Security+ Objective 1.1: Compare and Contrast Various Types of Security Controls

28 min readSecurity+ SY0-701

Security+ Exam Focus: Understanding security controls is fundamental to the Security+ certification and is heavily tested throughout the exam. You need to understand the different categories of controls (Technical, Managerial, Operational, Physical), the various control types (Preventive, Deterrent, Detective, Corrective, Compensating, Directive), and how they work together to create a comprehensive security posture. This knowledge is essential for designing security architectures, implementing security programs, and responding to security incidents.

Understanding Security Controls

Security controls are the safeguards and countermeasures that organizations implement to protect their information systems, data, and assets from threats and vulnerabilities. These controls form the foundation of any comprehensive security program and work together to create multiple layers of protection. Security controls are designed to prevent, detect, and respond to security incidents while ensuring business continuity and compliance with regulatory requirements. Understanding the different types and categories of security controls is essential for security professionals who need to design, implement, and maintain effective security programs.

Security controls operate on the principle of defense in depth, where multiple layers of security controls work together to provide comprehensive protection. No single control can provide complete security, so organizations must implement a combination of different control types and categories to address various threats and vulnerabilities. The effectiveness of security controls depends on proper implementation, regular monitoring, and continuous improvement based on changing threats and business requirements.

Categories of Security Controls

Technical Controls

Technical controls are security measures implemented through technology, software, and hardware systems. These controls operate automatically and provide consistent enforcement of security policies across the organization. Technical controls include firewalls, intrusion detection systems, encryption, access control systems, and antivirus software. These controls are typically the first line of defense and provide automated protection against many common threats and attacks.

Technical controls are essential for protecting digital assets and ensuring the confidentiality, integrity, and availability of information systems. They provide real-time monitoring and response capabilities, enabling organizations to detect and respond to security incidents quickly. Technical controls can be configured to enforce security policies automatically, reducing the risk of human error and ensuring consistent security implementation across the organization.

Examples of Technical Controls:

  • Firewalls: Network security devices that monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based, software-based, or cloud-based and provide protection against unauthorized access and malicious traffic.
  • Intrusion Detection Systems (IDS): Security systems that monitor network or system activities for malicious activities or policy violations. IDS can be network-based (NIDS) or host-based (HIDS) and provide real-time monitoring and alerting capabilities.
  • Encryption: The process of converting data into a coded form to prevent unauthorized access. Encryption protects data at rest, in transit, and in use, ensuring that sensitive information remains confidential even if it falls into the wrong hands.
  • Access Control Systems: Technologies that control who can access specific resources, when they can access them, and what actions they can perform. These systems include authentication mechanisms, authorization controls, and audit logging capabilities.
  • Antivirus and Anti-malware Software: Security software that detects, prevents, and removes malicious software from computer systems. These tools provide real-time protection against viruses, worms, trojans, and other malicious code.

Managerial Controls

Managerial controls are administrative policies, procedures, and processes that govern how security is implemented and managed within an organization. These controls provide the framework for security governance and ensure that security measures are properly planned, implemented, and maintained. Managerial controls include security policies, risk assessments, security awareness training, and incident response procedures.

Managerial controls are crucial for establishing the security culture and ensuring that all stakeholders understand their security responsibilities. These controls provide the foundation for all other security measures and ensure that security is integrated into business processes and decision-making. Managerial controls help organizations comply with regulatory requirements and industry standards while maintaining effective security governance.

Examples of Managerial Controls:

  • Security Policies: Formal documents that define the organization's approach to security, including acceptable use policies, data classification policies, and incident response procedures. These policies provide guidance for security implementation and ensure consistent security practices across the organization.
  • Risk Assessments: Systematic processes for identifying, analyzing, and evaluating security risks to determine appropriate risk treatment strategies. Risk assessments help organizations prioritize security investments and ensure that security controls are proportional to the risks they address.
  • Security Awareness Training: Educational programs designed to increase employees' understanding of security threats and their role in protecting organizational assets. Training programs help create a security-conscious culture and reduce the risk of human error.
  • Incident Response Procedures: Documented processes for detecting, analyzing, and responding to security incidents. These procedures ensure that security incidents are handled consistently and effectively, minimizing damage and recovery time.
  • Security Governance: The framework of policies, procedures, and organizational structures that ensure security is properly managed and aligned with business objectives. Governance includes security committees, reporting structures, and accountability mechanisms.

