Play It Safe: Manage Security Risks introduces me to the core principles of cybersecurity risk management. The course focuses on identifying, assessing, and responding to security threats, risks, and vulnerabilities that affect business operations. It emphasizes the use of security frameworks, controls, and tools such as SIEM systems and playbooks to strengthen organizational defenses and ensure resilience.
The course also allows me to explore how cybersecurity professionals apply structured frameworks, such as the NIST Risk Management Framework (RMF) and fundamental models such as the CIA Triad, to protect critical assets, ensure compliance, and promote proactive risk management.
By completing this course, I was able to:
Identify and evaluate threats, vulnerabilities, and risks in organizational environments.
Apply security frameworks and controls to strengthen organizational defenses.
Use cybersecurity tools, such as SIEM, IDS, firewalls, MFA, and vulnerability scanners, to detect and analyze incidents.
Develop and implement incident response playbooks for real-world cybersecurity scenarios.
Foster security awareness and ethical decision-making across teams.
Overview
In this module, I explored the foundational areas of cybersecurity that define how professionals protect an organization’s assets, networks, and data. The module introduced the eight CISSP Security Domains, which serve as a global standard framework for organizing cybersecurity work. Understanding these domains helped me see how each area contributes to a strong security posture, the overall readiness of an organization to prevent, detect, and respond to threats.
1. Security and Risk Management:
This domain taught me how to establish and maintain a strong security posture, the organization’s ability to manage its defenses, and react to changes or threats. I learned how setting clear goals, compliance strategies, and risk mitigation plans ensures business continuity.
Practical Example:
An organization may implement the NIST Risk Management Framework (RMF) to identify and mitigate risks such as data breaches. For instance, a company handling customer financial data could establish strict access controls, apply encryption, and enforce compliance with standards like ISO 27001 or GDPR to protect sensitive information.
2. Asset Security:
This domain emphasized the importance of classifying, protecting, and managing assets—both digital and physical. I learned to apply data classification levels (e.g., public, internal, confidential) and align them with appropriate protection mechanisms.
Practical Example:
A financial institution might label its data assets as public, internal, or confidential and apply corresponding controls such as encryption or access restrictions. Regular backups and data recovery plans ensure that critical data remains available even in cases of ransomware or system failure.
3. Security Architecture and Engineering:
Here, I learned how to design secure systems that integrate protection from the ground up. The focus was on principles such as least privilege, defense in depth, and zero trust to build resilient networks and infrastructures.
Practical Example:
A corporate network may integrate multiple layers of protection, such as firewalls, intrusion detection systems (IDS), and SIEM tools, to detect anomalies in real time. Security engineers design the network so that even if one layer fails, others continue to protect the environment.
4. Communication and Network Security:
This domain showed me how to secure physical and wireless networks to protect data in transit. I studied how encryption, VPNs, and secure protocols (like HTTPS, TLS) keep communications confidential and authentic.
Practical Example:
Remote employees often connect to corporate resources through VPNs (Virtual Private Networks) combined with multi-factor authentication (MFA). These tools protect data transmissions over public networks and prevent unauthorized interception. Similarly, disabling insecure Wi-Fi or Bluetooth connections helps reduce potential entry points for attackers.
5. Identity and Access Management (IAM):
IAM focuses on controlling who has access to what. I learned to implement policies that verify user identities and ensure access aligns with the principle of least privilege.
Practical Example:
Implementing a principle of least privilege, the organization ensures new employees access only the systems required for their specific roles. Permissions are promptly revoked upon transfer or departure. This critical measure significantly reduces the risk of insider threats and unauthorized data access.
6. Security Assessment and Testing:
This domain taught me the importance of regular assessments and penetration testing to uncover weaknesses before attackers do. I learned how to conduct audits, analyze logs, and validate security controls.
Practical Example:
A cybersecurity team might run regular vulnerability scans on web applications to detect outdated software versions or weak configurations. Detected vulnerabilities are patched promptly, reducing the attack surface and improving organizational security.
7. Security Operations:
I learned to handle active threats and incidents using monitoring tools and coordinated responses. This domain covers incident management, forensics, and log analysis, ensuring organizations can quickly contain and recover from attacks.
Practical Example:
If a SIEM system alerts security analysts to unusual database access attempts after business hours, the analysts investigate logs, isolate the compromised account, and report findings according to the organization’s incident response playbook. This proactive monitoring minimizes damage and recovery time.
