Module 5 - Security Control Flashcards
Security Controls
Security controls are safeguards or countermeasures that an organisation implements to avoid, detect, counteract or minimize security risks to organizational assets.
Administrative Controls
Administrative controls consist of procedures and policies that an organisation puts into place when dealing with sensitive information. These controls determine how people act.
Technical controls
Technical controls involve hardware and/or software implemented to manage risk and provide protection.
Physical Controls
Physical controls are mechanisms such as fences and locks deployed to protect systems, facilities, personnel and resources. Physical controls physically separate people or other threats from systems.
Functional Security Controls
- Preventative controls
- Deterrent controls
- detective controls
- corrective controls
- recovery controls
- Compensative controls
Preventive controls
Preventive security controls stop unwanted and unauthorized activity from happening and/or apply restrictions for authorized users.
Deterrent controls
A deterrent aims to discourage something from happening. Cybersecurity professionals and organizations use deterrents to limit or mitigate an action or behavior — but deterrents cannot stop them completely.
Detective Controls
Access control detection identifies different types of unauthorized activity. Detective controls are not a preventive measure and instead focus on the discovery of a security breach after it has occurred.
Corrective controls
Corrective controls counteract something undesirable by restoring the system back to a state of confidentiality, integrity and availability. They can also restore systems to normal after unauthorized activity occurs.
Recovery controls
Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy. Recovery controls can repair damage, in addition to stopping any further damage. These controls have more advanced capabilities over corrective access controls.