Cheat sheet information security controls¶
Control types by function¶
These categories describe when and how controls operate in relation to security incidents.
Control type  | 
Goal  | 
Examples  | 
|---|---|---|
Preventive  | 
Stop incidents before they happen  | 
Security policy, confidentiality agreements, cryptography, environment segregation, access control software  | 
Detective  | 
Identify incidents quickly  | 
Audit logs, intrusion detection systems, monitoring, alarms, video surveillance, reconciliation checks  | 
Corrective  | 
Minimise impact and prevent recurrence  | 
Patching, backup recovery, incident investigation, business continuity plan activation, system restoration  | 
Control types by scope¶
These categories describe where and at what level controls are applied within the organisation.
Control type  | 
Goal  | 
Examples  | 
|---|---|---|
Management  | 
Align ISMS with organisational strategy  | 
Risk management, management reviews, continual improvement, policy definition  | 
General  | 
Baseline security mechanisms for all systems  | 
Annual review of user access, baseline security controls from ISO/IEC 27001 Annex A  | 
Specific  | 
Controls embedded in individual applications or systems  | 
Application authentication, transaction validation, access mechanisms for specific ERP systems  | 
Relationships at a glance¶
Assets → have vulnerabilities
Threats → exploit vulnerabilities → create risk scenarios
Controls → address vulnerabilities and mitigate risk
Limitation: Controls reduce risk but cannot eliminate all threats (the mountain will always have rocks)
Visual representation:
         Exploit
[Threats] -------> [Vulnerabilities] -------> [Assets at Risk]
                          ↑
                          |
                     [Controls]
                      (address)
                          ↓
                    [Reduced Risk]
This shows how controls act like climbing gear on the ISO 27001 mountain: they help protect assets and reduce risks, but cannot stop the mountain itself from having rocks or avalanches (threats).
TL;DR¶
Controls are interrelated: Antivirus software is preventive (blocks malware), detective (identifies infections), and corrective (removes threats) at the same time.
Two classification dimensions: A single control can be both “Preventive” (function) and “General” (scope). For example, a password policy prevents unauthorised access and applies generally across all systems.
Management vs General vs Specific: Management controls align strategy and governance, general controls ensure baseline security across the organisation, and specific controls apply to particular systems and processes.
Goal-oriented: Each functional control type focuses on a clear purpose — prevent incidents, detect them quickly, or correct them effectively.