🔐1.0 General Security Concepts – CompTIA Security+ SY0-701

Security controls are essential for protecting the confidentiality, integrity, and availability of systems and data. These controls can be categorized in multiple ways and can have different types depending on their purpose. In this post, we’ll explore both Security Control Categories and Control Types, with examples to help you understand their significance. 🛡️

1️⃣ Security Control Categories

1.1 Technical Controls (Automated Controls) 🖥️

These controls are implemented through technology to safeguard systems and networks.

Examples:

  • Firewalls: 🚫 Prevent unauthorized network access.
  • Encryption: 🔒 Protect data confidentiality.
  • Access Control Lists (ACLs): 🔑 Define what actions users can perform on system resources.

1.2 Managerial Controls 👨‍💼

Managerial controls focus on management processes and strategies to ensure the overall security of the organization.

Examples:

  • Security Policies: 📋 Guidelines for users and administrators about acceptable behavior.
  • Risk Assessment: ⚖️ Identifying, assessing, and mitigating risks.
  • Security Awareness Training: 🎓 Educating employees about security practices and threats.

1.3 Operational Controls ⚙️

These controls involve day-to-day operations to ensure security is maintained in practice.

Examples:

  • Incident Response Procedures: 🚨 Steps to take in case of a security breach.
  • System Monitoring: 👀 Continuously observing systems to identify irregular activities.
  • Backup and Recovery: 💾 Regularly backing up data to restore in case of failure or breach.

1.4 Physical Controls 🏢

These controls aim to protect physical assets, including hardware, facilities, and personnel.

Examples:

  • Security Guards: 🏃‍♂️ Physical presence to prevent unauthorized access.
  • Locks on Doors: 🔒 Prevent physical access to sensitive areas.
  • Surveillance Cameras: 🎥 Monitor and record activity around secure areas.

2️⃣ Security Control Types

2.1 Preventive Controls 🚫

These controls are designed to prevent security incidents before they occur.

Examples:

  • Firewalls: 🔥 Prevent unauthorized access to a network.
  • Authentication: 🔑 Ensure only authorized users can access systems.
  • Encryption: 🔐 Protect data by making it unreadable to unauthorized parties.

2.2 Deterrent Controls ⚔️

These discourage or deter potential attackers from attempting malicious activity.

Examples:

  • Warning Banners: ⚖️ Display messages about legal actions for unauthorized access.
  • Visible Security Cameras: 🎥 Deter criminals from attempting physical intrusion.

2.3 Detective Controls 🕵️‍♂️

These controls are designed to detect and identify security incidents once they occur.

Examples:

  • Intrusion Detection Systems (IDS): 🚨 Identify abnormal or malicious activities on a network.
  • Security Logs: 📖 Review logs for unusual or suspicious activities.
  • CCTV Cameras: 🎥 Capture video evidence of suspicious behavior.

2.4 Corrective Controls 🛠️

These aim to correct or mitigate damage after a security incident has been detected.

Examples:

  • Patching: 🧰 Apply security patches to fix vulnerabilities.
  • Data Restoration: 🔄 Recover data from backups after a ransomware attack.
  • Reconfiguring Firewalls: 🔧 Adjust firewall settings to block further attacks.

2.5 Compensating Controls 💡

These provide alternative methods to mitigate risks when primary controls are not feasible.

Examples:

  • Using a third-party service for encryption 🔐 when an organization cannot implement internal encryption.
  • Using a manual backup process 📂 if automated backups fail.

2.6 Directive Controls 📑

These controls encourage or instruct individuals on how to behave to follow security practices.

Examples:

  • Security Policies: 📜 Guide users on acceptable behavior and security practices.
  • Security Awareness Training: 👩‍🏫 Direct users on how to detect phishing or social engineering attempts.

⚖️ Comparison Table: Security Control Categories & Types

Category / TypeTechnicalManagerialOperationalPhysical
Preventive🔥 Firewalls, 🔒 Encryption, 🔑 ACLs📋 Security Policies, ⚖️ Risk Assessment💾 Backup Systems, 🔑 Access Control Policies🔒 Locks, 🏃‍♂️ Security Guards
Deterrent🔑 Access Control Systems, 🛑 Authentication🎓 Training (to reduce human error)⚠️ Warning Messages, 💪 Security Drills🎥 Security Cameras, ⚖️ Visible Signs
Detective🕵️‍♂️ IDS, 📖 Logging, 🚨 Intrusion Detection📋 Security Audits👀 Activity Monitoring, 🚨 Incident Detection🎥 Surveillance Systems
Corrective🧰 Patch Management, 🔄 Security Updates📑 Post-Incident Reviews🔄 Data Recovery, 🛠️ Remediation Plans🛠️ Emergency Exits, 🚒 Fire Suppression Systems
Compensating🌐 VPNs, 💾 Backup Systems🔄 Use of alternative measures when policies fail🔄 Alternate work processes🛑 Temporary Barriers
Directive🔒 Enforced Access Controls, 📜 Security Rules📑 Security Guidelines, 🎓 Training📝 Incident Reporting Procedures🛡️ Authorized Personnel Access

Leave a Reply

Your email address will not be published. Required fields are marked *