Designing and implementing proper security controls requires a systematic and thorough approach to ensure the confidentiality, integrity, and availability of information systems and data.

It is important to note that designing and implementing proper security controls is an ongoing process that requires continuous monitoring and improvement. Effective security controls will help protect the confidentiality, integrity, and availability of information and systems, and reduce the risk of data breaches and other security incidents.

Here are the steps to follow:

  1. Assess risk: Start by identifying potential security threats and assessing the risk to your organization. This will help determine what types of controls are necessary to mitigate those risks.
  2. Choose security controls: Based on the risk assessment, select the appropriate security controls to implement. This may include technical controls such as firewalls, access control systems, and encryption, as well as administrative controls such as policies, procedures, and employee training.
  3. Implement security controls: Once the security controls have been selected, implement them in a manner that is consistent with best practices and industry standards. Ensure that the controls are integrated with existing systems and processes and that they are tested and validated to ensure their effectiveness.
  4. Monitor and review: Continuously monitor and review the security controls to ensure they are functioning as intended. Regularly assess the effectiveness of the controls and make changes as necessary to ensure that they continue to meet the organization’s security requirements.
  5. Update policies and procedures: Regularly review and update policies, procedures, and standards to reflect changes in the threat landscape, security best practices, and organizational requirements.
  6. Provide ongoing training: Provide ongoing training to employees to ensure that they understand the importance of information security and are aware of the security controls in place.

Information security is largely about managing risk. That means IT controls are implemented depending on the risk they are designed to manage. The focus is on mitigating risk by implementing appropriate security controls.

Here are some ways to deal with risk.

  • Risk can be Avoided
  • Risk can be Transferred
  • Risk can be Accepted

The following activities consider the implementation of controls within the context of such a framework:

  • Discover and classify data and information systems
  • Select security controls
  • Implement security controls
  • Assess security controls
  • Authorize the controls
  • Monitor the controls

Selecting security controls is best approached by first adhering to a common set of basic or baseline controls. We might need to apply additional controls that are specific to the system or application.

Some common control baselines from the NIST Standard 800-53:

CONTROLS FAMILYCONTROL EXAMPLES
Access ControlAccount Management; Separation of Duties; Least Privilege
Awareness and TrainingSecurity Awareness; Security Training; Training Records
Audit and AccountabilityAudit of Record Retention; Auditable Events
Security Assessment and AuthorizationPlan of Action and Milestones; Security Authorization
Configuration ManagementBaseline Configuration; Configuration Change Control
Contingency PlanningContingency Training; Alternate Storage Site
Identification and AuthenticationIdentifier Management; Cryptographic Module Authentication
Incident ResponseIncident Handling; Incident Monitoring; Incident Reporting
MaintenanceControlled Maintenance; Maintenance Tools
Media ProtectionMedia Access; Media Marking; Media Storage
Physical and Environmental ProtectionPhysical Access Controls; Visitor Control; Fire Protection
PlanningSystem Security Plan; Privacy Impact Assessment
Personal SecurityPersonnel Screening; Personnel Termination
Risk AssessmentSecurity Categorization; Vulnerability Scanning
System and Services AcquisitionAllocation of Resources; Security Engineering Principles
System and Communications ProtectionDenial of Service Protection; Boundary Protection
System and Information IntegrityMalicious Code Protection; Spam Protection; Error Handling
Program ManagementEnterprise Architecture; Risk Management Strategy

Some Critical Security Controls from the CIS Supported by SANS:

CIS Control V8; Image Copyright SANS

Conclusion:

In conclusion, proper security controls play a crucial role in protecting the IT infrastructure and ensuring compliance with regulations and standards. Designing and implementing these controls involves identifying the risk areas, determining the control objectives, selecting appropriate security controls, and monitoring the implementation for effectiveness. It is important to regularly review and update the security controls to ensure their continued effectiveness in protecting the IT infrastructure.

This Post Has One Comment

  1. grossekalluswko9l2+6jbqdhj0cac1@gmail.com

    recusandae et voluptatem ea sed rerum. quibusdam adipisci sit veritatis similique ab quis suscipit expedita corrupti cumque sint dolores voluptas eligendi ab. optio quibusdam porro maxime et hic eos r

Leave a Reply