Operational Controls

Operational controls are day-to-day security activities and procedures that are performed by people to maintain security. These controls include user access management, security monitoring, backup procedures, and change management processes. Operational controls ensure that security measures are properly implemented and maintained through human activities and procedures.

Operational controls are essential for maintaining the effectiveness of technical and managerial controls. These controls ensure that security measures are properly implemented, monitored, and maintained by security personnel and other stakeholders. Operational controls provide the human element of security and ensure that security measures are adapted to changing threats and business requirements.

Examples of Operational Controls:

  • User Access Management: Processes for granting, modifying, and revoking user access to systems and data. This includes user provisioning, access reviews, and account deactivation procedures to ensure that users have appropriate access levels.
  • Security Monitoring: Continuous monitoring of security events and activities to detect potential security incidents. This includes log analysis, security event correlation, and threat intelligence integration to identify and respond to security threats.
  • Backup and Recovery Procedures: Processes for creating, storing, and restoring data backups to ensure business continuity. These procedures include backup scheduling, storage management, and recovery testing to ensure that data can be restored when needed.
  • Change Management: Processes for managing changes to systems, applications, and infrastructure to ensure that security is maintained during and after changes. This includes change approval, testing, and rollback procedures to minimize security risks.
  • Vulnerability Management: Processes for identifying, assessing, and remediating security vulnerabilities in systems and applications. This includes vulnerability scanning, patch management, and security testing to ensure that systems are protected against known vulnerabilities.

Physical Controls

Physical controls are security measures that protect the physical environment and assets of an organization. These controls include locks, security cameras, access control systems, and environmental controls that protect against physical threats and unauthorized access. Physical controls are essential for protecting physical assets and ensuring that only authorized personnel can access sensitive areas and equipment.

Physical controls provide the foundation for all other security measures by protecting the physical infrastructure and environment where information systems operate. These controls are particularly important for protecting data centers, server rooms, and other critical infrastructure components. Physical controls also protect against environmental threats such as fire, flood, and power outages that could damage or destroy information systems.

Examples of Physical Controls:

  • Access Control Systems: Physical security systems that control entry to buildings, rooms, and restricted areas. These systems include key cards, biometric scanners, and security guards to ensure that only authorized personnel can access sensitive areas.
  • Security Cameras: Video surveillance systems that monitor and record activities in sensitive areas. These systems provide deterrence, detection, and evidence collection capabilities for security incidents.
  • Environmental Controls: Systems that protect against environmental threats such as fire, flood, and power outages. These include fire suppression systems, flood detection systems, and uninterruptible power supplies (UPS) to ensure continuous operation.
  • Physical Barriers: Physical structures such as fences, walls, and doors that prevent unauthorized access to sensitive areas. These barriers provide the first line of defense against physical threats and unauthorized access.
  • Security Lighting: Lighting systems that provide visibility and deterrence in sensitive areas. Proper lighting helps security personnel monitor activities and deters unauthorized access during non-business hours.

Types of Security Controls

Preventive Controls

Preventive controls are security measures designed to prevent security incidents from occurring in the first place. These controls focus on stopping threats before they can cause damage and are typically the most cost-effective approach to security. Preventive controls include firewalls, access controls, encryption, and security policies that prevent unauthorized access and malicious activities.

Preventive controls are essential for maintaining the security posture of an organization and reducing the risk of security incidents. These controls work by blocking or preventing threats from reaching their targets, making them the first line of defense in any security program. Preventive controls are most effective when they are properly configured, regularly updated, and integrated with other security measures.

Examples of Preventive Controls:

  • Firewalls: Network security devices that block unauthorized traffic and prevent malicious activities from reaching internal systems. Firewalls can be configured to block specific ports, protocols, and IP addresses to prevent unauthorized access.
  • Access Controls: Authentication and authorization mechanisms that prevent unauthorized users from accessing systems and data. These controls include passwords, biometric authentication, and role-based access control (RBAC) systems.
  • Encryption: Cryptographic techniques that prevent unauthorized access to sensitive data by converting it into an unreadable format. Encryption protects data at rest, in transit, and in use, ensuring that only authorized users can access sensitive information.
  • Security Policies: Documented rules and procedures that prevent security incidents by establishing clear guidelines for acceptable behavior and security practices. These policies help prevent human error and ensure consistent security implementation.
  • Input Validation: Programming techniques that prevent malicious input from causing security vulnerabilities in applications. Input validation helps prevent injection attacks, buffer overflows, and other application-level security issues.

