Sevco Glossary > Mitigating Controls

Mitigating Controls

Mitigating controls refer to strategies and actions taken to reduce the potential impact of a cyber threat by implementing preventive measures, detective controls, corrective actions, or a combination of approaches, aiming to minimize the severity of a security breach and bring the risk level to an acceptable level.

Examples of mitigating controls include:

  • Access controls: Limiting user access to sensitive data based on their role and permissions.
  • Data encryption: Encrypting sensitive data to protect it from unauthorized access even if breached.
  • Network segmentation: Dividing a network into smaller segments to limit the spread of a potential attack.
  • Intrusion detection systems (IDS): Monitoring network traffic to detect suspicious activity
  • Security awareness training: Educating employees about cybersecurity best practices to prevent human error
  • Incident response plan: A structured plan to respond to and contain security incidents effectively

Types of mitigating controls:

  • Preventive controls: Measures taken to stop a threat from occurring in the first place, like strong passwords and firewalls.
  • Detective controls: Mechanisms to identify potential threats or security breaches as they are happening, such as log analysis and anomaly detection.
  • Corrective controls: Actions taken to remedy a security issue after it has been detected, including incident response and data recovery procedures