Security Controls - CompTIA Security+ SY0-701 - 1.1

Professor Messer
1 Nov 202311:49

Summary

TLDRThis video script delves into the multifaceted world of IT security, emphasizing the importance of various security controls to safeguard data and physical assets. It categorizes controls into technical, managerial, operational, and physical, illustrating preventive, deterrent, detective, corrective, compensating, and directive control types. The script provides practical examples for each, highlighting the dynamic nature of security measures in an evolving technological landscape.

Takeaways

  • 🛡️ Technical controls involve implementing security measures using technical systems like operating system policies, firewalls, and antivirus software.
  • 📋 Managerial controls are policies and procedures that guide the management of computers, data, and systems within an organization.
  • 👥 Operational controls rely on people to enforce security measures, such as security guards, awareness programs, and training sessions.
  • 🏢 Physical controls are measures that restrict physical access to buildings, rooms, or devices, including guard shacks, fences, locks, and badge readers.
  • 🚫 Preventive controls are designed to limit access to resources and can be technical, managerial, operational, or physical in nature.
  • ⚠️ Deterrents may not prevent access but discourage potential attackers by making them reconsider their actions, fitting into all four control categories.
  • 🕵️‍♂️ Detective controls identify and log breaches, providing warnings and information about attacks, and can be categorized as technical, managerial, operational, or physical.
  • 🛠️ Corrective controls are applied after an event is detected to reverse the impact or minimize downtime, including technical backups, managerial policies, operational responses, and physical equipment.
  • 🔄 Compensating controls are temporary measures used when resources are lacking to address a security event, and they can be technical, managerial, operational, or physical.
  • 📜 Directive controls are weaker and involve directing individuals to act more securely, such as storing sensitive information in protected folders or following compliance policies.
  • 🔄 The script emphasizes the adaptability and evolution of security controls, suggesting that organizations may have unique implementations and new controls may emerge.

Q & A

  • What are the primary objectives of implementing security controls in IT?

    -The primary objectives of implementing security controls in IT are to prevent unauthorized access to systems, minimize the impact of security events that do occur, and limit the damage if an attacker gains access to the computing environment.

  • What are the four broad categories of security controls mentioned in the script?

    -The four broad categories of security controls mentioned are technical controls, managerial controls, operational controls, and physical controls.

  • Can you explain what technical controls involve in the context of IT security?

    -Technical controls in IT security involve implementing measures using technical systems such as setting up policies within an operating system, using firewalls, antivirus software, and other security measures to prevent unauthorized access and functions.

  • What are managerial controls and how do they differ from technical controls?

    -Managerial controls are policies and procedures created to guide people on the best way to manage their computers, data, and systems. They differ from technical controls in that they rely on documented policies rather than technological implementations.

  • How do operational controls contribute to IT security?

    -Operational controls contribute to IT security by using people to set and enforce security measures. Examples include security guards, awareness programs, and training sessions that help in understanding and implementing best practices for IT security.

  • What is the purpose of physical controls in an IT security context?

    -Physical controls are designed to limit physical access to buildings, rooms, or devices. They include measures such as guard shacks, fences, locks, and badge readers to prevent unauthorized entry into secured areas.

  • Can you provide an example of a preventive control type in IT security?

    -A preventive control type in IT security could be a firewall rule that prevents unauthorized access to a specific part of the network or a guard shack that checks identification of everyone entering a facility.

  • What is a deterrent control type and how does it function in security?

    -A deterrent control type does not prevent access but discourages potential attackers, making them reconsider their actions. Examples include security information displayed on application splash screens or the threat of demotion or dismissal for policy violations.

  • What is the role of detective controls in identifying security breaches?

    -Detective controls identify and log information about security breaches. They may involve reviewing system logs, login reports, or patrolling property to detect unauthorized access or activity.

  • How do corrective security controls help in the aftermath of a security incident?

    -Corrective security controls are applied after an event is detected to reverse the impact or minimize downtime. Actions like restoring systems from backups, implementing policies for incident reporting, or contacting law enforcement are examples of corrective controls.

  • What is a compensating control and when might it be used?

    -A compensating control is used when there isn't the ability to reverse the effects of a security event. It involves using other means to manage the security incident temporarily, such as blocking traffic with firewall rules or separating duties among staff.

  • What is the significance of directive controls in security practices?

    -Directive controls are weaker security measures that direct individuals to act more securely. They include policies that require storing sensitive information in encrypted folders or signs indicating 'authorized personnel only' to guide access.

