Security Control Types¶
Security controls are implemented to address specific threats and vulnerabilities within an organization. There are six basic types of security controls, each serving a different function:
- Preventative Controls
- Deterrent Controls
- Detective Controls
- Corrective Controls
- Compensating Controls
- Directive Controls
6 Control Types¶
-
Preventative Controls
- Definition: Proactive measures designed to prevent potential security threats or breaches before they happen.
- Purpose: Fortify systems to stop incidents from occurring.
- Examples:
- Firewalls (block harmful data packets before they penetrate the network)
- Antivirus software (prevents malware infections)
- Access control mechanisms
- Function: Prevent security incidents before they can impact the system.
-
Deterrent Controls
- Definition: Controls aimed at discouraging potential attackers by making threats seem less appealing or more challenging.
- Purpose: Deter attackers from attempting to compromise systems.
- Examples:
- Warning signs (e.g. "Surveillance cameras in use" outside a property)
- Monitoring banners (on websites or networks to indicate surveillance)
- Visible security systems (e.g. alarm systems, security guards)
- Function: Make the effort of attacking appear more risky or not worth it.
-
Detective Controls
- Definition: Controls that monitor and alert organizations to malicious activities as they occur or shortly thereafter.
- Purpose: Detect and notify organizations of incidents in real-time.
- Examples:
- Security cameras (monitor and record activities)
- Intrusion Detection Systems (IDS) (monitor network traffic for unusual behavior)
- Log monitoring tools (track suspicious user activity)
- Function: Detect and notify of security breaches or suspicious activities.
-
Corrective Controls
- Definition: Controls that respond to security incidents after detection, aiming to mitigate damage and restore systems to normal.
- Purpose: Recover and restore systems after an attack.
- Examples:
- Antivirus software (detects and removes malware)
- Incident response actions (e.g. isolating affected systems, restoring backups)
- System reconfigurations after a breach
- Function: Mitigate damage and return systems to a secure state.
-
Compensating Controls
- Definition: Alternative measures implemented when primary controls are not feasible or effective.
- Purpose: Provide continued protection when ideal controls cannot be used.
- Examples:
- Using WPA2 encryption with a VPN on legacy systems instead of WPA3 encryption.
- Extra layers of security (e.g. implementing additional monitoring tools when a primary control fails)
- Function: Offer backup protections when the best solution isn't available.
-
Directive Controls
- Definition: Controls that guide, inform, or mandate specific actions or behaviors.
- Purpose: Set policies and guidelines to ensure proper security conduct within the organization.
- Examples:
- Acceptable Use Policy (AUP) (sets guidelines for how employees can use IT assets)
- Security policies and procedures (define security protocols)
- Training and awareness programs (inform users of best practices)
- Function: Provide direction on behavior and security procedures to ensure consistency and compliance.