8. Software Development Security:
This domain helped me understand how secure coding practices are embedded throughout the software development life cycle (SDLC). I learned how developers and analysts collaborate to prevent vulnerabilities early.
Practical Example:
Before launching a new healthcare app, the security analysts would ensure all patient data is encrypted, validated, and tested for vulnerabilities such as SQL injection or cross-site scripting. This ensures compliance with standards like HIPAA.
Key Takeaway
Understanding these eight security domains helped me connect theory to real-world practice. Each domain plays a vital role:
Security and Risk Management defines the “why.”
Asset Security identifies the “what.”
Security Architecture and Engineering, Communication and Network Security build the “how.”
IAM, Security Assessment and Testing, and Security Operations enforce and monitor protection.
Software Development Security ensures security is embedded from the start.
Together, they form a comprehensive framework that allows me to think holistically like a cybersecurity professional, aligning technology, policy, and people to protect organizational assets effectively.
Overview
This module explores how organizations establish structured approaches to manage cybersecurity risks and maintain compliance. It covers leading security frameworks, the CIA Triad, key OWASP principles, and the implementation of security controls that collectively safeguard business operations. Understanding these elements provides the foundation for building a resilient cybersecurity posture that aligns technology, policy, and human behavior.
1. Understanding Security Frameworks
Security frameworks are strategic blueprints that guide how organizations identify, assess, and manage cybersecurity risks. They ensure consistency, accountability, and continuous improvement in protecting digital assets.
Key Frameworks
NIST Cybersecurity Framework (CSF)
The NIST CSF provides five core functions: Identify, Protect, Detect, Respond, and Recover, which create a lifecycle for managing cybersecurity risk.
Example: When a workstation is compromised, NIST CSF helps guide response: Identify the affected device, Protect by isolating it, Detect further anomalies, Respond by investigating the cause, and Recover by restoring clean backups.
NIST SP 800-53
This framework offers a comprehensive catalog of security controls used by U.S. federal agencies and contractors. It focuses on maintaining confidentiality, integrity, and availability (CIA) across critical systems.
Example: Federal organizations apply strict access controls and encryption to protect classified information databases and ensure compliance with federal mandates.
Implementation in Practice
Organizations typically follow a structured process:
Categorize information systems based on risk levels.
Select and tailor controls from the NIST catalog.
Implement and document the controls.
Assess, authorize, and monitor system performance continuously.
This cyclical approach ensures that security measures evolve with new technologies and emerging threats.
3. Security Controls
Security controls are the safeguards and countermeasures organizations use to protect systems and data. They fall into three main categories:
Administrative Controls
Policies and procedures that shape security culture and employee behavior.
Example: Annual cybersecurity training, access control policies, and incident response plans that align staff responsibilities with organizational standards.
Technical Controls
Technology-based mechanisms that enforce security rules.
Example: Firewalls that block unauthorized access, encryption for data in transit and at rest, and intrusion detection systems (IDS) that identify suspicious activities.
Physical Controls
Tangible measures that protect facilities and equipment.
Example: Secured server rooms with access cards, CCTV surveillance, and hardware locks to prevent unauthorized entry or tampering.
These controls work together to enforce compliance, reduce risk, and strengthen overall defense.
4. OWASP Security Principles
The Open Worldwide Application Security Project (OWASP) provides practical principles for reducing vulnerabilities and building secure systems.
Core Principles
Minimize Attack Surface Area: Disable unnecessary services and limit exposed entry points.
Example: Restricting admin access to only essential servers.*
Principle of Least Privilege: Grant users the minimum permissions required for their role.
Example: A customer service representative can view customer data but not modify system settings.*
Defense in Depth: Apply multiple security layers—like MFA, firewalls, and EDR—to ensure redundancy in protection.
Separation of Duties: Divide critical tasks among different personnel to prevent misuse or fraud.
Keep Security Simple: Avoid overly complex systems that create operational blind spots.
Example: Using clear password policies instead of frequent forced resets reduces “password fatigue.”*
Fix Security Issues Correctly: Identify root causes and verify that patches or updates fully resolve vulnerabilities.
Establish Secure Defaults: Ensure the most secure configuration is set by default in software or hardware systems.
Fail Securely: Systems should fail in a secure state—blocking access rather than leaving data exposed.
Don’t Trust External Services: Verify and monitor third-party vendors’ security practices.
Avoid Security by Obscurity: Rely on strong security mechanisms, not secrecy of code or processes.
These principles help ensure that security is consistent, proactive, and embedded into daily operations.
