Security controls play a foundational function in shaping the actions cyber defense professionals take to protect an organization.

You are watching: Which is an example of a technical control

There are three major kinds of IT protection controls consisting of technical, bureaucratic, and also physical. The main goal for implementing a security control deserve to be preventative, detective, corrective, compensatory, or act as a deterrent. Controls are also offered to safeguard human being as is the case with social engineering awareness training or plans.

The lack of defense controls area the confidentiality, integrity, and also availcapability of information at threat. These threats additionally extfinish to the security of civilization and also assets within an organization.

In this write-up, I’m going to describe what a protection control is and also the differences between each kind. Next off, I’ll discuss the objectives that each control is expected to achieve via examples alengthy the way.

By the finish, you’ll have actually a better understanding of the fundamental security controls in cyber protection.

Message Navigation

What Is A Security Control?

Security controls are counteractions or safeguards provided to reduce the opportunities that a danger will make use of a vulnerability.

For example, implementing company-wide defense awareness training to minimize the hazard of a social engineering assault on your netoccupational, people, and indevelopment systems.

The act of reducing risk is also dubbed danger mitigation.

Read More: How To Develop & Implement A Network Security Plan


While it’s alongside difficult to prevent all hazards, mitigation seeks to decrease the risk by reducing the chances that a hazard will manipulate a vulnercapability.

Risk mitigation is achieved by implementing various kinds of security controls depfinishing on:

The goal of the countermeasure or safeguard.The level to which the hazard demands to be minimized.The severity of damage the danger deserve to inflict.


What Are The Goals Of Security Controls?

The all at once objective of implementing defense controls as aforementioned is to aid reduce risks in an company.

In other words, the primary goal of implementing defense controls is to proccasion or alleviate the affect of a protection event.

The effective implementation of a protection regulate is based on its classification in relation to the protection incident.

The prevalent classifications forms are provided below in addition to their corresponding description:

Preventive controls attempt to prevent an occurrence from developing.Detective controls attempt to detect incidents after they have emerged.Corrective controls attempt to reverse the impact of an incident.Deterrent controls attempt to discourage individuals from leading to an occurrence.Compensating controls are alternate controls offered once a main manage is not feasible.

Implementing the controls provided is no trivial matter.

For example, an organization that locations a high priority on reducing danger commonly has a hazard profile, which illustrates the potential cost of a negatively impacting risk and also the huguy sources required to implement the control(s).

Layering Security Controls

Layering is a technique that combines multiple defense controls to develop what’s called a defense-comprehensive strategy.

Defense-in-depth is a common strategy provided in cyber defense by which multiple layers of controls are enforced.


By combining controls into multiple layers of protection you ensure that if one layer falls short to counteract a hazard that other layers will assist to proccasion a breach in your systems.

Each layer of security functions to counteract specific dangers, which requires cyber protection programs to invest in multiple technologies and also procedures to proccasion systems or civilization from being compromised.

For instance, Endpoint detection and also response remedies are great at staying clear of viroffers and malware from infecting computer systems and also servers.

However before, endpoint detection is not equipped to log and monitor website traffic on a netjob-related prefer a SIEM, or detect and proccasion an assault in real-time like an IPS.

Understanding The Basics Of Risks & Threats

Before we dive into regulate kinds, it’s essential to initially understand also the cyber dangers and threats they help to alleviate.


Risks in cyber defense are the likelihood that a threat will certainly make use of a vulnercapability leading to a loss. Losses could be information, financial, damage to reputation, and also even injury customer trust.


Threats are any occasion through the potential to damage the confidentiality, integrity, and also availcapacity (CIA) of information.

Threats come from external an organization and from all over in the human being associated to the internet. Insiders such as a disgruntled employee through as well a lot accessibility, or a malicious insider also pose a risk to businesses.

Note, insider dangers are not always malicious. For example, an employee clicking on a phishing email that installs malware does not mean the employee intended to cause injury.

Finally, dangers might additionally take the develop of a herbal disaster or be a manmade hazard such as a brand-new malware variant.


Vulnerabilities are a weakness or flaw in the software application, hardware, or organizational procedures, which once compromised by a hazard, deserve to result in a security incident.

Security Incidents

Security occurrences are an occurrence that actually or perhaps jeopardizes the confidentiality, integrity, or availcapability of an indevelopment mechanism or the indevelopment the mechanism procedures, stores, or transmits or that constitutes a violation or impending danger of violation of defense plans, security measures, or acceptable use policies.

Now that we have actually a far better expertise of fundamental threat ideas let’s check out just how security controls are implemented.

Technical Security Controls

At the the majority of standard level, technological controls, also recognized as logic controls, usage technology to alleviate vulnerabilities in hardware and software. Automated software application tools are installed and configured to defend these assets.

