Security Controls

Security Controls

Security Controls Jonathan Poland

IT security controls are measures that are implemented in order to reduce security risks. These controls may be identified through security audits or as part of projects and continuous improvement efforts. They can be implemented as a matter of process, procedure, or automation, and are designed to protect against potential security threats or vulnerabilities.

There are many different types of IT security controls that can be implemented, including technical controls such as firewalls and antivirus software, as well as administrative controls such as security policies and employee training programs. These controls are often tailored to the specific needs and risks of an organization, and may be adjusted over time as the security landscape evolves.

Effective IT security controls are essential for protecting an organization’s assets, including sensitive data, systems, and networks. They can help to prevent data breaches, cyber attacks, and other security incidents, and are an important part of any organization’s overall risk management strategy. It is important to regularly review and update IT security controls in order to ensure that they are effective and aligned with the changing needs of the organization. The following are illustrative examples of IT security controls.

Authentication

Employees are required to pass multi factor authentication before gaining access to offices.

Audit Trail

A web server records IP addresses and URLs for each access and retains such information for a period of time as an audit trail.

Training

Employees are trained in defensing computing on an annual basis.

Peer Review

Design changes to a critical system require a secure code review.

Communication

Employees are prohibited from attaching documents to internal emails as they can easily be misaddressed. Instead, employees send a link to a document management system that offers authentication and authorization.

Incident Management

Any employee who loses an electronic device that has been used for work is required to report an incident immediately.

Cryptography

Data in storage is encrypted on all devices.

Passwords

Systems perform validation to ensure employees choose strong passwords.

Processes

An IT governance process reviews security incidents on a monthly basis.

Automation

A website places a three hour freeze on a customer’s account if they get their password wrong five times. This dramatically reduces the potential for brute force attacks.

Configuration Management

Changes to firewall rules require an approved change request.

Security Testing

Major system software releases are required to undergo security testing.

Learn More
Bankability Jonathan Poland

Bankability

Bankability is a term used to describe the ability of a project or venture to secure financing from a lender…

Risk Contingency Jonathan Poland

Risk Contingency

A risk contingency plan is a course of action that is put in place to mitigate the negative consequences of…

Product Transparency Jonathan Poland

Product Transparency

Product transparency refers to the practice of providing extensive information about products and services, including their ingredients, production methods, and…

Quality Goals Jonathan Poland

Quality Goals

Quality goals are specific targets that are set to improve the quality of a product, service, or process. They are…

Nudge Theory Jonathan Poland

Nudge Theory

Nudge theory is the idea that subtle suggestions, choices, and positive reinforcement can be more effective than commands, rules, and…

Preventive Maintenance Jonathan Poland

Preventive Maintenance

Preventive maintenance is a type of maintenance that is designed to prevent failures and extend the lifespan of assets, including…

The GSA Process 150 150 Jonathan Poland

The GSA Process

The General Services Administration (GSA) is an independent agency of the United States government responsible for managing and supporting the…

Elevator Pitch Jonathan Poland

Elevator Pitch

An elevator pitch is a brief, persuasive speech that is used to quickly and simply explain an idea or concept.…

Substitution Pricing Jonathan Poland

Substitution Pricing

A substitution price is the price at which a customer will choose to switch to a different product or service…

Content Database

Search over 1,000 posts on topics across
business, finance, and capital markets.

Strategic Planning Jonathan Poland

Strategic Planning

The strategic planning process is a systematic way for an organization to set its goals and develop the actions and…

Internal Branding Jonathan Poland

Internal Branding

Internal branding involves creating a strong brand identity within the company itself, rather than just focusing on marketing to customers.…

Relative Advantage Jonathan Poland

Relative Advantage

Relative advantage refers to the extent to which a company’s product, service, or offering is superior to those of its…

Procurement Jonathan Poland

Procurement

Procurement is the process of acquiring goods or services from external vendors or suppliers. It is an essential part of…

Cash Flow Statement Jonathan Poland

Cash Flow Statement

The cash flow statement is a financial statement that shows the inflows and outflows of cash for a company over…

Abundance Mentality Jonathan Poland

Abundance Mentality

Abundance mentality is the belief that there is enough for everyone, and that abundance, rather than scarcity, should be the…

Keep It Super Simple Jonathan Poland

Keep It Super Simple

Keep it Super Simple or Keep it Simple Stupid. The KISS principle is a design guideline that suggests that unnecessary…

Marketing Media Jonathan Poland

Marketing Media

Marketing media refers to the channels or platforms that businesses use to deliver their marketing messages to their target audiences.…

Operations 101 Jonathan Poland

Operations 101

Business operations refer to the processes and activities that are involved in the production of goods and services in an…