Security Controls
Section Introduction
This section provides a brief overview of security controls, grouped by deployment area. Controls are categorized into:
Physical Security Controls β Deterrents, access control measures, and monitoring systems
Network Security Controls β Firewalls, intrusion prevention/detection systems, SIEM, network access control
Endpoint Security Controls β Host-based protections like HIPS, HIDS, EDR, and antivirus
Email Security Controls β Spam filters, data loss prevention, and email scanning
Physical Security
Physical security controls protect buildings and restricted areas from unauthorized access. These measures aim to make intrusion difficult through deterrents, access restrictions, and monitoring systems. While not usually managed by cybersecurity teams, understanding these controls can support investigations.
If attackers gain physical access, they can bypass most defenses. Physical access could allow direct system compromise, theft of sensitive materials, or even damage to critical equipment.
Access Controls
Limit entry to secure areas and ensure only authorized individuals can pass:
Mantraps β Two-stage entry system for secure inspection before granting access.
Turnstiles/Gates β Require ID badge or access card for entry.
Electronic Doors β Restrict access based on role, minimizing exposure to sensitive areas.
Monitoring Controls
Provide real-time detection and evidence collection:
CCTV β Continuous video monitoring for security teams.
Security Guards β Trained staff to monitor and respond to incidents.
Intrusion Detection Systems β Alerts triggered by motion, heat, or sound (e.g., breaking glass).
Deterrents
Discourage attempts to gain entry:
Warning Signs β Inform potential intruders of legal or policy violations.
Fences/Barbed Wire β Physical barriers that slow or prevent entry.
Guard Dogs β Visible, trained animals that discourage intrusion.
Security Lighting β Eliminates dark areas that could conceal unauthorized activity.
Visible CCTV β Cameras (operational or not) that signal surveillance is in place.
Endpoint Security
Endpoint security focuses on protecting individual devices such as laptops, desktops, and servers from malicious activity. These defenses form a foundational layer of protection and are built upon in later parts of the course.
Host Intrusion Detection (HIDS)
Monitors endpoint activity for suspicious patterns.
Generates alerts for analysts or pushes them to a SIEM for investigation.
Host Intrusion Prevention (HIPS)
Similar to HIDS but takes automated defensive actions.
Can block connections, remove malicious files, or terminate harmful processes.
Anti-Virus Solutions
Signature-based β Detects malware by known patterns; limited against unknown threats.
Behavior-based β Flags deviations from normal system behavior to identify new threats.
Log Monitoring
Endpoints send logs to a SIEM for centralized analysis.
Unusual behavior triggers alerts for investigation.
Endpoint Detection and Response (EDR)
Combines logging, monitoring, and response capabilities.
Enables analysts to investigate and respond to suspicious activity remotely.
Vulnerability Scanning
Identifies weaknesses and misconfigurations on endpoints.
External scans simulate an attackerβs view.
Internal scans assess internal systems for security gaps.
Credentialed scans provide deeper insight into configurations; non-credentialed scans show attacker-visible risks.
Compliance Scanning
Ensures systems meet security standards required by compliance frameworks.
Uses scanner profiles tailored to framework requirements.
Email Security
Email remains the top attack vector for compromising organizations, often through phishing. Technical defenses are critical, but because email attacks target people rather than systems, employee training is equally important.
Spam Filter
Scans incoming messages for signs of spam or malicious content.
Blocks suspicious messages before they reach employee inboxes, reducing exposure.
Data Loss Prevention (DLP)
Monitors outgoing emails to prevent unauthorized transmission of sensitive data.
Can scan body text, headers, and attachments for keywords, patterns, or sensitive information.
Blocks and alerts when policy violations are detected.
Email Scanning
Analyzes email content, URLs, and attachments for malicious indicators.
Uses blacklists, signatures, and pattern analysis to detect threats.
Quarantines suspicious emails and alerts the security team.
Security Awareness Training
Educates employees on recognizing and responding to phishing attempts.
Reinforces proper reporting procedures for suspicious emails.
Often paired with simulated phishing campaigns to measure and improve awareness.
Network Security
Network security controls protect networks and connected systems from unauthorized access, malicious activity, and attacks. This section introduces foundational defenses that will be built on later in the course.
Network Intrusion Detection (NIDS)
Monitors network traffic for suspicious activity.
Can be deployed inline, via network taps, or through SPAN ports.
Generates alerts for analysts to investigate but does not take direct action.
Network Intrusion Prevention (NIPS)
Similar to NIDS but can automatically take defensive actions.
Can block suspicious traffic, such as stopping a system from scanning other devices.
Firewalls
Restrict traffic between network segments, often separating internal networks from the internet.
Types include:
Standard firewalls β Dedicated hardware at network boundaries.
Local firewalls β Software on endpoints (e.g., Windows Firewall).
Web application firewalls β Protect web servers and applications.
Log Monitoring
Network devices send logs to a SIEM for centralized analysis.
Examples of valuable logs:
Web proxy logs β Track websites visited; can trigger alerts for malicious or restricted sites.
Perimeter firewall logs β Detect scanning activity, DDoS attempts, and other suspicious traffic.
Network Access Control (NAC)
Ensures only compliant devices can connect to the network.
Can enforce security requirements like patches and antivirus.
Common in BYOD and guest networks, as well as public Wi-Fi environments with access restrictions
AAA Control Methods
AAA in cybersecurity refers to Authentication, Authorization, and Accountability. These principles work together to ensure only approved individuals can access IT resources, minimizing risks from account compromises and misuse.
Authentication
Verifies the identity of a user through one or more factors:
Something you know β Passwords, PINs, or security questions.
Something you have β Physical items like ID badges, keys, or authenticator apps.
Something you are β Biometric identifiers such as fingerprints, facial recognition, or retinal scans.
Using at least two of these factors creates a multi-factor authentication (MFA) setup, which significantly strengthens security.
Authorization
Determines what an authenticated user can do or access.
Access is limited to what is required for their role (Principle of Least Privilege).
Example: A Tier 1 SOC Analyst can use the SIEM interface but does not need administrative backend access.
Limiting permissions reduces the impact of compromised accounts.
Accountability
Tracks and records user actions to provide evidence of activity.
Example (digital) β Logins, file changes, or deletions are logged and timestamped.
Example (physical) β Building entry tracked by ID badge use, supported by CCTV.
Accountability ensures that actions can be reviewed, validated, and attributed to the correct individual, supporting investigations and reducing misuse.
Last updated