5. Planning a Security Audit
Security audits help organizations evaluate how well frameworks and controls are applied in practice. They identify weaknesses, confirm compliance, and guide continuous improvement.
Audit Planning Steps
Define Scope and Goals: Identify people, assets, policies, and technologies to be assessed.
Conduct Risk Assessment: Determine threats, vulnerabilities, and their potential impact.
Evaluate Controls: Review both preventive and detective measures to verify their effectiveness.
Report Findings: Provide actionable recommendations to improve security posture.
Example:
A retail company performing an audit might assess access permissions, test system configurations, and evaluate employee compliance with data-handling procedures to meet PCI DSS requirements.
Key Takeaway
Security frameworks and controls provide the structure and consistency that organizations need to protect their assets. Frameworks like NIST CSF and SP 800-53 offer scalable approaches for managing risk, while the CIA Triad and OWASP principles define how to protect, detect, and respond effectively. When reinforced through well-planned audits, these elements form the backbone of an organization’s cybersecurity strategy, ensuring that protection is both comprehensive and adaptable.
This module focuses on the tools and technologies that cybersecurity professionals use to detect, analyze, and respond to threats. It highlights the importance of logs, Security Information and Event Management (SIEM) systems, and both open-source and proprietary tools. Through these technologies, organizations can maintain real-time visibility, respond quickly to incidents, and ensure business continuity.
1. Logs: The Foundation of Cybersecurity Monitoring
Logs are the digital footprints that record every event or activity within a system, network, or device. They form the backbone of cybersecurity analysis, enabling professionals to trace incidents, identify anomalies, and understand what occurred, when, and why.
Types of Logs
System Logs: Record operating system-level events like user logins, process startups, or hardware failures.
Server Logs: Capture activities on web, application, or database servers—such as login attempts, access requests, or transaction errors.
Network Logs: Show network traffic flow, routing behavior, and communication patterns.
Firewall Logs: Record allowed and blocked traffic, showing attempts to breach network boundaries.
Cloud Storage Logs: Monitor disk usage, access patterns, and storage capacity issues.
Practical Example:
If an e-commerce website goes offline, cybersecurity analysts review server logs for application errors, firewall logs for blocked connections, and cloud storage logs to check if storage reached capacity. Together, these logs reveal whether the outage resulted from a configuration issue, cyberattack, or system overload.
2. Understanding SIEM (Security Information and Event Management)
A SIEM system centralizes, analyzes, and correlates log data from multiple sources to detect threats, ensure compliance, and support incident response. It provides real-time visibility into an organization’s entire digital environment.
Core Features of SIEM Tools
Centralized Log Management: Collects data from servers, firewalls, and applications into a unified platform for easier analysis.
Automated Alerting: Generates real-time alerts when unusual behavior occurs, such as repeated failed logins or data exfiltration attempts.
Visualization Dashboards: Transforms complex log data into visual charts and timelines that help analysts spot patterns and trends quickly.
Practical Example:
If a SIEM tool detects hundreds of failed login attempts from the same IP address, it automatically triggers an alert. Analysts can visualize this pattern on the dashboard, verify the threat, and block the IP before a breach occurs.
SIEM dashboards convert large volumes of log data into actionable intelligence. Analysts use these visual interfaces to monitor, prioritize, and respond to incidents effectively.
Common SIEM Dashboards
Splunk Dashboards
Security Posture Dashboard: Displays real-time security events, helping SOC teams monitor performance and threats across 24 hours.
Executive Summary Dashboard: Provides high-level summaries of incidents for management and compliance reports.
Incident Review Dashboard: Highlights critical events and creates a timeline of actions leading to an incident.
Risk Analysis Dashboard: Evaluates user, system, and IP behavior to detect anomalies like unusual login times or excessive data transfers.
Chronicle Dashboards
Enterprise Insights: Identifies suspicious domains and assigns severity and confidence scores to potential threats.
Data Ingestion & Health: Monitors log flow accuracy and ensures continuous data capture.
IOC Matches: Tracks known indicators of compromise (IOCs) to prioritize high-risk events.
· User Sign-In Overview: Flags unusual access patterns, such as simultaneous logins from multiple locations.
Practical Example:
A security analyst investigating unusual outbound traffic could use Chronicle’s IOC dashboard to trace a malicious domain and correlate the findings with Splunk’s incident review timeline to confirm and contain the attack.
Emerging Trends
AI-Driven Threat Detection: AI helps recognize attack patterns and reduce false positives.
