CompTIA Security+ Certification

Controls and Security Concepts

Categories of Controls

Understanding the different categories of security controls is critical for developing a robust security strategy. In this article, we break down these controls into two primary segments: those implemented by people and those enforced through technical and physical measures.

People-Based Controls

People-based controls are divided between managerial and operational functions.

  • Managerial Controls:
    These controls involve policies and directives established by organizational leadership. They encompass security policies, guidelines, and procedures that employees are required to follow.

  • Operational Controls:
    These controls are executed by non-managerial staff, such as security personnel who handle tasks like data labeling and classification. They are essential in maintaining day-to-day security protocols.

Technology and Physical Controls

The next category includes controls that are implemented through technical means and physical measures.

  • Technical Controls:
    These are enforced by hardware, software, or firmware. Key examples include firewalls, anti-malware software, virus protection applications, and other specialized security applications.

  • Physical Controls:
    Physical controls refer to tangible security measures such as walls, fences, barricades, and secure entry points. These measures are vital in preventing unauthorized physical access to facilities and mitigating risks.

    Note

    Effective physical security measures might also incorporate access control vestibules to prevent tailgating, proper use of badges, sufficient lighting, and video surveillance.

Deception as a Security Measure

An advanced strategy to detect and counteract attackers involves the use of deception. By deliberately implementing deceptive tactics, organizations can gain vital insights into attackers' identities, capabilities, and methodologies.

A common and effective deceptive measure is the deployment of a honeypot. A honeypot is a purposely vulnerable system intended to attract attackers, thereby allowing for careful monitoring of their actions and strategies. It is crucial to isolate the honeypot from your main production environment to avoid potential breaches.

This concept can be extended to create a full-fledged honey network or even a strategically placed honey file, significantly enhancing your overall security posture.

The image illustrates a "Honey Network" concept within fundamental security concepts, featuring a network diagram with interconnected nodes and a security icon.

Watch Video

Watch video content

Previous
Security Controls