Information security - Security Controls and Defense Strategies
Understand how security controls are selected, layered, evaluated, and audited within a defense‑in‑depth framework.
Summary
Read Summary
Flashcards
Save Flashcards
Quiz
Take Quiz
Quick Practice
What is the primary basis for choosing specific security controls?
1 of 11
Summary
Security Controls and Defense in Depth
Introduction
Security controls form the backbone of any information security program. Rather than hoping a system will remain secure, organizations deliberately select and implement controls based on their specific risks. This approach recognizes a fundamental truth: no single security measure can protect a system completely. Instead, organizations layer multiple controls to create resilience—if one fails, others continue protecting the system.
What Are Security Controls?
A security control is any measure taken to reduce or manage risk to an information system. Controls are selected based on the results of a risk assessment, which identifies vulnerabilities and threats specific to your organization.
Security controls serve three fundamental purposes: they protect the confidentiality (keeping information private), integrity (ensuring information isn't altered), or availability (ensuring systems remain accessible) of your data and systems.
Three Categories of Controls
Controls fall into three categories based on how they work:
Administrative controls are policies, procedures, and guidelines that govern how people behave within an organization. These are often the foundation of a security program because they establish expectations and accountability. Examples include security awareness training (teaching employees to recognize threats), access-right reviews (verifying that people have only the permissions they need), and incident-response planning (preparing for when security events occur).
Technical controls (also called logical controls) use technology to enforce security policies. These are the systems and software that actively protect your infrastructure. Firewalls filter network traffic, intrusion-detection systems monitor for suspicious activity, and encryption transforms sensitive data into unreadable form unless you have the correct key.
Physical controls protect your actual facilities and hardware from unauthorized access, theft, or damage. This includes locked doors to server rooms, surveillance cameras monitoring sensitive areas, and access badges that allow only authorized personnel into restricted spaces.
The most effective security programs use all three types together. Technology alone won't work if employees haven't been trained; policies alone won't work without enforcement mechanisms.
Defense in Depth: The Layered Approach
Defense in depth is a security philosophy that uses overlapping layers of protection so that the failure of one component does not compromise the entire system. Think of it like the layers of an onion—you must pass through multiple barriers to reach the center.
The typical layers are:
Administrative controls form an outer layer, establishing policies and governance that guide the entire organization
Network security controls what data enters and exits your systems, using firewalls and similar technologies
Host-based security protects individual computers and servers through antivirus software and system hardening
Application security ensures that software itself is designed and built securely
Data at the core is protected by encryption and access controls
Notice that data sits at the center, surrounded by protective layers. An attacker would need to breach multiple layers to reach sensitive information. For example, a network firewall might stop an attack at the network layer, but even if that fails, host-based intrusion detection might catch it at the system layer. This redundancy is intentional—it reflects the reality that no single control is perfect.
Reference Frameworks
Organizations don't create security programs from scratch. Instead, they rely on established frameworks that provide guidance on which controls to implement.
ISO/IEC 27001 is an international standard that defines a catalog of security controls across multiple domains (such as access control, cryptography, and incident management). It provides a checklist of controls that organizations should consider implementing.
ISO/IEC 27002 provides detailed guidelines for implementing those controls, offering best practices and recommendations for how to operationalize information security standards within an organization.
These frameworks are valuable because they represent collective knowledge from security experts worldwide—your organization can benefit from proven practices rather than inventing controls from scratch.
<extrainfo>
While these frameworks provide comprehensive guidance, they should be tailored to your organization's specific risks and context. Not every control in ISO/IEC 27001 is appropriate for every organization.
</extrainfo>
Evaluating Security Controls
All security countermeasures provide some protection, but none can eliminate risk entirely. This is an important reality check: you will never achieve perfect security. Instead, security professionals evaluate controls based on how effectively they reduce specific threats.
When assessing whether a control is worthwhile, you must weigh its cost and complexity against the threats it addresses and the assets it protects. A sophisticated encryption system might be overkill for protecting public information, but essential for protecting financial data.
Audit and Control Assessment
An audit evaluates the effectiveness of security controls, checks whether the organization complies with its own policies, and assesses the integrity of information systems. Audits are a critical way to verify that controls actually work in practice—not just in theory.
