Objective 1.1 Flashcards
Compare and contrast various types of security controls (41 cards)
Security Controls Categories
- Technical Controls
- Managerial Controls
- Operational Controls
- Physical Controls
TMOP
- Technical Controls
- Managerial Controls
- Operational Controls
- Physical Controls
The technologies, hardware and software mechanisms that are implemented to manage and reduce risks.
Technical Controls
Examples of technical controls
- Antivirus
- Firewalls
- Encryption Processes
- Intrusion Detection Systems (IDS like SNORT)
Involve the strategic planning and governance side of security.
Is about making informed decisions and ensure that the organization is on the same security page.
Managerial Controls
Example of Managerial Control
- Conduct a risk assesment to understand the potential risks and vulnerabilities and assess if a tool implementation or a new network archtecture will align with the company’s broader risk strategy.
Managerial Contols encompass:
- Risk Assessment
- Security Policies
- Training Programs
- Incident Response Strategies
[Managerial Contols]
RiskAss
SecPo
TaingPo
IncResp
- Risk Assessment
- Security Policies
- Training Programs
- Incident Response Strategies
Procedures and measures that are designed to protect data on a day-to-day basis and are mainly governed by internal processes and human actions.
Operational Controls
Examples of Operational Controls:
- Organization requires that you change your password every 90 days.
- Backup Procedures
- Account Reviews
- User Training Programs
Tangible, real-world measures taken to protect assets.
Physical Controls
Example of physical controls:
- Shredding of sensitive documents
- Security guards
- Locking the doors
- Cameras
Security Control Types
- Preventive Controls
- Deterrent Controls
- Detective Controls
- Corrective Controls
- Compensating Controls
- Directive Controls
Proactive mesaures implemented to thwart potential security threats or breaches
Preventive Controls
Aim to discourage potential attackers by making the effort seem less appealing or more challenging.
Deterrent Controls
Monitor and alert organizations to malicious activities as they occur or shortly thereafter.
Detective Controls
Mitigate any potential damage and restore the systems to their normal state.
Corrective Controls
Alternative measures that area implemented when primary security controls are not feasible or effective.
Compensating Control
Often rooted in policy or documentation and set the standards for behavior within an organization.
Directive Controls
Is a cybersecurity approach that assumes no user or system is trusted by default and requires continuous verification for access to organizational resources.
Zero Trust
Demands verification for every device, user, and transaction within the network, regardless of its origin.
Zero Trust
Zero Trust Planes
Control Plane
Data Plane
[Zero Trust] The overarching framework and set of components responsible for defining, managing, and enforcing the policies related to user and system access within an organization.
Control Plane
[Zero Trust-CoP] Control Plane encompass…
- Adaptative Identity
- Threat Scope Reduction
- Policy-driven Access Control
- Secured Zones