Control
- A protective measure put in place to reduce potential risks and safeguard an organization’s assets
Key Principles
- Least Privilege — Users and systems should only have necessary access rights to reduce the attack surface
- Defense in Depth — Utilize multiple layers of security to ensure robust protection even if one control fails
- Risk-based Approach — Prioritize controls based on potential risks and vulnerabilities specific to the infrastructure
- Lifecycle Management — Regularly review, update, and retire controls to adapt to the evolving threat landscape
- Open Design Principle — Ensure transparency and accountability through rigorous testing and scrutiny of controls
Methodology
- Assess current state — Understand existing infrastructure, vulnerabilities, and current controls
- Gap analysis — Identify discrepancies between current and desired security postures
- Set Clear Objectives — Define specific goals for adding new controls (data protection, uptime, compliance, etc.)
- Benchmarking — Compare your organization’s processes and security metrics with industry best practices
- Cost-Benefit Analysis — Evaluate the balance between desired security level and required resources
- Stakeholder Involvement — Engage relevant stakeholders to ensure controls align with business operations
- Monitoring and Feedback Loops — Continuously revisit control section to adapt to evolving threats
Best Practices
Conduct Risk Assessment
- Regularly assess threats and vulnerabilities specific to your organization, and update it with significant changes
Align with Frameworks