Security Controls

Security controls help prevent security events, minimize the impact, and limit the damage. They serve as essential components of organization’s defense strategy to protect assets, data, and systems from potential threats. Many security controls can fall into multiple categories.

Control Categories

Technical Controls

Controls implemented through technological systems. Examples of these controls include firewalls, anti-virus, intrusion detection and prevention systems, and backup recovery tools.

Managerial Controls

Controls focused on the implementation of security policies, procedures, and guidelines. Examples of these controls include incident response plans, business continuity plans, acceptable use policy, and data classification policies.

Operational Controls

Controls implemented by people to be used for the operation of the company. Examples of these controls include cybersecurity awareness programs, a reception desk, security policy training, and backup management.

Physical Controls

Controls that are physical. Examples include door locks, warning signs, fences, badge readers, and guard shacks.

Control Types

Preventive

Control types that block access to a resource and prevent access. Examples include firewall rules, enabling door locks, a guard shack checking all identification, and following security policies.

Deterrent

Control types that discourage an intrusion attempt but do not necessarily directly prevent access. Examples include warning signs, a reception or assistant desk, or an application splash screen.

Detective

Control types that identify intrusions and logs the event. Examples include log files, login reports, and motion detectors.

Corrective

Control types that seek to correct a problem and the control is applied after an event has occurred. Examples include restoring backups after a ransomware incident, adding a fire extinguisher if a fire broke out, creating security policies if an incident occurs, and contacting law enforcement.

Compensating

Control types that are implemented if primary controls cannot be fully applied due to constraints. Examples include a block of an application if a patch of the application cannot be applied, implement a separation of duties, and a generator used after a power outage.

Directive

Control types that provide guidance and establish rules for an organization’s security efforts and compliance. Examples include compliance policies, security awareness policies, file storage polices, and data storage policies.

Leave a Reply

Your email address will not be published. Required fields are marked *