back to top

What is preventive, corrective, detective and deterrent in security audit?

Getting your Trinity Audio player ready...

Control categories

Controls within cybersecurity are grouped into three main categories:

  • Administrative/Managerial controls
  • Technical controls
  • Physical controls

Administrative/Managerial controls address the human component of cybersecurity. These controls include policies and procedures that define how an organization manages data and clearly defines employee responsibilities, including their role in protecting the organization. While administrative controls are typically policy based, the enforcement of those policies may require the use of technical or physical controls.

Technical controls consist of solutions such as firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), antivirus (AV) products, encryption, etc. Technical controls can be used in a number of ways to meet organizational goals and objectives.

Physical controls include door locks, cabinet locks, surveillance cameras, badge readers, etc. They are used to limit physical access to physical assets by unauthorized personnel.

Control types

Control types include, but are not limited to:             

  1. Preventative
  2. Corrective
  3. Detective
  4. Deterrent

These controls work together to provide defense in depth and protect assets.

Preventative controls are designed to prevent an incident and irregularity from occurring in the first place. they are design to prevent an event from occurring

Corrective controls are used to restore an asset after an incident. they are designed to correct errors and irregularity which are occur in the system

Detective controls are implemented to determine whether an incident has occurred or is in progress. They are specially design to detect/find errors and problems during an event. these type system really help in control system

Deterrent controls are designed to discourage attacks. Deterrent controls also called administrative mechanisms.

Review the following charts for specific details about each type of control and its purpose.

Read More: Scope, Goals and risk assessment report

Administrative Control

Administrative control in cybersecurity design for controls in training, policy procedure etc.

Control NameControl TypeControl Purpose
Least PrivilegePreventativeReduce risk and overall impact of malicious insider or compromised accounts
Disaster recovery plansCorrectiveProvide business continuity
Password PoliciesPreventativeReduce likelihood of account compromise through brute force or dictionary attack techniques
Access control PoliciesPreventativeBolster confidentiality and integrity by defining which groups can access or modify data
Account management policiesPreventativeManaging account lifecycle, reducing attack surface, and limiting overall impact from disgruntled former employees and default account usage.
Separation of dutiesPreventativeReduce risk and overall impact of malicious insider or compromised accounts

Technical Controls

Control NameControl TypeControl Purpose
FirewallPreventativeTo filter unwanted or malicious traffic from entering the network
IDS/IPSDetectiveTo detect and prevent anomalous traffic that matches a signature or rule
EncryptionDeterrentProvide confidentiality to sensitive information
BackupsCorrectiveRestore/recover from an event
Password ManagementPreventativeReduce password fatigue
Antivirus (AV) SoftwareCorrectiveDetect and quarantine known threats
Manual Monitoring, and InterventionPreventativeNecessary to identify and manage threats, risks, or vulnerabilities to out-of-date systems

Physical Controls

Control NameControl TypeControl Purpose
Time controlled safeDeterrentReduce attack surface and overall impact form physical threats
Closed Circuit Television (CCTV)Preventative/DetectiveClosed circuit television is both a preventative and detective control because it’s presence can reduce risk of certain types of events from occurring, and can be used after an event to inform on event conditions.
Locking cabinets (for network gear)PreventativeBolster integrity by preventing unauthorized personnel and other individuals from physically accessing or modifying network infrastructure gear
Signage indicating alarm service providerDeterrentDeter certain types of threats by making the likelihood of successful attack seem low
LocksDeterrent/PreventativeBolster integrity by deterring and preventing unauthorized personnel individuals from physically accessing assets
Fire detection and prevention (fire alarm, sprinkler system, etc.)Detective/PreventativeDetect fire in physical location and prevent damage to physical assets such as inventory servers etc.
Adequate lightingPreventative/DetectiveDeter threats by limiting hiding places

All controls are important for security audits, these controls are divided in different categories for different purpose. you need to be understand and implement all controls in security which are really helpful.

Read More: How to check compliance and control in Security audit

Form any question suggestion and recommendation please contact on contact@widelamp.com
Pradeep Sharma
Pradeep Sharma
Pradeep Sharmahttps://pradeepsharma.widelamp.com
A cybersecurity and physics expert, skilled in quantum computing, Cybersecurity and network security, dedicated to advancing digital and scientific innovation.

Popular Articles