Cyber Risk Guy

Implementing Controls

Learn how to actually put security measures in place - like installing locks, cameras, and alarms for your house, but for computers and data!

Author
David McDonald
Read Time
8 min
Published
August 9, 2025
Updated
August 9, 2025
COURSES AND TUTORIALS

You’re Moving to a New House! 🏠

Scenario: You just bought a house in a neighborhood with some break-ins recently. You want to protect your family and belongings, so you decide to install security measures.

What are your options? Let’s think through this like a security expert would:

Your Security Shopping List 📝

  • Locks for doors and windows (prevent break-ins)
  • Security cameras to record what happens (detect problems)
  • Home alarm system to alert you and police (detect and correct)
  • Motion lights in the yard (prevent and detect)
  • A big dog (prevent, detect, and deter!)
  • Insurance policy (correct financial damage after problems)

Here’s the amazing part: Organizations implement cybersecurity controls using the EXACT SAME thinking process!

The 3 Types of Security Controls 🛡️

Just like protecting your home, cybersecurity controls come in 3 main categories:

1. 📋 Administrative Controls - “The Rules and Training”

What they are: Policies, procedures, and training that tell people what to do.

Home Security Examples:

  • Family rules: “Always lock the door when you leave”
  • Emergency plan: “If alarm goes off, call 911 and meet at neighbor’s house”
  • Training kids: “Don’t open the door for strangers”
  • Visitor policy: “All contractors must show ID and be escorted”

Business Cybersecurity Examples:

  • Password policy: “Use strong, unique passwords for each system”
  • Email rules: “Don’t click links in suspicious emails”
  • Access policy: “Only HR can access employee records”
  • Incident response plan: “If you suspect a breach, call IT immediately”

2. 💻 Technical Controls - “The Computer Stuff”

What they are: Technology solutions that automatically protect, detect, or respond to threats.

Home Security Examples:

  • Smart locks: Automatically lock after 30 seconds
  • Security cameras: Automatically record motion
  • Alarm system: Automatically calls police if triggered
  • Motion lights: Automatically turn on when someone approaches

Business Cybersecurity Examples:

  • Firewalls: Automatically block suspicious internet traffic
  • Antivirus software: Automatically scan and remove malware
  • Two-factor authentication: Require phone code + password to log in
  • Encryption: Automatically scramble data so thieves can’t read it

3. 🏢 Physical Controls - “The Physical Barriers and Guards”

What they are: Physical barriers and environmental protections.

Home Security Examples:

  • Strong doors and locks: Physical barrier to entry
  • Fences and gates: Control who can access your property
  • Security guard: Human protection and monitoring
  • Safe: Physical protection for valuable items

Business Cybersecurity Examples:

  • Locked server rooms: Only IT staff can access computers physically
  • Badge readers: Card required to enter different areas of building
  • Security guards: Monitor who enters/exits the building
  • Surveillance cameras: Physical monitoring of facilities

The 3 Purposes of Security Controls 🎯

Every security control (whether for your house or a business) serves one of three purposes:

1. 🚫 PREVENT - “Stop Bad Things from Happening”

Goal: Make it impossible or very difficult for bad things to occur.

Home Examples:

  • Deadbolt locks: Stop burglars from easily opening doors
  • Bright exterior lights: Discourage burglars from approaching
  • “Beware of Dog” signs: Scare away potential intruders

Business Examples:

  • Strong passwords: Stop hackers from guessing login credentials
  • Employee training: Stop staff from falling for phishing emails
  • Firewalls: Stop malicious internet traffic from reaching systems

2. 👀 DETECT - “Notice When Bad Things Happen”

Goal: Quickly discover when something bad is occurring or has occurred.

Home Examples:

  • Security cameras: Record evidence of break-ins
  • Motion sensors: Alert you when someone is in your yard
  • Door/window alarms: Immediately notify you if entry points are opened

Business Examples:

  • Log monitoring: Notice when someone accesses systems at weird hours
  • Intrusion detection: Alert when hackers try to break into networks
  • Antivirus alerts: Notify when malware is found on computers

3. ⚡ CORRECT - “Fix Problems and Get Back to Normal”

Goal: Respond to incidents and recover from damage quickly.