Deterrent Controls

Deterrent controls are security measures designed to discourage potential attackers from attempting to compromise security. These controls work by making attacks more difficult, time-consuming, or risky, thereby reducing the likelihood of security incidents. Deterrent controls include security awareness training, visible security measures, and consequences for security violations.

Deterrent controls are particularly effective against insider threats and opportunistic attackers who may be discouraged by visible security measures. These controls work by increasing the perceived risk and difficulty of attacks, making potential attackers think twice before attempting to compromise security. Deterrent controls are most effective when they are visible, well-publicized, and consistently enforced.

Examples of Deterrent Controls:

  • Security Awareness Training: Educational programs that inform employees about security threats and the consequences of security violations. Training programs help create a security-conscious culture and deter employees from engaging in risky behavior.
  • Visible Security Measures: Security cameras, security guards, and other visible security measures that deter potential attackers by making them aware that they are being monitored. These measures increase the perceived risk of attacks and discourage unauthorized activities.
  • Security Policies and Procedures: Documented rules that clearly state the consequences of security violations and establish a framework for security enforcement. These policies help deter violations by making employees aware of the potential consequences.
  • Access Logging and Monitoring: Systems that record and monitor access to sensitive resources, making potential attackers aware that their activities are being tracked. These systems deter attacks by increasing the likelihood of detection and consequences.
  • Security Signage: Signs and notices that inform people about security policies and consequences, helping to deter violations by making security expectations clear and visible.

Detective Controls

Detective controls are security measures designed to identify and detect security incidents after they have occurred. These controls focus on monitoring, logging, and analysis to identify suspicious activities and security breaches. Detective controls include intrusion detection systems, security monitoring, and audit logging that help organizations identify and respond to security incidents.

Detective controls are essential for maintaining security awareness and ensuring that security incidents are identified and responded to quickly. These controls work by monitoring system activities, analyzing security events, and alerting security personnel to potential threats. Detective controls are most effective when they are properly configured, regularly monitored, and integrated with incident response procedures.

Examples of Detective Controls:

  • Intrusion Detection Systems (IDS): Security systems that monitor network or system activities for malicious activities or policy violations. IDS can detect various types of attacks including malware, unauthorized access, and data exfiltration attempts.
  • Security Information and Event Management (SIEM): Systems that collect, analyze, and correlate security events from multiple sources to identify potential security incidents. SIEM systems provide centralized monitoring and analysis capabilities for security teams.
  • Audit Logging: Systems that record and monitor user activities, system events, and security-related activities to identify suspicious behavior and security violations. Audit logs provide evidence of security incidents and help with forensic analysis.
  • Vulnerability Scanning: Automated tools that identify security vulnerabilities in systems and applications. These tools help organizations identify and remediate security weaknesses before they can be exploited.
  • Security Monitoring: Continuous monitoring of security events and activities to detect potential security incidents. This includes real-time monitoring, alerting, and analysis of security events to identify and respond to threats quickly.

Corrective Controls

Corrective controls are security measures designed to respond to and recover from security incidents after they have occurred. These controls focus on minimizing damage, restoring services, and preventing similar incidents from occurring in the future. Corrective controls include incident response procedures, backup and recovery systems, and security improvements based on lessons learned.

Corrective controls are essential for maintaining business continuity and ensuring that organizations can recover from security incidents quickly and effectively. These controls work by providing procedures and systems for responding to incidents, restoring services, and implementing improvements to prevent future incidents. Corrective controls are most effective when they are well-planned, regularly tested, and integrated with business continuity procedures.

Examples of Corrective Controls:

  • Incident Response Procedures: Documented processes for detecting, analyzing, and responding to security incidents. These procedures ensure that security incidents are handled consistently and effectively, minimizing damage and recovery time.
  • Backup and Recovery Systems: Systems and procedures for creating, storing, and restoring data backups to ensure business continuity. These systems help organizations recover from data loss and system failures caused by security incidents.
  • Security Patches and Updates: Processes for applying security patches and updates to systems and applications to fix vulnerabilities and prevent future incidents. These processes ensure that systems are protected against known vulnerabilities.
  • Forensic Analysis: Processes for analyzing security incidents to understand how they occurred and what damage was caused. Forensic analysis helps organizations learn from incidents and implement improvements to prevent similar incidents.
  • Security Improvements: Changes to security policies, procedures, and systems based on lessons learned from security incidents. These improvements help organizations strengthen their security posture and prevent future incidents.