SOAR Integration (Security Orchestration, Automation, and Response): Automates repetitive tasks and streamlines incident response workflows.
Cloud-Native SIEMs: Offer scalability and speed by leveraging cloud computing power, making them ideal for large, distributed environments.
Example:
A next-generation SIEM tool might automatically detect unusual file access, isolate the affected endpoint, and trigger a predefined incident response playbook without manual intervention.
Cybersecurity tools like SIEM systems empower organizations to detect and respond to threats efficiently. Logs provide the raw data, while SIEM platforms transform that data into actionable intelligence through real-time alerts, dashboards, and visual analytics. Whether using open-source or proprietary tools, the goal remains the same, which is to protect business operations, minimize downtime, and enhance resilience against evolving cyber threats.
This module focuses on how cybersecurity professionals use incident response playbooks to manage and resolve security incidents systematically. Playbooks transform what could be a chaotic process into a structured, consistent, and efficient response. They outline clear roles, predefined actions, and documentation procedures, ensuring that teams act swiftly and accurately when threats arise.
Playbooks are considered “living documents”, which are continuously updated as new threats, technologies, and compliance standards evolve. They work in tandem with tools like SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) to strengthen organizational resilience against cyberattacks.
A playbook is a detailed, step-by-step manual that outlines how cybersecurity teams should identify, respond to, and recover from security incidents.
Each playbook defines:
The specific type of incident (e.g., malware attack, phishing attempt, ransomware).
Who performs each action and when during the incident lifecycle.
What tools, frameworks, and procedures to use for containment and recovery.
Because cyber threats evolve rapidly, playbooks are collaboratively maintained by security professionals from different areas of expertise, ensuring accuracy, efficiency, and compliance with laws and organizational policies.
Playbooks are essential for ensuring standardization, speed, and consistency in incident response. They enable both experienced and entry-level analysts to respond effectively without hesitation or confusion.
Key Benefits
Standardized Response: All analysts follow the same predefined steps, minimizing human error.
Faster Resolution: Analysts act immediately without guessing the next move, reducing mean time to respond (MTTR).
Improved Communication: Clear escalation and reporting paths keep all stakeholders informed.
Compliance Assurance: Actions are documented in line with legal and regulatory standards.
Continuous Improvement: Lessons learned from each incident feed into updated versions of the playbook.
Example:
During a malware incident, a playbook ensures that analysts isolate infected systems, block malicious IPs, restore clean backups, and document every step for audit and post-incident review.
Incident response playbooks typically follow six structured phases, each representing a key stage in managing a cybersecurity incident.
Preparation: This initial phase focuses on proactive measures to reduce the likelihood, risk, and impact of security incidents.
Example: An organization develops a detailed incident response plan, clearly outlining roles and responsibilities for each member of the security team, and conducts regular cybersecurity awareness training for all employees.
Detection and Analysis: The objective here is to identify and analyze security events to determine if a breach has occurred and assess its potential magnitude.
Example: A Security Information and Event Management (SIEM) system generates an alert indicating an unusual number of failed login attempts on a critical server, prompting a security analyst to investigate the event logs for signs of a brute-force attack.
Containment: This phase aims to prevent further damage and minimize the immediate impact of a security incident.
Example: Upon confirming a malware infection on a user's workstation, the security team immediately isolates the affected machine from the network to prevent the malware from spreading to other systems.
Eradication and Recovery: This involves completely removing the incident's artifacts and restoring affected systems to normal, secure operations.
Example: After containing a ransomware attack, the security team removes the malicious code, patches the exploited vulnerability, and restores data from clean backups to bring affected systems back online.
Post-Incident Activity: This phase includes documenting the incident, informing leadership, and applying lessons learned to improve future incident handling.
Example: Following a successful phishing attack, the security team compiles a detailed report, presents findings to management, and updates the security awareness training module to specifically address the tactics used in the recent phishing campaign.
Coordination: This final phase emphasizes reporting incidents and sharing information throughout the response process, ensuring compliance and a coordinated resolution.
Example: During a major data breach, the incident response team regularly communicates with legal counsel, public relations, and regulatory bodies to ensure all reporting requirements are met and public statements are consistent and accurate.
These phases are cyclical. Lessons learned continuously improve the preparation and detection phases for future incidents.
Playbooks don’t operate in isolation — they are closely tied to automation and analytics platforms that streamline the entire response workflow.
Playbooks and SIEM Tools
SIEM systems collect, analyze, and correlate log data across networks, helping analysts detect anomalies.
