The 3 Types Of Security Controls (Expert Explains) (2024)

Security controls play a foundational role in shaping the actions cyber security professionals take to protect an organization.

There are three main types of IT security controls including technical, administrative, and physical. The primary goal for implementing a security control can be preventative, detective, corrective, compensatory, or act as a deterrent. Controls are also used to protect people as is the case with social engineering awareness training or policies.

The lack of security controls places the confidentiality, integrity, and availability of information at risk. These risks also extend to the safety of people and assets within an organization.

In this article, I’m going to explain what security control is and the differences between each type. Next, I’ll discuss the goals that each control is meant to achieve with examples along the way.

By the end, you’ll have a better understanding of the basic security controls in cyber security.

In this article you will learn more about:

  • What Is A Security Control?
  • What Are The Goals Of Security Controls?
  • Understanding The Basics Of Risk & Threats
  • Technical Controls
  • Administrative Controls
  • Physical Controls
  • Preventative Controls
  • Detective Controls
  • Corrective Controls
  • Deterrent Controls
  • Compensating Controls
  • Performing A Security Control Assessment

What Is A Security Control?

Security controls are countermeasures or safeguards used to reduce the chances that a threat will exploit a vulnerability.

For example, implementing company-wide security awareness training to minimize the risk of a social engineering attack on your network, people, and information systems.

The act of reducing risk is also called risk mitigation.

The 3 Types Of Security Controls (Expert Explains) (1)

While it’s next to impossible to prevent all threats, mitigation seeks to decrease the risk by reducing the chances that a threat will exploit a vulnerability.

Risk mitigation is achieved by implementing different types of security controls depending on:

  • The goal of the countermeasure or safeguard.
  • The level to which the risk needs to be minimized.
  • The severity of damage the threat can inflict.

The 3 Types Of Security Controls (Expert Explains) (2)

What Are The Goals Of Security Controls?

The overall purpose of implementing security controls as previously mentioned is to help reduce risks in an organization.

In other words, the primary goal of implementing security controls is to prevent or reduce the impact of a security incident.

The effective implementation of security control is based on its classification in relation to the security incident.

The common classifications types are listed below along with their corresponding description:

  • Preventive controls attempt to prevent an incident from occurring.
  • Detective controls attempt to detect incidents after they have occurred.
  • Corrective controls attempt to reverse the impact of an incident.
  • Deterrent controls attempt to discourage individuals from causing an incident.
  • Compensating controls are alternative controls used when a primary control is not feasible.

Implementing the controls listed is no trivial matter.

For example, an organization that places a high priority on reducing risk usually has a risk profile, which illustrates the potential cost of a negatively impacting risk and the human resources required to implement the control(s).

Layering Security Controls

Layering is an approach that combines multiple security controls to develop what’s called a defense-in-depth strategy.

Defense-in-depth is a common security strategy used whereby multiple layers of controls are implemented.

Recommended by LinkedIn

Cyber SecuritySolutions and Services Logic Finder 1 year ago
A CPA's Guide to Judging Corporate Cybersecurity Risk Hans Holmer 6 years ago
The 3 Types Of Security Controls (Expert Explains) (6)

By combining controls into multiple layers of security you ensure that if one layer fails to counteract a threat that other layers will help to prevent a breach in your systems.

Each layer of security works to counteract specific threats, which requires cyber security programs to invest in multiple technologies and processes to prevent systems or people from being compromised.

For example, Endpoint detection and response solutions are great at preventing viruses and malware from infecting computers and servers.

However, endpoint detection is not equipped to log and monitor traffic on a network like a SIEM, or detect and prevent an attack in real-time like an IPS.

Understanding The Basics Of Risks & Threats

Before we dive into control types, it’s important to first understand the cyber risks and threats they help to mitigate.

Risks

Risks in cyber security are the likelihood that a threat will exploit a vulnerability resulting in a loss. Losses could be information, financial, damage to reputation, and even harm customer trust.

Threats

Threats are any event with the potential to compromise the confidentiality, integrity, and availability (CIA) of information.

Threats come from outside an organization and from anywhere in the world connected to the internet. Insiders such as a disgruntled employee with too much access, or a malicious insider also pose a threat to businesses.

Note, insider threats are not always malicious. For example, an employee clicking on a phishing email that installs malware does not mean the employee intended to cause harm.

Finally, threats may also take the form of a natural disaster or be a manmade risk such as a new malware variant.

Vulnerabilities

Vulnerabilities are a weakness or flaw in the software, hardware, or organizational processes, which when compromised by a threat, can result in a security incident.

Security Incidents

Security incidents are an occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.

Now that we have a better understanding of basic risk concepts let’s explore how security controls are implemented.

Technical Security Controls

The 3 Types Of Security Controls (Expert Explains) (7)

At the most basic level, technical controls, also known as logic controls, use technology to reduce vulnerabilities in hardware and software. Automated software tools are installed and configured to protect these assets.

Examples of technical controls include:

  • Encryption
  • Antivirus And Anti-Malware Software
  • Firewalls
  • Security Information And Event Management (SIEM)
  • Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

We help enterprises with 360 cybersecurity services.

Follow PurpleSec for more vulnerability management and penetration testing content.