Compensating Controls

Compensating controls are alternative security measures that are implemented when primary security controls cannot be implemented or are not sufficient to address specific risks. These controls provide equivalent or alternative protection to primary controls and are used when primary controls are not feasible, cost-effective, or appropriate for specific situations. Compensating controls are essential for maintaining security when primary controls cannot be implemented.

Compensating controls are particularly important in situations where primary security controls cannot be implemented due to technical, operational, or business constraints. These controls provide alternative protection mechanisms that achieve the same security objectives as primary controls. Compensating controls are most effective when they are properly documented, regularly reviewed, and integrated with the overall security program.

Examples of Compensating Controls:

  • Alternative Authentication Methods: When strong authentication cannot be implemented, alternative methods such as security questions, out-of-band verification, or additional monitoring can provide compensating protection. These methods help ensure that only authorized users can access sensitive systems.
  • Enhanced Monitoring: When primary security controls cannot be implemented, enhanced monitoring and logging can provide compensating protection by detecting and alerting on suspicious activities. This includes increased logging, real-time monitoring, and automated alerting systems.
  • Manual Processes: When automated security controls cannot be implemented, manual processes such as regular security reviews, manual access approvals, and periodic security assessments can provide compensating protection. These processes help ensure that security is maintained through human oversight.
  • Additional Security Layers: When primary controls are insufficient, additional security layers such as multiple firewalls, additional encryption, or redundant security systems can provide compensating protection. These layers help ensure that security is maintained even if primary controls fail.
  • Business Process Controls: When technical controls cannot be implemented, business process controls such as segregation of duties, approval workflows, and regular audits can provide compensating protection. These processes help ensure that security is maintained through organizational controls.

Directive Controls

Directive controls are security measures that provide guidance and direction for security implementation and behavior. These controls focus on establishing security policies, procedures, and guidelines that guide security implementation and ensure consistent security practices across the organization. Directive controls include security policies, procedures, and guidelines that provide direction for security implementation.

Directive controls are essential for establishing the security framework and ensuring that all stakeholders understand their security responsibilities. These controls provide the foundation for all other security measures and ensure that security is integrated into business processes and decision-making. Directive controls are most effective when they are clearly documented, regularly updated, and consistently enforced.

Examples of Directive Controls:

  • Security Policies: Formal documents that define the organization's approach to security, including acceptable use policies, data classification policies, and incident response procedures. These policies provide guidance for security implementation and ensure consistent security practices.
  • Security Procedures: Step-by-step instructions for implementing security measures and responding to security incidents. These procedures ensure that security measures are implemented consistently and effectively across the organization.
  • Security Guidelines: Best practices and recommendations for implementing security measures and maintaining security posture. These guidelines provide direction for security implementation and help ensure that security measures are effective and appropriate.
  • Security Standards: Technical and operational standards that define how security measures should be implemented and maintained. These standards ensure that security measures are implemented consistently and meet minimum security requirements.
  • Security Training Programs: Educational programs that provide direction and guidance for security implementation and behavior. These programs help ensure that all stakeholders understand their security responsibilities and how to implement security measures effectively.

Integration of Security Controls

Defense in Depth Strategy

Defense in depth is a security strategy that implements multiple layers of security controls to protect against various threats and vulnerabilities. This approach ensures that if one security control fails, other controls can still provide protection. Defense in depth combines different types and categories of security controls to create a comprehensive security posture that addresses multiple attack vectors and threat scenarios.

Defense in depth is essential for maintaining effective security in complex environments where multiple threats and vulnerabilities exist. This strategy ensures that security is maintained even when individual controls fail or are bypassed. Defense in depth requires careful planning and coordination to ensure that all security controls work together effectively and do not create conflicts or gaps in security coverage.

