From the course: Complete Guide to Cybersecurity: A Practical Approach

Understanding security controls

- [Instructor] Security controls nowadays pertain to the Physical, the Technical, and the Administrative mechanisms that will act as safeguards or countermeasures or mitigations for information systems to protect what we cover earlier, which is confidentiality, integrity, and availability of the systems, and of course information within your organization. So let's start with Physical controls. Those address the need of things like batch readers, security guards, different facilities, and you know, security measures in those facilities, whether they are locks or fences or very, very sophisticated methods of access, physical access, that means, right, whether it's the buildings, parking lots and so on. Now, some of the physical security mechanisms and solutions will require some technical controls. For example, the integration of a batch or token reader for somebody to access a building or the door release mechanisms, identity management systems and access control systems to allow a person to enter a building or exit a building for that matter. Now, technical controls are also called logical controls. There are security controls that computer systems and network basically directly implement, whether it's a firewall, an intrusion prevention system, a cloud-based system on where you may have monitoring capabilities and different cloud security solutions out there. And again, you know, whether it's in the cloud or on premise, you may be already familiar with some of those technical controls. And then the last one is Administrative controls. These are also called managerial controls. And these are directives. These are policies, these are guidelines and advisories aimed at the people within the organization and they provide a framework and standards for either human behavior and other activities. And they should cover the entire scope of the organization's activities and the interactions with external parties and stakeholders. For example, a business peer, a business partner, customers and so on.

Contents