Outlines

00:00

🛡️ IT Security Risks and Control Categories

The first paragraph introduces the various security risks in IT and the importance of preparing for them. It emphasizes the need to protect not only data but also physical systems and people. The video will explore different security controls to prevent incidents and minimize their impact. Four broad categories of security controls are mentioned: technical, managerial, operational, and physical controls. Technical controls involve system-based implementations like firewalls and antivirus software. Managerial controls consist of policies and procedures to guide secure practices. Operational controls rely on human actions, such as security guards and awareness programs. Physical controls limit access to buildings or rooms through means like locks and badge readers. The paragraph sets the stage for a deeper dive into specific types of controls and their respective categories.

05:02

🔒 Types of Security Controls and Their Applications

This paragraph delves into the specifics of different control types used in IT security. It categorizes preventive controls, which limit access to resources, into the four previously mentioned control types. For instance, firewall rules are a technical preventive control, while guard shacks are operational. The paragraph then discusses deterrent controls that discourage potential attackers through measures like splash screens or the threat of demotion. Detective controls, which identify and log breaches, are exemplified by system log reviews and property patrols. Corrective controls are introduced as post-breach measures that can reverse or mitigate the impact of security incidents, such as restoring from backups or contacting law enforcement. Compensating controls are temporary measures taken when a direct resolution is not immediately possible, like blocking traffic to patch a vulnerability. Lastly, directive controls are weaker, guiding users to more secure practices, such as storing sensitive information in encrypted folders. The paragraph concludes by illustrating how these controls fit into the four categories, providing examples for each.

10:04

📚 Security Policies and Training for Enhanced Protection

The final paragraph focuses on directive control types, which are less about enforcing security and more about guiding users towards secure behaviors. It discusses the importance of having clear security policies and compliance procedures to ensure everyone understands the necessary processes. Training users on security policies is highlighted as a way to reinforce these practices. The paragraph also touches on physical directive controls like signs indicating 'authorized personnel only'. It concludes by emphasizing that the examples given are not exhaustive and that different organizations may use different controls. It acknowledges the evolving nature of technology and security processes, suggesting that new control types may emerge and existing ones may be adapted to fit changing needs.

Mindmap

Keywords

💡IT security

IT security, or Information Technology security, refers to the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a central theme in the video, which discusses various security risks and the measures needed to safeguard against them. For example, the script mentions attackers looking for ways to gain access to systems, emphasizing the importance of IT security in protecting both data and physical systems.

💡Security risks

Security risks are potential vulnerabilities or threats that can be exploited to compromise the confidentiality, integrity, or availability of information or systems. The video script highlights the need to prepare for these risks, as attackers continually seek new methods to breach security. The concept is integral to the video's message, as it sets the stage for the discussion of different security controls.

💡Technical controls

Technical controls are security measures implemented through technology, such as operating system policies, firewalls, and antivirus software. The script describes these controls as a means to prevent unauthorized access to systems and functions. For instance, setting up policies within an operating system or using firewall rules to restrict network access are examples of technical controls mentioned in the video.

💡Managerial controls

Managerial controls involve the creation and enforcement of policies and procedures to guide the secure management of IT resources. The video script refers to these as policies that explain the best way to manage computers, data, and other systems. An example from the script is the inclusion of managerial controls within security policies and procedures, emphasizing their role in shaping organizational security practices.

💡Operational controls

Operational controls are security measures that rely on human actions and processes rather than technology. The video script illustrates this with examples such as security guards, awareness programs, and monthly lunch and learns. These controls are crucial for implementing security practices in the day-to-day operations of an organization.

💡Physical controls

Physical controls are measures that restrict physical access to buildings, rooms, or devices. The script describes examples like guard shacks, fences, locks, and badge readers. These controls are essential for preventing unauthorized entry and protecting physical assets within an organization.

💡Preventive controls

Preventive controls are designed to limit access to resources and prevent certain events from occurring. The video script uses the analogy of a firewall rule preventing network access or a guard shack checking IDs to illustrate how preventive controls operate at a technical or operational level to stop potential security breaches.

💡Deterrent

A deterrent in the context of security is something that discourages potential attackers by making them reconsider their actions due to the perceived risks or consequences. The script mentions deterrents such as splash screens with security information, threats of demotion, and reception desks that greet visitors, all serving to dissuade unauthorized access.

💡Detective controls

Detective controls are mechanisms that identify and, in some cases, alert about security breaches. The video script describes detective controls like system log reviews and property patrols, which are crucial for detecting and responding to security incidents. These controls help in understanding the nature and scope of a breach after it has occurred.

💡Corrective controls

Corrective controls are actions taken after a security event has been detected to mitigate its impact or restore normal operations. The script provides examples such as restoring a system from backups after a ransomware attack or having policies for reporting security issues. These controls are essential for minimizing downtime and damage after a security breach.