Home Examples:

  • Alarm system calls police: Automatic response to break-ins
  • Insurance policy: Pays to replace stolen items
  • Backup keys with neighbor: Can still get in if locked out

Business Examples:

  • Data backups: Restore files if they’re deleted or encrypted by ransomware
  • Incident response team: Investigate and contain security breaches
  • Cyber insurance: Pays for legal fees and recovery costs after attacks

Real-World Example: Protecting a Coffee Shop ☕

Let’s see how a small coffee shop might implement all three types of controls:

📋 Administrative Controls

  • Cash handling policy: “Never leave more than $200 in register overnight”
  • Employee training: “How to spot fake credit cards and suspicious behavior”
  • WiFi usage rules: “Customers can use guest network, employees use separate network”

💻 Technical Controls

  • Point-of-sale security: Credit card payments encrypted and sent securely
  • Security cameras: Digital recording system with cloud backup
  • WiFi separation: Guest network isolated from business systems

🏢 Physical Controls

  • Strong locks: Deadbolts on doors, bars on windows
  • Safe: Cash and sensitive documents locked up overnight
  • Security lighting: Motion-activated lights in alley and parking area

The 3 Purposes in Action

  • PREVENT: Locks and lighting discourage break-ins, employee training prevents payment fraud
  • DETECT: Cameras record incidents, POS system flags suspicious transactions
  • CORRECT: Safe limits cash losses, insurance covers major theft, backup systems restore data

How to Choose the Right Mix of Controls 🎛️

The key insight: You need ALL THREE types working together. Here’s why:

Why You Can’t Rely on Just One Type

❌ Only Administrative Controls (Rules)

  • Problem: People make mistakes or ignore rules
  • Example: Password policy requiring complex passwords, but no technical enforcement means people still use “password123”

❌ Only Technical Controls (Technology)

  • Problem: Technology can fail or be bypassed
  • Example: Perfect firewall, but employee clicks malicious email attachment that bypasses all network security

❌ Only Physical Controls (Barriers)

  • Problem: Can’t protect against remote attacks or insider threats
  • Example: Locked server room, but hackers attack through the internet connection

✅ The Winning Combination: Layered Security

Smart organizations layer multiple controls:

Example: Protecting Customer Credit Card Data

Administrative Layer:

  • Train all employees on PCI compliance rules
  • Policy requiring immediate reporting of suspected breaches
  • Regular security awareness training

Technical Layer:

  • Encrypt all credit card data in databases
  • Network monitoring to detect unusual access patterns
  • Automatic log analysis looking for suspicious activity

Physical Layer:

  • Lock server rooms containing payment systems
  • Badge access required for data center areas
  • Security cameras monitoring sensitive areas

If any one layer fails, the others are still protecting the data!

Key Takeaways ✅

Before you move to the next lesson, make sure you understand:

  1. Three types of controls: Administrative (rules), Technical (technology), Physical (barriers)
  2. Three purposes of controls: Prevent problems, Detect problems, Correct problems
  3. Layer different types together - don’t rely on just one type
  4. You already use these concepts when securing your home and personal life
  5. Every control serves a specific purpose in your overall security strategy

Ready for Lesson 10? 🏗️

Next up: Cybersecurity Frameworks

Now that you understand how to implement individual security controls, you’ll learn about frameworks - pre-made blueprints that help organizations choose the right combination of controls.

Think of it like having architectural blueprints when building a house - instead of figuring out every single detail yourself, you follow a proven plan that experts have already tested!

You’re almost done with the fundamentals! Controls → Frameworks → Monitoring → Compliance → Conclusion. The finish line is in sight! 💪

Reader Feedback

See what others are saying about this article

Did you enjoy this article?

Your feedback helps me create better content for the cybersecurity community

Share This Article

Found this helpful? Share it with your network to help others learn about cybersecurity.

Link copied to clipboard!

Share Feedback

Help improve this content by sharing constructive feedback on what worked and what didn't.

Thank you for your feedback!

Hire Me

Need help implementing your cybersecurity program? Let's work together.

Support Me

Help keep great cybersecurity content coming by supporting me on Patreon.

David McDonald

I'm David McDonald, the Cyber Risk Guy. I'm a cybersecurity consultant helping organizations build resilient, automated, cost effective security programs.

;