The 3 Types Of Security Controls (Expert Explains) (2024)

FAQs

The 3 Types Of Security Controls (Expert Explains)? ›

The common classifications types are listed below along with their corresponding description: Preventive controls attempt to prevent an incident from occurring. Detective controls attempt to detect incidents after they have occurred. Corrective controls attempt to reverse the impact of an incident.

What are the three 3 types of security controls? ›

Overview of security controls

The National Institute of Standards and Technology (NIST) defines three types of security controls: preventive, detective, and corrective. These controls form the foundation of a comprehensive security program plan that ensures compliance with security standards and requirements.

What are the three main categories of security explain? ›

The three types of security controls are management, operational, and physical. They work together to form a strong security program. Combining these controls is a good way to defend against threats. Doing regular reviews and updating your systems are key to keeping your protection up-to-date.

What are the three 3 aspects of security? ›

Confidentiality, Integrity, and Availability: The CIA Triad.

What are the 3 C's in security? ›

The 3 Cs of Enterprise Security: Communicate, Coordinate and Collaborate. As technology continues to evolve and become more interconnected, the line between cyber and physical security is increasingly blurred.

What is the 3 major division of security? ›

There are three major divisions of security – management, operational and physical. These divisions work hand-in-hand to protect any business from getting damaged by unauthorized external forces or individuals.

What is the 3 triad of security? ›

The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems.

What are the 3 categories to information security? ›

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

What are the three main types of control measures? ›

There are several types of control measures that fall into three main categories (in order of priority and effectiveness): Elimination. Engineering. Administrative.

What are the 3 P's of security? ›

The three Ps of protect, prioritize, and patch aren't meant to be siloed instructions that happen in subsequent order. In this new business environment, all three Ps must be continually active.

What are the 3 security standards? ›

The HIPAA Security Rule contains what are referred to as three required standards of implementation. Covered entities and BAs must comply with each of these. The Security Rule requires implementation of three types of safeguards: 1) administrative, 2) physical, and 3) technical.

What are the main three 3 objectives of security? ›

Included in this definition are three terms that are generally regarded as the high-level security objectives – integrity, availability, and confidentiality.

What are the three basic categories of controls? ›

Types of Controls
  • Preventive controls are proactive in that they attempt to deter or prevent undesirable events from occurring.
  • Corrective controls are put in place when errors or irregularities have been detected.
  • Detective controls provide evidence that an error or irregularity has occurred.

What are the three types of safety controls? ›

They are arranged from the most to least effective and include elimination, substitution, engineering controls, administrative controls and personal protective equipment.

What are the 3 security services for controlling access? ›

Access control defines a number of protection schemes that prevent unauthorized access to a computer, network, database, or other data resources. The concepts of AAA involve three security services: Authentication, Authorization and Accounting. These services provide the primary framework to control access.

Top Articles
How to level up fast in Coin Master
What is a discovery hearing? | MacGillivray Injury & Insurance Law
Dragon Age Inquisition War Table Operations and Missions Guide
It may surround a charged particle Crossword Clue
Cottonwood Vet Ottawa Ks
Tabc On The Fly Final Exam Answers
Ingles Weekly Ad Lilburn Ga
Fnv Turbo
Vanadium Conan Exiles
Flat Twist Near Me
Best Private Elementary Schools In Virginia
A.e.a.o.n.m.s
Where does insurance expense go in accounting?
Bowlero (BOWL) Earnings Date and Reports 2024
Peraton Sso
WEB.DE Apps zum mailen auf dem SmartPhone, für Ihren Browser und Computer.
10-Day Weather Forecast for Santa Cruz, CA - The Weather Channel | weather.com
Why Is 365 Market Troy Mi On My Bank Statement
Td Small Business Banking Login
The BEST Soft and Chewy Sugar Cookie Recipe
Talkstreamlive
Move Relearner Infinite Fusion
Finding Safety Data Sheets
The Boogeyman (Film, 2023) - MovieMeter.nl
Die 8 Rollen einer Führungskraft
Radical Red Ability Pill
Democrat And Chronicle Obituaries For This Week
Angel Haynes Dropbox
Little Einsteins Transcript
Dl.high Stakes Sweeps Download
Gncc Live Timing And Scoring
Helloid Worthington Login
Jeep Cherokee For Sale By Owner Craigslist
After Transmigrating, The Fat Wife Made A Comeback! Chapter 2209 – Chapter 2209: Love at First Sight - Novel Cool
Word Trip Level 359
Spy School Secrets - Canada's History
Hypixel Skyblock Dyes
Amici Pizza Los Alamitos
Metro By T Mobile Sign In
Pillowtalk Podcast Interview Turns Into 3Some
Chilangos Hillsborough Nj
Is Arnold Swansinger Married
Tillman Funeral Home Tallahassee
Pay Entergy Bill
Wayne State Academica Login
2132815089
2024-09-13 | Iveda Solutions, Inc. Announces Reverse Stock Split to be Effective September 17, 2024; Publicly Traded Warrant Adjustment | NDAQ:IVDA | Press Release
Grand Valley State University Library Hours
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Diccionario De Los Sueños Misabueso
Vcuapi
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 5908

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.