💡Compensating controls

Compensating controls are measures taken when a security event has occurred and there is no immediate solution to reverse its effects. The video script discusses compensating controls like blocking traffic with firewall rules until a software patch is available or having multiple security guards to limit the scope of access. These controls serve as temporary solutions until a more permanent fix can be implemented.

💡Directive controls

Directive controls are weaker security measures that guide or direct individuals towards more secure behaviors rather than enforcing them. The script mentions examples such as requiring sensitive information to be stored in encrypted folders or signs indicating 'authorized personnel only'. These controls rely on user compliance to be effective.

Highlights

IT security involves preparing for various security risks to protect data and physical systems.

Security controls can prevent events, minimize impact, and limit damage from unauthorized access.

Technical controls are implemented using technical systems like operating system policies, firewalls, and antivirus software.

Managerial controls involve creating policies and procedures to guide secure management of computers and data.

Operational controls utilize people for security, such as security guards, awareness programs, and monthly training sessions.

Physical controls limit physical access to buildings, rooms, or devices through measures like guard shacks, fences, locks, and badge readers.

Preventive controls restrict access to resources, like firewall rules or guard shacks checking identification.

Deceptive controls discourage unauthorized access, such as splash screens with security information or the threat of demotion.

Detective controls identify and log breaches, like system log reviews or property patrols for security breaches.

Corrective controls are applied after a breach to reverse impacts or minimize downtime, such as restoring from backups.

Compensating controls provide alternative means of security when a direct solution is not available, like blocking traffic until a patch is applied.

Directive controls guide users to perform more secure actions, like storing sensitive information in encrypted folders.

Compliance policies and procedures are part of directive controls, ensuring everyone understands proper security processes.

Security policy training is an operational directive control, educating users on the importance of security policies.

Signs like 'authorized personnel only' are physical directive controls, influencing behavior without physical barriers.

Examples provided for security controls are not exhaustive and can vary based on technological changes and security processes.

Different organizations may use unique security controls based on their specific needs and processes.

Transcripts

play00:01

If you've spent any amount of time in IT security,

play00:04

you know there are many different security risks

play00:06

that you need to prepare for.

play00:08

The attackers are looking for different ways

play00:11

to gain access to our systems.

play00:12

And we need to find different ways to prevent them

play00:15

from getting that access.

play00:17

But of course, we're not just protecting data.

play00:19

We're also protecting physical systems, buildings, people,

play00:23

and everything in our organization.

play00:26

In this video, we'll look at different security controls

play00:29

and how they can be used to prevent events from occurring

play00:32

in the first place.

play00:33

We can minimize the impact of events

play00:35

that ultimately do occur.

play00:37

And in many cases, we can limit the damage

play00:40

if someone does find a way into our computing environment.

play00:44

Let's look at some very broad categories

play00:47

of security controls.

play00:48

The first category we'll look at are technical controls.

play00:52

These are controls that we implement using

play00:54

some type of technical system.

play00:56

So if you're someone who is managing an operating system,

play01:00

you might set up policies and procedures

play01:02

within the operating system that would allow or disallow

play01:06

different functions from occurring.

play01:07

We can also put firewalls, antivirus,

play01:10

and other types of software into this category

play01:13

of technical controls.

play01:15

As a security administrator, you'll

play01:17

also want to create a series of policies that explain to people

play01:21

the best way to manage their computers, their data,

play01:24

or their other systems.

play01:25

We refer to these as managerial controls.

play01:28

So if you are creating a series of policies and procedures

play01:32

or you're creating an official security policy documentation,

play01:35

you'll often put these managerial controls inside

play01:39

of your security policies.

play01:40

You might also see these managerial controls implemented

play01:43

into day-to-day processes as part of your standard operating

play01:47

procedures.

play01:49

Another important control category

play01:50

are the operational controls.

play01:52

Unlike using technology to manage these controls,

play01:56

operational controls are using people

play01:58

to be able to set these controls.

play02:00

So if you have security guards at your place of work,

play02:02

you're doing monthly lunch and learns,

play02:04

or you have some type of posters or awareness program

play02:07

at work to help explain the best practices for IT security,

play02:12

then you can put these into the category

play02:14

of operational controls.

play02:16

And the last category that we have are physical controls.

play02:19

As the name implies, these are controls

play02:22

that would limit someone's physical access to a building,

play02:25

a room, or a device.

play02:27

This might be something like a guard shack.

play02:29

So they can check everyone coming into a particular area.

play02:32

Maybe there are fences and locks to keep people out.

