5.1 Types of Controls Flashcards
A safeguard or countermeasure prescribed for an information system or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.
• Security risks are out there
– Many different types to consider
• Assets are also varied
– Data, physical property, computer systems
• Prevent security events, minimize the impact,
and limit the damage
– Security controls
Security controls
Control category-
- security controls that refer to policies, procedures, or guidelines that define personnel or business practices in accordance with the organization’s security goals.
– Controls that address security design and implementation
– Security policies, standard operating procedures
Managerial controls
Control category -
- The security controls that are primarily implemented and executed by people (as opposed to systems).
– Controls that are implemented by people
– Security guards, awareness programs
Operational controls
Control category- - also known as logic controls, use technology to reduce vulnerabilities in hardware and software. Automated software tools are installed and configured to protect these assets. – Controls implemented using systems – Operating system controls – Firewalls, anti-virus
Examples of technical controls include:
- Encryption
- Antivirus And Anti-Malware Software
- Firewalls
- Security Information And Event Management (SIEM)
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
Technical controls
Control type - - controls that are designed to be implemented prior to a threat event and reduce and/or avoid the likelihood and potential impact of a successful threat event. Examples include policies, standards, processes, procedures, encryption, firewalls, and physical barriers. – Physically control access – Door lock – Security guard – Firewall
Preventive
Control type -
– controls that provide visibility into malicious activity, breaches and attacks on an organization’s IT environment.
– controls that are designed to detect errors or irregularities that may have occurred. These controls include logging of events and the associated monitoring and alerting that facilitate effective IT management.
– May not prevent access
– Identifies and records any intrusion attempt
– Motion detector, IDS/IPS
Detective
Control type -
– controls are designed to correct errors or irregularities that have been detected; Include technical, physical, and administrative measures that are implemented to restore the systems or resources to their previous state after a security incident or an unauthorized activity.
– Designed to mitigate damage
– IPS can block an attacker
– Backups can mitigate a ransomware infection
– A backup site can provide options when a storm hits
Corrective
Control type -
- controls that attempt to discourage individuals from causing an incident.
- reduce the likelihood of a deliberate attack and is usually in the form of a tangible object or person. Example of deterrent controls include: Cable Locks, Hardware Locks, Video surveillance & guards
– May not directly prevent access
– Discourages an intrusion attempt
– Warning signs, login banner
Deterrent
Control type -
- also called an alternative control, is a management, operational, and/or technical control (i.e., safeguard or countermeasure) employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines that provides equivalent or comparable protection for an information system.
- This control should meet the following criteria:
- Meet the intent of the original control requirement
- Provide a similar level of assurance
– Doesn’t prevent an attack – Restores using other means – Re-image or restore from backup – Hot site – Backup power system
Compensating
Control type -
– the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of these controls are: Closed-circuit surveillance cameras. Motion or thermal alarm systems. Security guards.
– Fences, locks, mantraps
– Real-world security
Physical