Instances of technological controls include:

EncryptionAntivirus And Anti-Malware SoftwareFirewalls

Technical Control Types And Implementation Methods

Below are 2 prevalent examples of technological control types:

Configuration Rules – Instructional codes that overview the execution of the device as soon as information is passing via it. Netoccupational equipment sellers have proprietary configuration rules that control the operation of their ACL objects.

Administrative Security Controls


Administrative defense controls refer to policies, procedures, or guidelines that specify personnel or business practices in accordance with the organization’s defense objectives.

Many kind of institutions now implement some type of onboarding procedure to present you to the firm and also administer you with a history of the company.

During the onboarding process, you may be instructed to evaluation and also acexpertise the security policy of the organization.

By acknowledging that you have review the policies of the company as a brand-new hire, you are then accountable to adbelow to the corpoprice policy of the company.

In order to implement the bureaucratic controls, extra protection controls are important for continuous security and enforcement.

The procedures that monitor and enforce the governmental controls are:

Management controls: The security controls that emphasis on the monitoring of threat and the administration of information device protection.Operational controls: The security controls that are generally applied and executed by world (as opposed to systems).

For example, a protection plan is a monitoring control, however its defense needs are applied by world (operational controls) and also units (technical controls).

An organization may have an acceptable usage policy that mentions the conduct of individuals, including not visiting malicious websites. The security manage to monitor and enforce might be in the develop of a internet content filter, which deserve to enpressure the plan and also log all at once.

The remediation of a phishing strike is another example that employs a combination of management and also operation controls.

Security controls to aid thwart phishing, besides the monitoring regulate of the acceptable usage plan itself, incorporate operational controls, such as training users not to loss for phishing scams, and technical controls that monitor emails and also internet site usage for indications of phishing task.

Physical Security Controls


Physical controls are the implementation of defense measures in a defined framework used to deter or proccasion unauthorized access to sensitive product.

Examples of physical controls are:

Closed-circuit security camerasMotion or thermal alarm systemsSecurity guardsPicture IDsLocked and dead-bolted steel doorsBiometrics (consists of fingerprint, voice, challenge, iris, handcomposing, and various other automated methods used to acknowledge individuals)

Preventative Controls

Examples of preventative controls include:

HardeningSecurity Awareness TrainingSecurity GuardsChange ManagementAccount Disablement Policy


Is the procedure of reducing protection exposure and tightening protection controls.

Security Awareness Training

The process of providing formal cybersecurity education and learning to your workpressure about a variety of information security dangers and also your company’s policies and also procedures for addressing them.

Security Guards

A perchild employed by a public or personal party to protect an organization’s assets. Security guards are commonly positioned as the first line of defense for businesses versus external dangers, intrusion and vulnerabilities to the home and also its dwellers.

Change Management

The approaches and manners in which a firm describes and also implements readjust within both its interior and also external processes. This has preparing and sustaining employees, creating the crucial actions for change, and monitoring pre- and post-change tasks to ensure successful implementation.

Account Disablement Policy

A plan that defines what to perform through user access accounts for employees that leave voluntarily, immediate terminations, or on a leave of absence.

Detective Controls

Examples of detective controls include:

Log MonitoringSIEMTrend AnalysisSecurity AuditsVideo SurvillanceMotion Detection

Log Monitoring

Log surveillance is a diagnostic strategy used to analyze real-time events or stored data to encertain application availcapacity and also to access the influence of the change in state of an application’s performance.


Security Information and also Event Management (SIEM) is a collection of tools and also solutions offering a holistic watch of an organization’s indevelopment security by of operational logs from miscellaneous devices.


Trfinish Analysis

The exercise of gathering indevelopment and also attempting to determine a pattern in the information gathered from an application’s log output. The output of the trfinish evaluation is typically in a graph or table create.

Security Audit

A measurement that concentrates on cyber defense criteria, guidelines, and also procedures; as well as the implementation of these controls. The security audit is commonly conducted by trained third party entities, or by interior resources in preparation for an outside audit.

Video Surveillance

A system that is qualified of recording digital imperiods and also videos that deserve to be compressed, stored or sent over interaction networks for onwebsite or remote security.

Motion Detection

A tool that utilizes a sensor to detect nearby movement. Such a maker is frequently included as a component of a monitoring system that instantly perdevelops a job or alerts a monitoring analyst of detected movement.

Corrective Controls

Examples of corrective controls include:

IPSBackups And System Recovery


A network protection modern technology that monitors netoccupational web traffic to detect anomalies in web traffic flow. IPS defense devices intercept netoccupational web traffic and also deserve to conveniently prevent malicious task by dropping packets or reestablishing relationships.