play02:35

Or maybe use badge readers to limit the access

play02:39

into certain areas within your building.

play02:41

So in this video, we'll focus on these four categories

play02:45

of controls-- the technical, managerial,

play02:48

operational, and physical.

play02:49

And in this video, we'll look at a number of different control

play02:53

types and determine where we would fit certain control

play02:56

types into certain categories.

play02:59

The first control type we'll look at

play03:00

is a preventive control type.

play03:02

This is a control type that limits someone access

play03:05

to a particular resource.

play03:07

You can think of this as something

play03:09

like a firewall rule, which would prevent somebody

play03:11

from gaining access to a particular area

play03:14

of your network.

play03:15

Or it may be something that's more tangible, such as a guard

play03:18

shack checking everyone's identification

play03:20

as they come into your facility.

play03:23

A good way to test yourself with these different control types

play03:25

is to determine what category will a certain type fit into.

play03:30

So when we deal with preventive control types,

play03:32

we can look at firewall rules.

play03:34

And since those are handled at a technical level,

play03:36

then those would fit into the technical category.

play03:39

As we hire people, we may want to set a certain type of policy

play03:43

for onboarding.

play03:44

And those would be policies set as part

play03:47

of a managerial category.

play03:48

We've already mentioned a guard shack

play03:50

checking everyone's identification.

play03:52

And since that's done by a person,

play03:54

we can fit that into an operational category.

play03:57

And lastly, we have door locks, which

play03:59

are physical devices preventing access to a room.

play04:02

So that would fit into the physical category.

play04:05

Another important control type is a deterrent.

play04:08

And although a deterrent may not prevent someone

play04:10

from accessing a resource, it may give them a discouragement

play04:14

or have them think twice about the attack

play04:17

that they're planning.

play04:18

For example, when you start an application,

play04:20

there may be a splash screen that

play04:21

provides security information and restricts

play04:24

people who are not authorized from gaining access

play04:27

to that system.

play04:28

Or there might be the threat of a demotion or a dismissal

play04:31

if somebody gains access to data that they should not

play04:34

be accessing.

play04:35

There might also be a front reception desk

play04:37

greeting everyone who walks in or warning signs telling people

play04:41

that if they gain access to this facility

play04:43

that there would be consequences.

play04:45

These fit perfectly into our four categories.

play04:48

A splash screen is a deterrent that fits

play04:50

into the technical category.

play04:52

A demotion is a managerial category.

play04:55

The reception desk fits into the operational category.

play04:58

And the warning signs are a physical deterrent.

play05:02

A detective control type can identify and, in some cases,

play05:06

warn us when a particular breach has occurred.

play05:09

This may not prevent access.

play05:11

But it would give us a warning and log information

play05:14

about that particular attack.

play05:16

An example of a detective control type

play05:19

may be a process of collecting, reviewing,

play05:21

and going through system logs.

play05:23

Or you may be reviewing log-in reports about who's

play05:26

gained access to your systems.

play05:28

There might be someone patrolling the property,

play05:30

looking for cases where someone might

play05:32

have broken into your facility.

play05:34

And you might have motion detectors

play05:35

so that you're automatically notified

play05:37

if something is moving in an area

play05:40

where normally there should be no motion.

play05:42

The system logs that are detailing everything that's

play05:45

going on in your systems would fit

play05:47

into the technical category.

play05:49

Someone reviewing log-in reports every day or every week

play05:52

would fit into the managerial category.

play05:55

Someone patrolling the property would

play05:57

be an operational category.

play05:59

And then the motion detectors provide us

play06:01

with a physical category.

play06:03

If there is a notification that someone has breached a system

play06:07

or gained access into a certain area of your business,

play06:11

then you want to apply a corrective security control.

play06:14

A corrective security control is something

play06:16

that occurs after the event has been detected.

play06:19

This is sometimes able to reverse the impact

play06:22

of that particular event.

play06:24

Or you may be able to continue operating

play06:26

with your business with minimal downtime,

play06:29

thanks to these corrective controls.

play06:31

For example, if a computer has been infected with ransomware

play06:35

and it has encrypted everything on that system

play06:37

and made all of the data inaccessible,

play06:39

you can simply erase everything on that computer

play06:42

and restore it back to a known good system using your backups.

play06:46

You might also want to create policies so

play06:48

that if there are security issues

play06:50

or something unusual that you see happen,

play06:53

then those would be rolled up into an alert

play06:56

or some type of notification.

play06:58

And if you find that someone has jumped your fence

play07:00

or they've tried to get in through a door

play07:01

in your building, you may need to contact law enforcement

play07:04

to be able to correct that particular incident.

