Control Types
Control Categories
Vocab
Scenarios
100

This type of control is designed to stop a security problem before it happens.

Preventative control

100

Firewalls, antivirus software, encryption, and access control lists belong to this category.

Technical controls

100

This security principle means users should only have the access they need to do their job.

Principle of least privilege

100

A company requries employees to use MFA before logging into email

Preventative technical control

200

This type of control helps identify that a security issue has happened or is happening.

Detective control

200

Locks, fences, cameras, guards, and badge readers belong to this category.

Physical controls

200

Proving you are who you say you are

Authentication

200

A security camera records someone entering a restricted room

Detective deterrent physical control

300

This type of control helps fix or restore systems after an incident.

Corrective control

300

Policies, procedures, background checks, and security training belong to this category.

Administrative controls

300

Requiring a password and a phone verification code is an example of this.

MFA

300

Attackers steal customer emails, addresses, and purchase history from an online store. Why is this still serious even if no credit cards were stolen?

The data can be used for phishing, scams, or identity theft attempts.

Loss of reputation.

400

Warning signs, visible cameras, and login banners are examples of this type of control because they discourage bad behavior.

Deterrent control

400

Day-to-day security actions for an organization like monitoring logs, reviewing alerts, and following incident response steps belong to this category.

Operational controls

400

Having a layered security approach

Principle of defense

400

A ransomware attack prevents employees from accessing their work computers. What is the main impact?

Operational disruption.

Potential financial loss.

500

This type of control is used as a backup or alternative when the preferred control cannot be used.

Compensative control

500

A school rule requiring students to use strong passwords is this category of control.

Administrative control

500

Following an authorized person into a secured area

Tailgating

500

Name two corrective controls, two ways to exploit them, and two ways to mitigate against the exploits.

Backups and patches.

Delete / Corrupt the backups and supply chain attacks (hijack patches)

Creating immutable and multiple backups / Regularly test backups. Verify and test software updates prior to distributing them across entire systems.

M
e
n
u