When a SIEM alert indicates a possible threat, the playbook provides precise steps for investigation and response.
Example:
If a SIEM flags unusual user activity, the playbook instructs analysts to check authentication logs, isolate affected accounts, and document findings before escalation.
4. Playbooks and SOAR Tools
SOAR tools automate repetitive security tasks, such as blocking accounts, disabling endpoints, or collecting evidence.
Once SOAR performs automated containment, analysts refer to the playbook to guide manual investigation, reporting, and recovery steps.
Example:
If multiple failed login attempts trigger an alert, a SOAR tool might automatically block the user’s account while the playbook guides analysts to review activity logs, confirm if the account was compromised, and reset credentials.
Together, SIEM, SOAR, and playbooks form a triad of efficiency — detecting, automating, and responding to incidents while maintaining human oversight.
Scenario Example:
1. Alert: A SIEM system generates a malware alert for a workstation.
2. Assessment: The analyst validates the alert by examining endpoint logs and checking for unusual processes or outbound traffic.
3. Containment: The infected device is disconnected from the network to stop the malware’s spread.
4. Eradication: Malware is removed using an endpoint detection and response (EDR) tool, and the system is rebuilt from a clean backup.
5. Recovery: Services are restored and tested for stability.
6. Reporting: A post-incident report is completed for internal review and regulatory compliance.
This example illustrates how playbooks provide structure and clarity during high-pressure situations, ensuring no step is overlooked.
Even well-designed playbooks can lose effectiveness if not properly maintained or synchronized.
Outdated Playbooks:
An outdated playbook can reference obsolete tools, outdated policies, or old network configurations, slowing down the response or causing compliance issues. Regular updates are critical to reflect:
New attack techniques.
Updated technologies.
Changes in laws or business processes.
Conflicting Playbooks:
Conflicts between playbooks can cause delays or errors if two guides provide contradictory instructions.
To prevent this:
Maintain a centralized repository for all playbooks.
Use version control to track changes.
Conduct regular cross-functional reviews to ensure alignment between departments.
Effective incident response relies on collaboration and communication across technical and non-technical teams.
Playbooks specify who communicates what, to whom, and when, ensuring stakeholders, legal counsel, and law enforcement are informed appropriately.
They also help security teams maintain composure under pressure, empowering both experienced and junior analysts to act decisively and consistently.
Diversity in Teams:
As Erin from Google emphasizes, diverse perspectives enhance cybersecurity decision-making. Teams composed of individuals with different experiences, from engineering to journalism , bring unique insights that lead to more robust, ethical, and inclusive solutions.
Incident response playbooks are the cornerstone of modern cybersecurity operations.
They turn reactive, ad-hoc responses into coordinated, data-driven, and compliant actions.
By integrating with SIEM and SOAR technologies, playbooks enable faster detection, consistent communication, and continuous improvementall vital for protecting business continuity.
When kept up to date, playbooks not only reduce damage from incidents but also foster a culture of preparedness, learning, and teamwork across the organization.
A. Threat and Risk Management
Identify and classify threats, vulnerabilities, and high-risk assets.
Conduct risk assessments to evaluate potential impacts.
Apply mitigation strategies such as encryption, access control, and patch management.
B. Security Frameworks and Controls
Understand and apply frameworks like NIST RMF and the CIA Triad (Confidentiality, Integrity, Availability).
Distinguish between administrative, technical, and physical controls.
Implement policies, technical safeguards, and physical measures to reduce risk.
C. Cybersecurity Tools and Technologies
Use Security Information and Event Management (SIEM) tools for centralized log management and threat detection.
Analyze firewall logs and perform vulnerability assessments.
Implement Multi-Factor Authentication (MFA) to strengthen access security.
Gain familiarity with SOAR, IDS/IPS, and EDR tools for monitoring and response.
D. Incident Response and Playbooks
Develop and apply incident response playbooks for events such as phishing, malware, or data breaches.
Follow structured procedures for detection, analysis, containment, eradication, recovery, and post-incident review.
Emphasize clear communication and collaboration during security incidents.
E. Security Principles and Best Practices
Apply security principles like Defense in Depth and Least Privilege.
Promote security awareness and ethical responsibility in organizational culture.
Understand the difference between principles (why) and controls (how) in cybersecurity implementation.
The essence of Play It Safe: Manage Security Risks lies in understanding how cybersecurity professionals protect business operations through structured frameworks, proactive controls, and effective use of tools.
