Skip to the content.

Security Controls

Security Control

Controls ensure the confidentiality, integrity, and availability of an organization’s information and technology assets, focusing on people, technology, processes, and strategy.

System-specific, Common, and Hybrid Controls

Types of Cybersecurity Controls

Physical Controls

Physical controls addresses security needs with hardware like badge readers and architectural features.

To learn more, please see Physical Security.

Technical Controls

Also termed “logical controls”, Technical controls are implemented directly by computer systems and networks.

Administrative Controls

Also known as managerial controls, administrative controls refers to directives, guidelines, or advisories for organization members.

Types of Administrative Controls:

Preventative Controls

Preventative controls aim to avoid loss or errors and include measures such as hardening, security awareness training, change management, and account disable policies.

Detective Controls

Detective controls use internal controls to identify errors through methods like:

Deterrent Controls

Deterrent controls, often tangible objects or persons, reduce deliberate attacks through measures like:

Compensating Controls

Compensating controls offer alternative methods to meet security requirements when standard measures are impractical or financially challenging.

Corrective Security Controls

Corrective security controls are measures used to address security vulnerabilities or weaknesses already identified. Backups, patches, and Disaster Recovery Plans are all corrective security controls (see ISC2 Study Guide, chapter 3, module 2).

Bollards are not typically considered a corrective security control.

Administrative versus Technical

Administrative controls are implemented through policies, procedures, and training, while technical controls use technology and hardware solutions to protect systems and data.


Back to main page