Controls implemented using some type of technical system
Technical
antivirus, firewalls, encryption, IDS
Administrative controls associated with security design and implementation
Managerial
security policies, standard operating procedures, risk assessments, training programs, incident response plans
Controls implemented by people instead of systems
Operational
security guards, awareness programs, backup procedures, account reviews, password reset policy
Controls that limit physical access to buildings, rooms and devices
Physical
cameras, badge readers, fences, security guards, locks
Proactive measures implemented to thwart potential security threats or breaches
fortify
Preventative
aim to fortify systems before an incident occurs
Discourage attackers by making the effort seem less appealing or more challenging
deter
Deterrent
aim to deter attackers from attacking your systems
Monitor and alert to malicious activities as they occur or shortly thereafter
watch
Detective
aim to detect and notify
Mitigate any potential damage and restore systems to their normal state
correct
Corrective
aim to apply a control after an event has been detected
Alternative measures that are implemented when primary security controls are not feasible or effective
alternate
Compensating
aim to ensure protection is in tack even if ideal controls are not
Direct someone to do something more secure rather than less secure
direct
Directive
aim to guide, inform or mandate actions
Control Type Example:
Preventative
Control Type Example:
Deterrent
Control Type Example:
Detective
Control Type Example:
Corrective
Control Type Example:
Compensating
Control Type Example:
Directive