Objective 3.2High11 min

Control Selection

Choosing appropriate security controls based on risk assessment, cost considerations, and operational requirements. Covers defense in depth implementation, control types, and balancing security with business needs.

Understanding Control Selection

Security control selection is the art of choosing the right controls for the right risks at the right cost. Not every threat requires the most expensive solution, and not every control is appropriate for every environment.

Control selection factors:Risk — What threats are we mitigating? • Cost — What can we afford? • Operations — What's practical to implement? • Compliance — What's required by regulations? • Effectiveness — How well does it address the risk?

The 2020 SolarWinds breach showed that even sophisticated organizations can have control gaps. Despite robust perimeter security, the supply chain was inadequately protected—highlighting that control selection must address all attack vectors, not just the obvious ones.

Effective security requires thoughtful control selection, not just more controls.

Why This Matters for the Exam

Control selection is heavily tested on SY0-701 because it connects security theory to practice. Questions cover when to use specific controls and how to balance competing requirements.

Understanding control selection helps with security architecture, risk management, and compliance. Selecting wrong controls wastes resources while leaving vulnerabilities.

The exam tests practical decision-making about which controls fit specific scenarios.

Deep Dive

What Are the Types of Security Controls?

By Function:

TypePurposeExamples
PreventiveStop attacks from occurringFirewall, encryption, access control
DetectiveIdentify attacks in progressIDS, logs, SIEM
CorrectiveMitigate damage after attackBackup restore, patch management
DeterrentDiscourage attackersWarning banners, cameras
CompensatingAlternative when primary control not feasibleLogging when encryption impossible

By Implementation:

TypeDescriptionExamples
TechnicalTechnology-basedFirewalls, antivirus, encryption
AdministrativePolicies and proceduresSecurity training, background checks
PhysicalTangible barriersLocks, guards, fences

Control Type Matrix:

FunctionTechnicalAdministrativePhysical
PreventiveFirewallHiring policyLock
DetectiveIDSAudit reviewCamera
CorrectivePatch mgmtIncident responseFire suppression

What Is Defense in Depth?

Defense in depth implements multiple layers of controls so that failure of one doesn't compromise security.

Defense in Depth Layers:

Layer 1: Perimeter
├── Firewall
├── IPS
└── Email gateway

Layer 2: Network
├── Segmentation
├── VLANs
└── Internal firewalls

Layer 3: Endpoint
├── Antivirus
├── Host firewall
└── EDR

Layer 4: Application
├── WAF
├── Input validation
└── Authentication

Layer 5: Data
├── Encryption
├── DLP
└── Access controls

Why Layers Matter:

Single control: If firewall fails → Compromised

Defense in depth:
Firewall bypassed → IPS detects
IPS bypassed → Network segmentation contains
Segment breached → Endpoint protection blocks
Endpoint compromised → Data encrypted

How Do You Select Controls Based on Risk?

Risk-Based Selection Process:

StepActivity
1. Identify assetsWhat needs protection?
2. Assess threatsWhat could harm assets?
3. Identify vulnerabilitiesWhat weaknesses exist?
4. Calculate riskLikelihood × Impact
5. Select controlsMatch controls to risks
6. Evaluate residual riskIs remaining risk acceptable?

Control Selection Criteria:

FactorConsideration
Risk reductionHow much does it reduce risk?
CostPurchase, implementation, maintenance
Operational impactDoes it interfere with business?
ComplexityCan staff manage it?
ComplianceDoes it satisfy requirements?

Risk vs Control Cost:

If control cost > risk impact → Don't implement
If control cost < risk impact → Implement

Example:
Risk: $50,000 potential loss
Control A: $10,000 (reduces risk 80%) → Good ROI
Control B: $100,000 (reduces risk 90%) → Excessive

What Are Compensating Controls?

Compensating controls are alternative measures when primary controls aren't feasible.

When to Use Compensating Controls:

  • Technical limitations prevent primary control
  • Cost prohibitive for primary control
  • Operational requirements conflict
  • Temporary measure during implementation

Compensating Control Examples:

Primary ControlIssueCompensating Control
Full disk encryptionLegacy system incompatiblePhysical security + monitoring
MFASystem doesn't supportIP restrictions + enhanced logging
Network segmentationFlat network requiredEnhanced monitoring + strict ACLs
PatchingCritical system can't be patchedIPS signatures + isolation

Compensating Control Requirements:

  • Must provide equivalent protection
  • Addresses the same risk
  • Documented and approved
  • Reviewed periodically

How Do You Balance Security with Operations?

