth
Weakest link
Fail-safe
Control analysis