Technical controls.
Controls that are operated using systems. Firewalls, Antivirus.
Managerial controls.
Administrative controls associated with security design & implementation. Security polices & standard operating procedures (SOP).
Operational controls
Use people for these. Security guards, Awareness programs,
Physical controls
Limiting physical access. guard shack, fences, badge readers
Preventive controls
Block access to a resource. Firewall rules, follow security policy, guard shack checks identifications, door locks on.
Deterrent controls.
Gives someone trying to access a resource second though or trouble. Splash screens, threat of demotion, posted warning signs, front reception desk.
Detective control
Identifies and logs an intrusion attempt. May not prevent access. Reviews system logs, enable motion detectors, review login reports.
Corrective control
Applies after an event has occurred. Can sometimes reverse the effect of the event. Continue operating with minimal downtime. Correct the problem by restoring backups that can mitigate a ransomware infection, create policies for security issues, contact law enforcement or use a fire extinguisher.
Compensating control
Control using other means for security event. Can be use don temp basis to resolve. Prevent the exploitation of a weakness. Firewall blocks an application instead of patching it. implement separation of duties, require simultaneous guard duties, generator used after power outage.
Directive control type
Relatively weak control cause your directing someone toward security compliance. Store all sensitive files in a protected folder, create compliance policy and procedures, train users on correct policy, makes “authorized users only” sign.
how are security controls managed?
There are many categories of control some that some companies will combine. New control types are created. Each org will use different controls.