Annex A
/
Security Controls
Annex A
/
Security Controls
Annex A
/
Security Controls

Annex A

Understanding Security Controls in Risk Management

Written by

Aron Lange

Published

Sep 3, 2025

Annex A

Understanding Security Controls in Risk Management

Written by

Aron Lange

Published

Sep 3, 2025

Annex A

Understanding Security Controls in Risk Management

Written by

Aron Lange

Published

Sep 3, 2025

Information security is a critical concern for organizations of all sizes, from small businesses to global corporations. Managing information security risks effectively ensures that organizations can protect their data, maintain operations, and achieve their goals. The ISO 27001 standard, alongside frameworks like the NIST Cybersecurity Framework (CSF) 2.0, provides a robust foundation for identifying, mitigating, and managing these risks. This article offers a clear and engaging overview of how security controls can protect organizations from harm.

What is Risk?

At its core, risk is defined as the effect of uncertainty on objectives, according to the ISO/IEC 27000:2018 standard. In simpler terms, risk is the possibility that something could go wrong and prevent an organization from achieving its goals, such as generating revenue, maintaining customer trust, or ensuring operational efficiency.

Every organization faces a variety of risks that can impact its mission. These are collectively known as enterprise risksand include:

  • Information Security Risk: The potential for loss or exposure due to a cyberattack or data breach.

  • Privacy Risk: The danger of unauthorized access, use, or destruction of personal data.

  • Legal Risk: The possibility of penalties or financial loss due to non-compliance with laws or regulations.

  • Operational Risk: Losses from inadequate processes, systems, or external events.

  • Financial Risk: The chance of monetary loss.

  • Reputational Risk: Damage to an organization’s reputation, leading to loss of customers or costly litigation.

To operate securely, organizations must systematically identify, analyze, and respond to these risks. This process is known as Enterprise Risk Management (ERM).

Cybersecurity Risk: A Closer Look

In the context of cybersecurity, risk refers to the potential that a threat exploits a vulnerability in an organization’s information assets, causing harm. A threat is a potential event that hasn’t happened yet but could disrupt operations, damage reputation, or lead to legal or financial consequences if it does.

Threat Sources

Threats come from two main sources:

  1. Adversarial Threats: These are intentional attempts to cause harm. Examples include:

    • Hackers launching cyberattacks.

    • Cybercriminals deploying malware or phishing schemes.

    • Insider threats from disgruntled employees.

    • Nation-state actors targeting critical infrastructure.

    Adversaries use specific tactics, techniques, and procedures (TTPs) to exploit vulnerabilities and breach security.

  2. Non-Adversarial Threats: These are unintentional or natural events that can still cause significant damage. Examples include:

    • Human errors, like sending sensitive data to the wrong recipient.

    • Technical failures, such as software bugs or hardware malfunctions.

    • Natural disasters, like floods or fires, that disrupt systems.

Both types of threats can exploit weaknesses in your systems, leading to consequences like data loss, service disruptions, or legal issues.

Vulnerabilities: Weak Points in Your Defenses

vulnerability is a weakness that a threat can exploit to compromise an organization’s security. Vulnerabilities can exist in various areas, including:

  • Network: Poorly secured network configurations that allow unauthorized access.

  • Organization: Weak policies, unclear responsibilities, or poor governance.

  • People: Lack of cybersecurity awareness, human error, or insider threats.

  • Hardware: Outdated or misconfigured devices.

  • Software: Unpatched applications or insecure code.

  • Sites: Physical locations with inadequate security controls.

Vulnerabilities often arise from improperly applied security controls—whether by mistake or oversight. They can also stem from organizational issues, such as poor communication, or external dependencies, like reliance on specific suppliers or utilities.

From Risk to Incident

A risk represents a potential event. If that event occurs, it becomes a security event or incident. At this point, the focus shifts to incident response and recovery—identifying the issue, mitigating damage, and restoring normal operations as quickly as possible.

Managing Risks with Security Controls

To protect against threats and vulnerabilities, organizations rely on security controls—safeguards or countermeasures designed to manage risks, detect threats, and ensure the CIA triad (Confidentiality, Integrity, and Availability). Security controls fall into three main categories:

  1. Preventive Controls: These stop threats before they cause harm. Examples include:

    • CCTV cameras to deter physical intruders.

    • Security baselines to ensure systems are properly configured.

    • Policies and procedures to guide employee behavior and reduce errors.

  2. Detective Controls: These alert you when something suspicious happens, giving you time to respond. For example:

    • Intrusion detection systems (IDS) monitor for unusual network activity.

    • Log monitoring tools flag potential security issues.

  3. Corrective Controls: These help limit damage and restore normal operations after an incident. Examples include:

    • Data backups to recover lost information.

    • System recovery plans to quickly bring systems back online.

By implementing a combination of preventive, detective, and corrective controls, organizations can reduce vulnerabilities, detect threats early, and recover quickly from incidents.

NEWSLETTER

Never miss an article.

NEWSLETTER

Never miss an article.

NEWSLETTER

Never miss an article.