Defense in Depth Layers:

  • Physical Security: Physical controls that protect the physical environment and assets, including access control systems, security cameras, and environmental controls. These controls provide the foundation for all other security measures.
  • Network Security: Technical controls that protect network infrastructure and communications, including firewalls, intrusion detection systems, and network segmentation. These controls protect against network-based attacks and unauthorized access.
  • Host Security: Technical controls that protect individual systems and devices, including antivirus software, host-based firewalls, and system hardening. These controls protect against malware and system-level attacks.
  • Application Security: Technical controls that protect applications and data, including input validation, authentication, and encryption. These controls protect against application-level attacks and data breaches.
  • Data Security: Technical controls that protect sensitive data, including encryption, access controls, and data loss prevention. These controls ensure that sensitive data remains confidential and protected.

Control Effectiveness and Monitoring

The effectiveness of security controls depends on proper implementation, regular monitoring, and continuous improvement. Organizations must regularly assess the effectiveness of their security controls and make adjustments based on changing threats and business requirements. This includes regular security assessments, penetration testing, and security metrics analysis to ensure that controls are working as intended.

Security control monitoring is essential for maintaining effective security and ensuring that controls continue to provide protection against evolving threats. This includes regular monitoring of security events, analysis of security metrics, and assessment of control effectiveness. Organizations must also ensure that security controls are properly maintained and updated to address new threats and vulnerabilities.

Security Control Monitoring Activities:

  • Regular Security Assessments: Periodic evaluations of security controls to ensure they are working effectively and addressing current threats. These assessments help identify weaknesses and areas for improvement.
  • Penetration Testing: Simulated attacks on security controls to test their effectiveness and identify vulnerabilities. These tests help organizations understand how their security controls would perform against real attacks.
  • Security Metrics Analysis: Analysis of security metrics and key performance indicators to assess the effectiveness of security controls. These metrics help organizations understand the impact of their security investments.
  • Threat Intelligence Integration: Integration of threat intelligence to ensure that security controls are updated to address new and emerging threats. This helps organizations stay ahead of evolving threats and maintain effective security.
  • Continuous Improvement: Regular updates and improvements to security controls based on lessons learned and changing threats. This ensures that security controls remain effective and relevant over time.

Real-World Implementation Scenarios

Scenario 1: E-commerce Website Security

Situation: An e-commerce company needs to protect customer data and payment information while maintaining website availability.

Security Controls Implementation: Technical controls include SSL/TLS encryption, web application firewalls, and secure payment processing. Managerial controls include data protection policies and incident response procedures. Operational controls include regular security monitoring and vulnerability assessments. Physical controls include data center security and access controls.

Scenario 2: Healthcare Organization Data Protection

Situation: A healthcare organization must protect patient health information (PHI) while ensuring compliance with HIPAA regulations.

Security Controls Implementation: Technical controls include encryption, access controls, and audit logging. Managerial controls include HIPAA compliance policies and risk assessments. Operational controls include user access management and security awareness training. Physical controls include facility access controls and environmental protections.

Scenario 3: Financial Institution Security

Situation: A financial institution must protect customer financial data and ensure regulatory compliance while maintaining operational efficiency.

Security Controls Implementation: Technical controls include multi-factor authentication, encryption, and fraud detection systems. Managerial controls include compliance policies and risk management procedures. Operational controls include transaction monitoring and security incident response. Physical controls include secure facilities and access controls.

Best Practices for Security Control Implementation

Control Selection and Implementation

  • Risk-based approach: Select security controls based on risk assessments and business requirements to ensure that controls are appropriate and cost-effective
  • Layered defense: Implement multiple layers of security controls to provide comprehensive protection against various threats and vulnerabilities
  • Regular assessment: Regularly assess the effectiveness of security controls and make adjustments based on changing threats and business requirements
  • Integration and coordination: Ensure that all security controls work together effectively and do not create conflicts or gaps in security coverage
  • Documentation and training: Document all security controls and provide training to ensure that all stakeholders understand their security responsibilities

Security Control Maintenance

  • Regular updates: Keep security controls updated with the latest patches, configurations, and threat intelligence to ensure continued effectiveness
  • Performance monitoring: Monitor the performance of security controls to ensure they are working effectively and not impacting business operations
  • Incident response integration: Integrate security controls with incident response procedures to ensure that security incidents are detected and responded to quickly
  • Compliance monitoring: Monitor security controls to ensure they meet regulatory requirements and industry standards
  • Continuous improvement: Continuously improve security controls based on lessons learned and changing threats

Practice Questions

Sample Security+ Exam Questions:

  1. Which type of security control is designed to prevent security incidents from occurring?
  2. What is the primary purpose of detective controls in a security program?
  3. Which category of security controls includes firewalls, encryption, and access control systems?
  4. What is the main difference between preventive and corrective controls?
  5. Which type of control would be most appropriate for discouraging potential attackers?