play07:07

And if something is caught on fire,

play07:09

you can grab a fire extinguisher and make sure

play07:11

that that fire doesn't spread any further, thereby correcting

play07:15

that particular event.

play07:17

And as you might expect, those are four events

play07:20

that certainly fits into the four categories that we have.

play07:23

For example, recovering from a backup

play07:25

would be a technical category.

play07:27

Being able to have policies for reporting issues

play07:30

when they occur would be in the managerial category.

play07:33

Contacting authorities for some type of legal issue

play07:36

would be an operational category.

play07:38

And your fire extinguisher is a physical category.

play07:42

You might also find yourself in a situation

play07:45

where a security event has occurred,

play07:47

but you don't have the resources or means

play07:49

to be able to reverse what that particular event has caused.

play07:53

In those cases, you may want to use a compensating control

play07:56

type, which provides you with using other means in a way

play08:00

to control that particular security event.

play08:02

This may be something you use on a temporary basis

play08:05

until you're able to put together a plan to resolve

play08:08

the overall security incident.

play08:10

For example, you might have an application

play08:12

that is important for your organization.

play08:14

But the application developer has told you

play08:16

that they've identified a significant security

play08:18

vulnerability in that software.

play08:20

Since the application developer is

play08:22

going to provide you with a patch sometime in the future,

play08:25

you may want to set some type of firewall rule today that

play08:29

would prevent somebody from exploiting

play08:31

that particular vulnerability.

play08:33

Or this might be a case where you

play08:34

can separate different duties between different individuals

play08:38

and limit the scope of any type of security concern.

play08:41

Or you might have multiple security guards

play08:43

all working at the same time to make sure

play08:46

that no single security guard has

play08:48

complete access to everything in your environment.

play08:51

And if you lose power in your building,

play08:53

you might want to have a generator so that while you're

play08:56

waiting for main power to be restored,

play08:58

you can compensate by turning on your generator.

play09:01

Those are our four different categories

play09:03

of a compensating control.

play09:05

We have a technical category of blocking that traffic

play09:08

instead of patching the application.

play09:10

There may be a separation of duties for the people

play09:12

that work in your organization.

play09:14

And that fits into the managerial category.

play09:16

You might require multiple security staff

play09:19

working simultaneously.

play09:20

And that would be the operational category.

play09:23

And lastly, having a power generator

play09:25

to compensate for a power outage fits

play09:27

into the physical category.

play09:29

The last control type we'll look at is a directive control type.

play09:34

This is a relatively weak security control

play09:36

because it is one where you are directing someone

play09:39

to do something more secure rather than less secure.

play09:43

For example, you may require everyone

play09:45

to store sensitive information into a protected and encrypted

play09:49

folder on their system.

play09:51

This requires the user to make a decision

play09:53

about what data may be sensitive and what

play09:55

data may be nonsensitive.

play09:57

And then they are directed to store the sensitive information

play10:00

in the protected folder.

play10:02

As part of our security policies,

play10:03

we may want to add compliance policies and procedures so

play10:06

that everyone understands the proper processes to use

play10:10

for security in your environment.

play10:12

You might also train users on what the proper security

play10:15

policies might be.

play10:16

And another example of a directive control

play10:19

may be a sign that you put on a door that says

play10:21

"authorized personnel only."

play10:23

There might not be a lock on the door.

play10:25

But the sign saying "authorized personnel only"

play10:28

directs people to either enter or not

play10:31

enter that particular door.

play10:33

So to summarize these, our file storage policies

play10:36

will direct people to this technical category.

play10:40

A compliance policy fits into a managerial category.

play10:43

Someone performing a security policy training course

play10:47

would be a directive control type fitting

play10:49

into the operational category.

play10:51

And a sign on a door that says "authorized personnel only"

play10:54

fits into the physical category.

play10:57

The examples I provided for the different security

play10:59

controls and the categories where they fit

play11:02

are simply one single example.

play11:04

And you can probably think of a number of different examples

play11:07

that you could fit into any of those squares in our matrix.

play11:11

You could probably also think of different security controls

play11:14

that might fit into a different category of control

play11:17

or a different type of control.

play11:19

You might also find as our technology changes

play11:22

and our security processes evolve

play11:24

that there might be new control types that we

play11:26

could fit into our chart.

play11:28

And of course, not everybody uses the same security

play11:31

controls.

play11:32

So the ones that you use in your organization

play11:34

may be very different than someone else's organization.

Rate This

5.0 / 5 (0 votes)

Related Tags
IT SecurityCyber ThreatsData ProtectionSystem AccessFirewallsAntivirusPoliciesProceduresPhysical SecurityAwarenessPreventive Measures