Security Controls in IT Security

Jul 19, 2024

Security Controls in IT Security

Introduction

  • IT security involves preparing for various security risks.
  • Attackers seek different ways to access systems.
  • We protect data and physical systems, buildings, people, and organizational assets.
  • Security controls can prevent events, minimize impact, or limit damage when breaches occur.

Categories of Security Controls

1. Technical Controls

  • Implemented using technical systems.
  • Example: Operating system policies and procedures, firewalls, antivirus software.

2. Managerial Controls

  • Policies and procedures created by management.
  • Example: Security policy documentation, standard operating procedures.

3. Operational Controls

  • Implemented by people to maintain security.
  • Example: Security guards, awareness programs, lunch and learns.

4. Physical Controls

  • Limit physical access to buildings, rooms, or devices.
  • Example: Guard shacks, fences, locks, badge readers.

Control Types and Categories

1. Preventive Controls

  • Limit access to resources.
  • Examples:
    • Firewall rules β†’ Technical
    • Onboarding policies β†’ Managerial
    • Guard shack ID checks β†’ Operational
    • Door locks β†’ Physical

2. Deterrent Controls

  • Discourage or deter attacks.
  • Examples:
    • Splash screens β†’ Technical
    • Demotion threats β†’ Managerial
    • Reception desk β†’ Operational
    • Warning signs β†’ Physical

3. Detective Controls

  • Identify and warn about breaches.
  • Examples:
    • System logs review β†’ Technical
    • Reviewing login reports β†’ Managerial
    • Property patrols β†’ Operational
    • Motion detectors β†’ Physical

4. Corrective Controls

  • Occur after an event; minimize impact or allow continued operation.
  • Examples:
    • Data recovery from backups β†’ Technical
    • Policies for incident reporting β†’ Managerial
    • Contacting authorities β†’ Operational
    • Fire extinguishers β†’ Physical

5. Compensating Controls

  • Temporary measures when full resolution isn’t possible.
  • Examples:
    • Firewall rules to block vulnerability exploits β†’ Technical
    • Separation of duties β†’ Managerial
    • Multiple security guards β†’ Operational
    • Power generators β†’ Physical

6. Directive Controls

  • Direct actions for security (weaker control).
  • Examples:
    • Storing sensitive info in encrypted folders β†’ Technical
    • Compliance policy β†’ Managerial
    • Security policy training β†’ Operational
    • Authorized personnel only signs β†’ Physical

Summary

  • Various security controls and categories.
  • Examples illustrate fitting controls into categories.
  • Different organizations may use different controls.