Security+ Success Tip: Understanding security controls is fundamental to the Security+ certification and is heavily tested throughout the exam. Focus on learning the different categories of controls (Technical, Managerial, Operational, Physical) and the various control types (Preventive, Deterrent, Detective, Corrective, Compensating, Directive). Practice identifying which controls are most appropriate for different scenarios and understand how controls work together to create a comprehensive security posture. This knowledge will serve you well throughout your security career and in real-world security implementations.

Practice Lab: Security Control Analysis

Lab Objective

This hands-on lab is designed for Security+ exam candidates to understand how different types of security controls work in practice. You'll analyze security control implementations, identify control types and categories, and practice designing security control frameworks for different scenarios.

Lab Setup and Prerequisites

For this lab, you'll need access to a computer with internet connectivity, basic understanding of security concepts, and access to security control documentation. The lab is designed to be completed in approximately 3-4 hours and provides hands-on experience with security control analysis and implementation.

Lab Activities

Activity 1: Security Control Identification

  • Analyze existing security controls: Review security control documentation and identify different types and categories of controls
  • Control mapping: Map security controls to specific threats and vulnerabilities they address
  • Effectiveness assessment: Evaluate the effectiveness of different security controls in various scenarios

Activity 2: Security Control Design

  • Scenario analysis: Analyze different security scenarios and identify appropriate security controls
  • Control selection: Select appropriate security controls based on risk assessments and business requirements
  • Implementation planning: Develop implementation plans for selected security controls

Activity 3: Security Control Integration

  • Defense in depth design: Design defense in depth strategies using multiple layers of security controls
  • Control coordination: Ensure that different security controls work together effectively
  • Gap analysis: Identify gaps in security coverage and recommend additional controls

Lab Outcomes and Learning Objectives

Upon completing this lab, you should be able to identify different types and categories of security controls, understand how controls work together to provide comprehensive security, and design security control frameworks for different scenarios. You'll also gain practical experience with security control analysis and implementation that will help you understand real-world security operations.

Advanced Lab Extensions

For more advanced practice, try analyzing security controls in different industries and regulatory environments. Experiment with different security control combinations and assess their effectiveness against various threat scenarios. Practice designing security control frameworks for complex environments with multiple stakeholders and requirements.

Frequently Asked Questions

Q: What is the difference between preventive and detective controls?

A: Preventive controls are designed to prevent security incidents from occurring, while detective controls are designed to identify and detect security incidents after they have occurred. Preventive controls focus on stopping threats before they can cause damage, while detective controls focus on monitoring and analysis to identify security incidents.

Q: How do technical controls differ from managerial controls?

A: Technical controls are implemented through technology, software, and hardware systems, while managerial controls are administrative policies, procedures, and processes. Technical controls provide automated protection and enforcement, while managerial controls provide the framework and governance for security implementation.

Q: What are compensating controls and when are they used?

A: Compensating controls are alternative security measures that are implemented when primary security controls cannot be implemented or are not sufficient. They are used when primary controls are not feasible, cost-effective, or appropriate for specific situations, providing equivalent or alternative protection to primary controls.

Q: How do security controls work together in a defense in depth strategy?

A: Defense in depth implements multiple layers of security controls to protect against various threats and vulnerabilities. If one control fails, other controls can still provide protection. This approach combines different types and categories of controls to create comprehensive security coverage.

Q: What is the importance of monitoring security controls?

A: Monitoring security controls is essential for maintaining effective security and ensuring that controls continue to provide protection against evolving threats. Regular monitoring helps identify control failures, assess effectiveness, and make necessary adjustments to maintain security posture.

Q: How do organizations select appropriate security controls?

A: Organizations select security controls based on risk assessments, business requirements, regulatory compliance, and cost-effectiveness. The selection process involves identifying threats and vulnerabilities, assessing risks, and selecting controls that provide appropriate protection while meeting business and regulatory requirements.