It teaches me to think strategically about security risks, respond systematically to incidents, and use industry-standard technologies to ensure the confidentiality, integrity, and availability of information systems.
Ultimately, this course equips me with the knowledge, discipline, and mindset to manage risks confidently, safeguard organizational assets, and contribute to a secure digital environment.
Security Frameworks:
These are structured sets of guidelines, standards, and best practices that help organizations manage and reduce cybersecurity risks. Think of them as a blueprint or a roadmap for building a robust security program. They provide the "what" and "why" of security.
NIST Risk Management Framework (RMF): This is a prominent example discussed. It's a systematic, seven-step process that helps organizations integrate security and privacy into their system development lifecycle. The steps are:
Prepare: Establish context and priorities.
Categorize: Classify information systems based on impact.
Select: Choose appropriate security controls.
Implement: Put the controls into practice.
Assess: Determine if controls are working as intended.
Authorize: Make a risk-based decision to operate the system.
Monitor: Continuously track control effectiveness.
Explore NIST Risk Management Framework:
Understand the Scope and Context:
Define System Boundaries: Clearly identify the information systems and data that need to be protected under SP 800-53.
Determine Impact Level: Assess the potential impact (low, moderate, or high) on the Confidentiality, Integrity, and Availability (CIA) of the system if it were compromised. This assessment, as we discussed with the RMF, directly influences the rigor of the controls needed.
Categorize the Information System:
Based on the impact assessment, formally categorize the information system according to NIST FIPS 199 and NIST SP 800-60. This categorization helps in selecting the appropriate baseline of security controls.
Select Security Controls:
Using the system's categorization, select an initial baseline of security controls from the NIST SP 800-53 catalog.
Tailor and Supplement: Adjust these controls based on specific organizational risks, threats, vulnerabilities, and legal/regulatory requirements. This might involve adding more controls or modifying existing ones.
Implement Security Controls:
Put the selected and tailored controls into practice. This involves configuring systems, developing policies and procedures, training personnel, and deploying security technologies.
Document Everything: Maintain detailed documentation of how each control is implemented.
Assess Security Controls:
Regularly evaluate the implemented controls to determine if they are operating as intended and producing the desired security outcomes. This often involves security testing, vulnerability scanning, and audits.
Identify Weaknesses: Document any deficiencies or weaknesses found during the assessment.
Authorize Information System:
Based on the assessment results and the organization's risk tolerance, a senior official makes a risk-based decision to authorize the system to operate. This signifies acceptance of the remaining risk.
Monitor Security Controls:
Continuously monitor the security controls and the overall security posture of the system. This includes ongoing assessments, vulnerability management, incident response, and regular reviews to ensure controls remain effective against evolving threats.
Key to Effective Implementation:
Top-Down Support: Strong commitment from leadership is crucial for resource allocation and policy enforcement.
Integration with Risk Management: SP 800-53 should be integrated into an organization's broader risk management strategy (like the NIST RMF).
Skilled Personnel: Having cybersecurity professionals who understand the framework and its controls is essential.
Continuous Improvement: Security is not a one-time effort; regular reviews and updates are necessary to adapt to new threats and technologies.
CIA Triad:
While not a framework in the same sense as NIST RMF, the Confidentiality, Integrity, and Availability (CIA) Triad is a foundational model that guides security frameworks. It defines the three core goals of information security:
Confidentiality: Protecting information from unauthorized access.
Integrity: Ensuring information is accurate and has not been tampered with.
Availability: Guaranteeing that authorized users can access information when needed.
Security Controls:
These are the specific safeguards or countermeasures implemented to protect the confidentiality, integrity, and availability of information systems and data. They are the "how" of security, putting the framework's guidelines into action.
Types of Controls: Module 2 categorizes controls into three main types:
Administrative Controls: These are policies, procedures, guidelines, and training that define how people should behave and how security should be managed.
Example: A password policy requiring strong, unique passwords or security awareness training for employees.
Technical Controls: These are hardware and software mechanisms that enforce security policies.
Example: Firewalls blocking unauthorized network traffic, encryption protecting data, or Multi-Factor Authentication (MFA) for user logins.
Physical Controls: These are measures designed to prevent unauthorized physical access to systems, facilities, and data.
Example: Locks on server room doors, security guards, or CCTV cameras.
In essence, frameworks provide the strategic direction and structure, while controls are the tactical tools and actions used to achieve the security goals outlined by the framework. They work hand-in-hand to build a comprehensive security posture.