Cyber Security controls types and functions
In the ever-evolving landscape of information security, it's crucial to have a comprehensive understanding of the various security controls and the broader framework in which they operate. This article aims to shed light on the five essential security controls and the concept of Sphere of Use and Sphere of Protection, which are paramount in safeguarding sensitive data and systems.
1. Directive Controls - Setting the Rules
Directive controls, often in the form of policies and guidelines, serve as the foundation of any robust security strategy. These controls establish the rules and standards that an organization must follow to maintain a secure environment.
2. Deterrent Controls - Discouraging Potential Threats
Deterrent controls work on a psychological level, dissuading potential attackers from attempting unauthorized intrusions. These controls convey the message that security is a top priority and that any breach attempts will be met with swift and decisive action.
3. Preventative Controls - Stopping Threats in Their Tracks
Preventative controls encompass a wide range of security measures designed to prevent unauthorized activities. They can be categorized into three main types:
While not preventing attacks, compensating controls ensure that the system can recover and continue functioning after an incident. These controls may involve using data backups or alternative sites to maintain operations.
领英推荐
5. Detective Controls - Identifying and Alerting to Threats
Detective controls are crucial for identifying and alerting to unauthorized activity, whether it's in progress or after the fact. They come in various forms:
6. Corrective Controls - Repairing and Restoring
Corrective controls are deployed after an unauthorized or unwanted activity has occurred. They aim to repair damage and restore resources and capabilities to their previous state. Examples include patching systems, quarantining viruses, and incident response plans.
Sphere of Use and Sphere of Protection - Building a Holistic Security Strategy
Understanding the spheres of information security is crucial for developing a comprehensive security strategy:
In conclusion, understanding the five security controls and the Sphere of Use and Sphere of Protection is paramount for any organization seeking to fortify its information security posture. By implementing a well-rounded security strategy that incorporates these principles, businesses can better protect their sensitive data and maintain the integrity of their systems in an increasingly interconnected world.