Security vs Usability Trade-offs:

ControlSecurity BenefitOperational Impact
Complex passwordsStronger authUser frustration
MFAAdditional verificationExtra login step
DLPData protectionFalse positive blocks
Full tunnel VPNTraffic inspectionPerformance impact

Finding Balance:

Too strict: Users bypass controls
Too loose: Inadequate protection

Goal: Maximum security with minimum friction

Strategies for Balance:

  • Risk-based approach (more controls for sensitive areas)
  • User experience testing
  • Gradual implementation
  • Feedback mechanisms
  • Regular review and adjustment

How Do Compliance Requirements Affect Control Selection?

Compliance-Driven Controls:

RegulationRequired Controls
PCI DSSFirewall, encryption, access control
HIPAAAccess controls, audit logs, encryption
SOXSegregation of duties, audit trails
GDPRData protection, consent mechanisms

Compliance vs Risk-Based:

Risk-based: Select controls based on actual risk
Compliance: Select controls required by regulation

Best practice: Use compliance as baseline,
              add risk-based controls as needed

How CompTIA Tests This

Example Analysis

Scenario: A hospital needs to protect patient records (PHI) on a legacy system that cannot support modern encryption. Budget is limited, and the system is critical for patient care—it cannot be taken offline for upgrades.

Analysis - Control Selection:

Constraints:

ConstraintImplication
Legacy systemModern encryption impossible
Limited budgetCan't buy everything
Critical systemMust maintain availability
HIPAA requiredCompliance mandatory

Primary Control (Encryption) Not Feasible:

Cannot implement because:
- Legacy OS doesn't support
- System can't be upgraded
- Can't take offline

Compensating Control Strategy:

Control TypeControlPurpose
PhysicalLocked server roomPrevent physical access
TechnicalNetwork segmentationIsolate from threats
TechnicalEnhanced monitoringDetect unauthorized access
TechnicalStrict ACLsLimit network access
AdministrativeAccess loggingAudit trail
AdministrativeStaff trainingAwareness of risks

Defense in Depth Implementation:

Layer 1: Physical
- Biometric access to server room
- Surveillance cameras

Layer 2: Network
- Dedicated VLAN for legacy system
- Firewall isolating segment
- IPS monitoring traffic

Layer 3: Access Control
- Minimum necessary access
- Role-based permissions
- Strong authentication

Layer 4: Monitoring
- Comprehensive logging
- Real-time alerting
- Daily log review

Documentation:

Compensating Control Justification:
- Primary control: Full disk encryption
- Why not feasible: Legacy system incompatibility
- Compensating controls: [list above]
- Risk assessment: Residual risk acceptable
- Review date: Quarterly
- Exit strategy: System replacement within 18 months

Key insight: When primary controls aren't feasible, compensating controls must provide equivalent protection through alternative means. Document the justification, ensure controls address the same risk, and plan for eventual implementation of the primary control.

Key Terms

control selectiondefense in depthsecurity controlsrisk-based securitycompensating controlspreventive detective corrective

Common Mistakes

More controls = more security—excessive controls create complexity, operational burden, and may be bypassed. Select appropriate controls.
One control is enough—single points of failure leave gaps. Use defense in depth with multiple layers.
Ignoring operational impact—controls that severely impact operations get disabled. Balance security with usability.
Forgetting compensating controls—when primary controls aren't feasible, document and implement compensating controls.

Exam Tips

Preventive controls STOP attacks. Detective controls FIND attacks. Corrective controls FIX damage.
Defense in depth = multiple layers. If one fails, others still protect. Never rely on a single control.
Compensating controls = alternatives when primary controls can't be implemented. Must provide equivalent protection.
Cost of control should not exceed the risk being mitigated. Security spending should be proportional to risk.
Technical + Administrative + Physical controls together provide strongest protection (layered approach).
Compliance requirements are MINIMUM baseline. Add risk-based controls as needed beyond compliance.

Memory Trick

Control Types - "PDC DET" (Protect, Detect, Correct, Deter):

  • Preventive = Prevents attacks (stops before happening)
  • Detective = Detects attacks (finds ongoing)
  • Corrective = Corrects damage (fixes after)
  • Deterrent = Discourages attackers
  • Compensating = Compensates for missing controls

Defense in Depth Memory: "Don't put all eggs in one basket, don't put all security in one firewall"

Think of a castle: - Moat (perimeter security) - Walls (network controls) - Guards (endpoint protection) - Inner keep (application security) - Treasure vault (data encryption)

Control Selection Formula: "If the Control Costs more than the Risk, it's Ridiculous" Control Cost > Risk Impact = Don't implement

Compensating Control Rule: "Can't do Plan A? Plan B must protect just as well" Same risk addressed, different method

Test Your Knowledge

Q1.A company cannot implement encryption on a legacy system. What should they use instead?

Q2.What security principle implements multiple layers of controls so that if one fails, others still protect?

Q3.What type of control would an IDS (Intrusion Detection System) be classified as?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee