Security controls are essential mechanisms, policies, or procedures that protect an organization’s assets and data.
Their primary role is to reduce risk by preventing, detecting, or mitigating potential threats.
Understanding various types of security controls is vital for implementing secure infrastructures and passing the CompTIA Security+ SY0-701 exam.
Prevent, Detect, React model is useful for categorizing controls.
Technical Controls
Implemented through technology (often called logical controls).
Examples: firewalls, intrusion detection systems (IDS), encryption.
Managerial Controls
Focus on governance and administrative aspects of an organization’s security program.
Examples: risk assessments, data classification policies, security training programs.
Operational Controls
Involve procedures that act upon managerial guidance, typically technology-driven but requiring human action.
Examples: backup procedures, incident response activities, awareness training.
Physical Controls
Deal with tangible aspects of information security.
Examples: security cameras, biometric scanners, door locks, visitor logs.
Preventive Controls
Stop an event/action from occurring.
Examples: firewalls, access control lists, strong authentication methods.
Deterrent Controls
Aim to discourage a potential attacker.
Examples: surveillance signs, visible security personnel.
Detective Controls
Discover or identify unwanted activities or issues.
Examples: system monitoring, auditing, IDS.
Corrective Controls
Aim to rectify or lessen the damage caused by a security incident.
Examples: patch management, restoration plans.
Compensating Controls
Secondary controls provided when primary controls cannot be applied.
Example: multi-factor authentication (MFA) as a substitute for smart cards.
Directive Controls
Focus on directing behaviors via guidelines or policies.
Example: mandatory password change policies.
Healthcare Organization: Used database encryption and risk assessments for patient data privacy.
Online Retailer: Deployed Web Application Firewalls (WAF) and intrusion detection systems (IDS) to counter cyber-attacks.
Understanding security controls is fundamental in crafting a robust information security strategy by categorizing into technical, managerial, operational, and physical types, as well as preventive, deterrent, detective, corrective, compensating, and directive controls.
Security controls maintain the integrity, availability, and confidentiality of information systems.
Categorization of controls helps in effective implementation and strategizing.
What are the four main categories of security controls?
Give examples of preventive and detective controls.
What is the primary function of directive controls?
How do compensating controls differ from corrective controls?
Map out security controls in your organization.
Create flashcards for types and categories of controls.
Understanding foundational security principles is essential for the CompTIA Security+ SY0-701 exam.
Confidentiality: Ensures authorized access only.
Examples: password protection, encryption, secure communication.
Integrity: Ensures data accuracy and trustworthiness.
Measures: checksums, digital signatures, hashing.
Availability: Ensures resources are accessible to authorized users.
Measures: backup systems, fault tolerance.
Assures that a specific operation has occurred and was initiated by a specific entity.
Digital signatures and strong authentication mechanisms support non-repudiation.
Authentication: Verifying identity.
Authorization: Determining access levels.
Accounting: Tracking activities.
Identifies security posture gaps to assess effectiveness of controls and need for more.
Assumes no trust by default, even inside the network perimeter.
Secures physical assets and infrastructure.
Measures: bollards, access control vestibules, video surveillance.
Utilizes honeypots and similar tools to mislead attackers and gather information.
Comprehending fundamental concepts is vital in cybersecurity.
CIA forms the basis of security considerations.
Non-repudiation authenticates transactions.
AAA is crucial for identity management.
What does the CIA triad stand for?
Explain non-repudiation.
Describe the AAA model.
What is Zero Trust?
Create a CIA triad diagram.
List potential physical security measures for an office setup.
Essential for maintaining security in changing environments.
Approval Process: Formal approval for proposed changes.
Ownership: Designate responsible individuals for changes.
Stakeholders: Keep informed to manage expectations.
Impact Analysis: Assess potential impacts on security.
Test Results: Document results from tests to evaluate feasibility.
Backout Plan: Prepare for reversible changes.
Maintenance Window: Schedule changes during off-peak hours.
Standard Operating Procedure (SOP): Document steps for implementation.
Changes might not require updates to access control lists or allow/deny lists to minimize risk.
Assess downtime implications during changes.
Update network diagrams and policies post-change.
Essential for auditing changes and rolling back if necessary.
A well-managed change process minimizes security vulnerabilities.
Change ownership and stakeholder communication are vital.
Rigorous testing and documentation are necessary.
Version control acts as a safety measure.
Why is approval necessary in change management?
What is a backout plan?
Why is version control important?
What technical implications should be considered?
Create a mock change management form.
Draft a simple SOP for a common change.
Essential for securing data and communications.
Crucial for creating and managing digital certificates aiding secure communications.
Converts plain text to unreadable format.
Types include full-disk, partition, volume, database, and record.
Asymmetric uses different keys for encryption/decryption, symmetric uses the same.
Uses mechanisms like Diffie-Hellman for secure key exchange.
Common algorithms include AES, DES, and RSA. Key Length correlates to strength.
TPM: Stores RSA encryption keys for the host system.
HSM: Safeguards keys and performs cryptographic operations.
Techniques for hiding data within other data or replacing sensitive information.
Hashing transforms data into fixed-length strings; salting adds randomness to enhance security.
Verifies the authenticity of digital documents.
Blockchain offers a secure public ledger; certificate authorities manage digital certificates.
Cryptography secures data and communications; several methods are tailored to specific needs.
PKI is foundational for communication security.
Encryption can be applied in various ways.
Utilizing TPM and HSM enhances security.
Differences between public key and private key?
What levels of encryption exist and why select one?
Role of HSM?
How does key stretching enhance password security?
Set up an encrypted email service.
Use a simple steganography tool.
Understand types of threat actors and their motivations for better anticipation and mitigation.
Nation-State Actors: Highly skilled groups focused on national interests; examples include espionage activities.
Unskilled Attackers: Limited skill using standard tools; motivations often include notoriety and thrill.
Hacktivists: Individuals targeting institutions for social/political reasons.
Insider Threats: Malicious activities from individuals inside organizations with privileged access.
Organized Crime: Groups engaged in cybercrime for financial gain, utilizing sophisticated methods.
Shadow IT: Unauthorized use of IT solutions within organizations.
Can be internal or external with varying funding and sophistication.
Include exfiltration, espionage, service disruption, blackmail, financial gain, and philosophical or revenge-related reasons.
Knowing threat actors aids in developing targeted defense strategies.
How do nation-state actors differ from unskilled attackers?
Describe a hacktivism example.
Insider threat scenarios can be both intentional and unintentional; explain.
Motivation associated with organized crime?
Security risks from Shadow IT?
Awareness of threat actor types and motivations enhances security protocols.
Create a profile of threat actors for an organization.
Develop a matrix comparing attributes of different threat actors.