The typical audit process includes several phases:
Planning involves defining the scope of the audit, determining which systems and controls to examine, and gathering background information
Evidence collection involves gathering data about how controls are operating—this might include reviewing logs, interviewing staff, or examining documentation
Testing involves actually checking whether controls function as intended
Reporting communicates findings to management, identifying what's working well and what needs improvement
Follow-up ensures that identified weaknesses are addressed
Administrative controls like access-right reviews are particularly important to audit, because over time, employee roles change and access permissions can become inappropriate or excessive. Without periodic review, your access control system gradually degrades.
Flashcards
What is the primary basis for choosing specific security controls?
Results of the risk assessment
Which three core security principles do controls protect?
Confidentiality
Integrity
Availability
What are the three main categories of security controls based on their implementation?
Technical
Administrative
Physical
Which ISO standard provides specific guidelines for implementing organizational information security standards?
ISO/IEC 27002
What is the primary goal of using overlapping layers in the defense in depth philosophy?
To ensure failure of one component does not compromise the whole system
What are the three primary layers used in a layered security approach?
Administrative controls
Logical controls
Physical controls
What layers typically surround data in the onion model of security?
People
Network security
Host-based security
Application security
To what extent can security countermeasures eliminate risk?
None can eliminate risk entirely
What three factors does an audit evaluate within an information system?
Effectiveness of security controls
Compliance with policies
Integrity of information systems
What do administrative controls govern within an organization?
The behavior of personnel
What is the primary purpose of physical security controls?
Protect facilities and hardware from unauthorized access, theft, or damage
Quiz
Information security - Security Controls and Defense Strategies Quiz Question 1: How are security controls typically selected in an organization?
- Based on the results of the risk assessment (correct)
- According to the cheapest available option
- Following the most popular vendor’s recommendations
- Purely to satisfy regulatory checklists
Information security - Security Controls and Defense Strategies Quiz Question 2: In the onion model of defense in depth, which layer directly surrounds the data core?
- People (correct)
- Network security
- Host‑based security
- Application security
Information security - Security Controls and Defense Strategies Quiz Question 3: During a security countermeasure value assessment, effectiveness is measured against what?
- Potential threats (correct)
- Total cost savings
- User satisfaction
- Number of devices protected
Information security - Security Controls and Defense Strategies Quiz Question 4: What is typically the first phase of an information systems audit?
- Planning (correct)
- Evidence collection
- Testing
- Reporting
Information security - Security Controls and Defense Strategies Quiz Question 5: Which ISO/IEC standard provides guidelines for implementing organizational information security standards?
- ISO/IEC 27002 (correct)
- ISO/IEC 27001
- NIST SP 800-53
- COBIT
How are security controls typically selected in an organization?
1 of 5
Key Concepts
Information Security Standards
ISO/IEC 27001
ISO/IEC 27002
Security control
Security Strategies and Controls
Defense in depth
Onion model (security)
Administrative control
Technical control
Physical control
Assessment and Auditing
Information systems audit
Risk assessment
Definitions
Security control
A safeguard or countermeasure implemented to protect the confidentiality, integrity, or availability of information assets.
ISO/IEC 27001
An international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.
ISO/IEC 27002
A code of practice providing guidelines and best practices for selecting, implementing, and managing information security controls.
Defense in depth
A security strategy that employs multiple, overlapping layers of protection to mitigate the impact of a single point of failure.
Onion model (security)
A conceptual diagram that visualizes security layers as concentric rings, with data at the core surrounded by people, network, host, and application protections.
Information systems audit
An independent examination of an organization’s information systems to assess control effectiveness, compliance, and data integrity.
Administrative control
Policies, procedures, and governance mechanisms that direct personnel behavior and manage organizational security practices.
Technical control
Technological mechanisms, such as firewalls, intrusion‑detection systems, and encryption, used to enforce security policies.
Physical control
Measures that protect facilities, hardware, and physical assets from unauthorized access, theft, or damage.
Risk assessment
The process of identifying, analyzing, and evaluating potential threats and vulnerabilities to determine appropriate security controls.