Sevco Glossary > Mitigating Controls
Mitigating Controls
Mitigating controls refer to strategies and actions taken to reduce the potential impact of a cyber threat by implementing preventive measures, detective controls, corrective actions, or a combination of approaches, aiming to minimize the severity of a security breach and bring the risk level to an acceptable level.
Examples of mitigating controls include:
- Access controls: Limiting user access to sensitive data based on their role and permissions.
- Data encryption: Encrypting sensitive data to protect it from unauthorized access even if breached.
- Network segmentation: Dividing a network into smaller segments to limit the spread of a potential attack.
- Intrusion detection systems (IDS): Monitoring network traffic to detect suspicious activity
- Security awareness training: Educating employees about cybersecurity best practices to prevent human error
- Incident response plan: A structured plan to respond to and contain security incidents effectively
Types of mitigating controls:
- Preventive controls: Measures taken to stop a threat from occurring in the first place, like strong passwords and firewalls.
- Detective controls: Mechanisms to identify potential threats or security breaches as they are happening, such as log analysis and anomaly detection.
- Corrective controls: Actions taken to remedy a security issue after it has been detected, including incident response and data recovery procedures