Types of Cyber Security controls and how to place them

Cybersecurity controls are tools for preventing, detecting, and mitigating cyber threats. The Mechanisms will range from physical controls, like security guards and cameras for surveillance, to technical controls, including multifactor and firewalls authentication. Get this online Cyber Security Training In Hyderabad where aids you in mastering the concepts like computer networks and security, application security, ethical hacking, cryptography, malware threats, vulnerability analysis, and different enterprise security practices. 

Since cyber-attacks on businesses become more common, security teams must constantly reevaluate their security controls. A one-sided approach to cybersecurity is obsolete and ineffective. As it’s difficult to prevent all attacks in today’s threat landscape, businesses should assess their assets and create controls depending on their relevance to the business.

Employees are unlikely to comply with compliance standards if strict controls are established across all firm assets, adding to the challenge. The threat landscape and asset must be directly reflected in the severity of a control. A hacker revealing thousands of customers’ personal data via a cloud database, for instance, may have considerably more serious effects than a single employee’s laptop.

Protecting Information Resources

This section discusses implementing the proper information security controls for assets. Here, we concentrate on heavy-hitting, effective philosophies to comprehend in choosing the proper controls, implying that the asset is “secure enough” depending on its classification and criticality.

The control types are divided into several classes:

  • Managerial/Administrative Controls: These are the policies and procedures that aren’t as flashy as a new software feature, but they exist to provide structure and direction to employees and other members of your organization, ensuring that no one gets penalized or creates a breach.
  • Physical Controls: It will use physical barriers to confine access to systems, such as fences, CCTV, dogs, and, of all, fire sprinklers.
  • Logical/Technical Controls: These are controls that confine access on a basis of software or hardware, like authentication, Trusted Platform Modules (TPMs), encryption, or fingerprint readers. These do not restrict access to physical systems in the same way that physical controls do, but rather to content or data.
  • Operational Controls: These are procedures that are carried out daily by people. Asset classification, Awareness training, and log file review are just a few examples.

Let us cover the control types that you’ll be capable of classifying and applying as mitigation against risk, based on the threat and vertical:

  • Preventative Controls: These controls exist to not permit an action to occur and include access permissions, fences, and firewalls.
  • Detective Controls: These controls, like intrusion detection systems or video surveillance, are only triggered during or after an incident.
  • Deterrents: It deters threats from trying to exploit a vulnerability, like a “Guard Dog” sign or dogs.
  • Corrective Controls: These controls can change the state of an action. Controls for fail open and fail closed are addressed here.
  • Recovery Controls: These controls are used to restore something after it has been lost, such as a hard drive.
  • Compensating Controls: These are the controls that try to compensate for the shortfalls of other controls, like frequently monitoring access logs.

In general, the following is the sequence in which you should put your controls for adequate defense in depth:

  1. Deter: It prevents actors from gaining access to something they shouldn’t.
  2. Deny/Prevent Access: The access is prevented by using preventative controls like authentication and access permissions.
  3. Detect: Endpoint protection software, for instance, can detect the risk and log the detection.
  4. Delay: The process of preventing a risk from occurring again, such as with a “too many attempts” password entering the function.
  5. Correct: Responds to the compromise and corrects the situation like incident response plan.
  6. Recover: It recovers the availability to a server after it has been compromised, such as a backup generator.


In terms of continuous improvement, we should also monitor the worth of each asset to see if it has changed. The reason for this is that we may need to reconsider our rules for safeguarding such assets if their value increases or decreases over time, or if certain important events occur at your corporation.

As a footnote, when considering controls, we must also consider recovery. We must be able to recover from any adverse events or changes in the value of our assets. Restoration, redundancy, and backup methods are just a few examples.

A concept to remember, particularly in the age of the cloud, IaaS, PaaS, SaaS, third-party solutions, and all other forms of “someone else’s PC” is to assure that SLAs are defined clearly, and have agreements for maximum downtime feasible, and also fines for unsuccessful deliveries on those commitments. Compensating control is demonstrated in this example.

You’ll want to push for SLAs that represents your risk appetite as a user of third-party solutions. Likewise, you should examine the possibility that by tying those assets together, you’re increasing the risk of availability. A loss of availability occurs when one of the services is offline, preventing you from completing a task. If you’re a cloud service provider, think about your availability and what you can realistically provide your clients, as well as what’s required from a business standpoint.


In this article, we have learned various control types and security measures in Cybersecurity. We have seen how asserts information can be secured by implementing in-depth defending methods.


Leave a Reply

Next Post

Guide to React Native App Development: Pros and Cons for London Companies with Exato Software

Thu Oct 19 , 2023
Introduction In the ever-evolving landscape of mobile app development, businesses in London seek cost-effective, efficient, and agile solutions to reach their target audience. React Native has emerged as a game-changer, allowing companies to build cross-platform mobile applications with a single codebase. In this guide, we will explore the world of […]
Guide to React Native App Development: Pros and Cons for London Companies with Exato Software

You May Like