Backups and System Recovery

Backups and system recoextremely is the process of creating and storing duplicates of data that have the right to be provided to defend establishments against data loss.

Deterrent Controls

Deterrent controls minimize the likelihood of a delibeprice attack and is generally in the create of a tangible object or perchild.

Example of deterrent controls include:

Cable LocksHardware LocksVideo security & guards

What’s The Difference Between Preventative And Detective Controls?

A preventative regulate is designed to be enforced before a hazard event and minimize and/or prevent the likelihood and potential impact of a effective danger event.

A detective manage is designed to detect errors and situate attacks against indevelopment systems that have already occurred.

The regimen analysis of the detective control output provides input to further improve the preventative control. The goal of continuous evaluation is to proccasion errors and also irregularities from emerging in the initially area.

Compensating Controls

An different strategy that is put in place to meet the necessity for a security measure that cannot be readily implemented due to financial, framework, or simply imhelpful to implement at the current time.

The compensating control have to satisfy the adhering to criteria:

Meet the intent of the original regulate requirementProvide a similar level of assurance

Examples of compensating controls include:

Time-based One Time-Password (TOTP) – A momentary passcode produced by an algorithm that provides the existing time of day as one of its authentication factors. Providing a new hire via a TOTP till authentication is fully yielded is an example of a compensating manage.Encryption – Database protection applications, e-mail encryption and also various other devices. An company cannot encrypt all digital information in a PCI assessment. To compensate, they may use other existing devices to implement encryption.

Performing A Security Control Assessment

A Security Control Assessment is a crucial component to measure the state and performance of an organization’s security controls.

Keep in mind the complying with meaning of the Security Control Assessment:

The testing and/or testimonial of the monitoring, operational, and also technological defense controls in an indevelopment mechanism to identify the degree to which the controls are implemented appropriately, operating as intended, and also developing the desired outcome with respect to meeting the security needs for the device.

Testing of protection controls is a vital component of the all at once governance of an organization’s Information Security Management System.

Depending upon the organization form, regulatory demands manday regular and consistent assessments, whereas, non-public establishments are not hosted to regulatory needs.

Today, it is not just finest practice to monitor defense controls, but a essential requirement in order to store systems secure and also free from targain practice of hackers, looking to pass through any type of network that has weak defense at the perimeter and also internally.

Usual Security Assessments

Instances of defense assessments include:

Risk AssessmentVulnerability AssessmentPenetration Testing

Risk Assessments

A danger assessment entails many type of actions and also forms the backbamong your all at once danger management arrangement.

Risk assessments are important bereason they are used to recognize assets or areas that present the highest possible risk, vulnercapability, or exposure to the enterprise. It then identifies the threats that could affect those assets.


Vulnercapability Assessments

A vulnercapacity assessment describes the process of identifying dangers and also vulnerabilities in computer system netfunctions, systems, hardware, applications, and also other parts of the IT ecodevice.

Vulnerability assessments are a vital component of the vulnerability administration and IT threat administration lifecycles, helping defend devices and also information from unauthorized access and also information breaches.

Vulnercapability assessments frequently leverage tools like vulnercapability scanners to identify hazards and flegislations within an organization’s IT framework that represents potential vulnerabilities or threat exposures.


Penetration Testing

Penetration experimentation is a technique for testing a web application, netoccupational, or computer device to identify defense vulnerabilities that might be exploited.

The main objective for protection as a whole is to proccasion unauthorized parties from accessing, altering, or exploiting a network or device. It intends to perform what a bad actor would carry out.

The main factor penetration tests are crucial to an organization’s defense is that they help personnel learn exactly how to take care of any kind of form of break-in from a malicious entity.

Pen tests serve as a means to research whether an organization’s protection policies are genuinely effective. They serve as a form of fire drill for establishments.

Penetration tests have the right to also provide services that will certainly help institutions to not only proccasion and detect attackers yet likewise to expel such an intruder from their system in an reliable method.


In this article, we have examined the three standard defense controls – technological, bureaucratic, and also physical.

A review of miscellaneous instrumental sub controls was additionally reregarded – deterrent, corrective, and compensating.

Although it is vital for protection experts to understand also the definition of the controls, they must also recognize that the ultimate goal of implementing the controls is to strengthen their organization’s defenses in order to reduce risk.

Indevelopment protection should be treated as a routine which needs constant security in order to safeguard and defend its most handy assets.

See more: ️ Why Is It Important For Element Ids To Have Meaningful Names?

Reprimary vigilant by incorporating the controls provided in this short article, and you will be equipped to assistance and also contribute to the success of your organization’s risk administration regime.