Question: Could I please get a complete list of common security controls and solutions like and besides these? Firewalls Anti-virus Malware Access Controls Intrusion Detection System
Could I please get a complete list of common security controls and solutions like and besides these?
| Firewalls | Anti-virus | Malware | Access Controls |
| Intrusion Detection System (IDS) | Intrusion Prevention System (IPS) | Monitoring | DMZ |
| ACLs | MAC filtering | Web Filtering | FIM |
| Physical Locks | Guards | Awareness | Policies |
| Incident Response Plan (IRP) | Disaster Recovery (DR) | Business Continuity Plan (BCP) | Training |
| Authentication | Authorization | Identity and Access Management (IDM) | Role-based Access |
| Encryption | AD group Policies | VPN | Multi-factor authentication (MFA) |
| Certificates | Web Application FWs | Proxy server | Backups |
| Segmentation | Redundancy | White/Black Listing | SIEM |
| Auditing | Honey Pots | Logging | Vuln Assessments |
| Pen Tests | Cameras | Privileged Access Management (PAM) | SDLC |
- Inventory and Control of Hardware Assets
- Inventory and Control of Software assets
- Continuous vulnerability management
- Controlled use of administrative privileges
- Secure configs. for hardware and software on all devices
- Maintenance, monitoring, and analysis of audit logs
- Email and web browser protection
- Malware defenses
- Data recovery capabilities
- Wireless access control
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
