Security 1.1 - Security Control Types (1)
Security 1.1 - Security Control Types (1)
events can help identify suspicious or anomalous behaviors to identify suspicious or malicious
data transmitted between remote users and honeynets can be used as compensating controls
corporate networks. to deceive and distract attackers while gathering
● Encryption: Encryption protects sensitive data intelligence about their tactics and techniques.
stored or transmitted over insecure channels.
Encrypting the data helps prevent unauthorized
access and maintain confidentiality.
Directive Controls
● Directive security controls are measures put in ● Password Policies: Requirements for creating,
place to establish rules, policies, and procedures managing, and safeguarding passwords.
that provide clear guidance on acceptable Examples include minimum password length,
behaviors, practices, and actions with security
complexity requirements, expiration intervals, and
policies.
restrictions on password reuse.
● Security Policies: Documents that outline the
rules for protecting information assets and ● Remote Access Policies: Define the requirements
maintaining a secure environment. and restrictions for accessing organizational
● Acceptable Use Policies (AUP): AUPs define the resources remotely, such as through virtual
behaviors and activities that users are permitted private networks (VPNs) or remote desktop
to engage in when accessing and using
services.
organizational resources, including computers,
networks, and data.