Security Controls
Cheat Sheet
6 Layers You Need to Know — And Actually Use
These aren't just buzzwords. These are the actual controls I've seen make or break an org's security posture. Know them, implement them, and stop leaving doors open.
🛡️
01 / LAYER
Preventive Controls
Firewalls — Your first line. If traffic doesn't belong, it shouldn't get in.
Access Control (RBAC/ABAC) — Give people access to what they need. Nothing more.
Multi-Factor Authentication — Passwords alone aren't enough. Stop treating them like they are.
Encryption (Rest & Transit) — If data gets out, make sure it's unreadable.
Hardening & Config Management — Turn off what you're not using. Defaults are a gift to attackers.
Network Segmentation — One breach shouldn't own your whole network.
Patch Management — Unpatched systems are just open invitations. Patch them.
🔍
02 / LAYER
Detective Controls
IDS / IPS — You need something watching the wire 24/7. This is it.
SIEM Monitoring — Logs are useless if nobody's reading them. SIEM makes them talk.
EDR / XDR — Endpoints are where attacks land first. Watch them closely.
Threat Intelligence Feeds — Know what's out there before it finds you.
File Integrity Monitoring — If a file changed and nobody knows why, that's a problem.
Network Monitoring Tools — Anomalies don't announce themselves. You have to look.
⚙️
03 / LAYER
Corrective Controls
Incident Response Playbooks — When things break, you need a plan. Build it before you need it.
Backup & Recovery Plans — Untested backups are just hope. Test them regularly.
Post-Breach Patching — Fix the hole they came through. Then look for others.
System Reimaging — Sometimes a clean wipe is the only real fix.
Root Cause Analysis — Closing a ticket isn't the same as fixing the problem.
Malware Removal Tools — Get it off the system completely. Don't assume it's gone.
⚖️
04 / LAYER
Compensating Controls
WAF / Virtual Patching — Can't patch right now? At least put something in front of it.
Enhanced Monitoring — If you can't lock it down, watch it twice as hard.
Legacy System Encryption — Old systems still need protection. Layer it on.
Dual Authorization — Two sets of eyes on critical actions. Always.
🔒
05 / LAYER
Physical Controls
CCTV Surveillance — People act differently when they know they're being watched.
Biometric Access — A badge can be stolen. A fingerprint is a lot harder to fake.
Locked Server Rooms — Physical access to a server is game over. Protect the room.
Security Personnel — Technology helps, but human presence still matters.
Motion Detection & Alarms — If someone's where they shouldn't be, you need to know now.
📋
06 / LAYER
Administrative Controls
Security Policies & Standards — If it's not written down, it doesn't exist. Document everything.
Risk Assessments — Find your weak spots before someone else does.
Background Screening — Insider threats are real. Know who you're letting in.
Third-Party Risk Management — Your vendors are part of your attack surface. Treat them that way.
Change Management Policy — Undocumented changes are how things break at 2am on a Friday.
Incident Response Plan — A breach with no plan is a disaster. A breach with a plan is a recovery.