IT Examiner School - Oct 2025

Internal Use Only

13

Information Security Principles: Controls

Preventative Controls:

• Designed to stop an incident before it happens • Example: MFA, employee training, access controls

•Policies, procedures, training, risk assessments •Example: Acceptable Use Policy, Incident Response Plan.

Administrative Controls :

Detective Controls: Corrective Controls:

• Designed to identify or alert to incidents in progress or after they occur • Example: IDS/IPS, audit logs, security cameras

• Designed to restore systems or limit damage after an incident • Example: Backup restoration, patching, incident response plans • Designed to discourage or prevent malicious activity by increasing the perception of consequences for violation of policies. • Login Banners, Disciplinary action. •Designed to mitigate risk when a primary or required control is not feasible or practical , ensuring the control objective is still met. •Increased monitoring when MFA is not implemented, Short password expiration when password complexity isn’t supported.

• Technology-based safeguards • Example: Firewalls, antivirus software, MFA, encryption

Technical Controls:

Deterrent

•Protect physical access to systems and infrastructure •Example: Locked doors, security guards, surveillance cameras

Physical Controls:

Compensating

Internal Use Only

CIA Control Table - Confidentiality

Preventative

Detective

Corrective

• Security Policy • Security Awareness Training • HR/Employee Policy • Access Control Lists • Data Classification and Labeling • Access Control User Review • Guards • Fences • Mantraps • Locks • Paper Shredder • Physical Security Cameras • Authentication with Complex Passwords • Biometrics • Multi-Factor Authentication • Encryption

• Security Officer Description/Duties • Log Reviews • Automatic Notification Systems • Audits • Security Reviews

• Data Loss Prevention Solution • Encryption for Data at Rest • Encryption for Data in Transit • Incident Response Policy (Evidence Retention/Forensics)

Administrative

• Premises Alarm Systems • Motion Detector • Fences • Mantraps • Security Guards

• Log Security and Retention • Access Control by Zones • Badges/Proximity Cards

Physical

• Intrusion Detection Systems (IDS) • Intrusion Prevention System (IPS) • Security Event Management (SEIM)

• Countermeasures • Log Forensics • Reboot/Restart • Patch Deployment

Technical

Made with FlippingBook Learn more on our blog