Control Management
Overview
The Control Management module is a critical component of the Information Security Essentials product, designed to help organizations implement, track, and assess security controls. Security controls are the specific safeguards or countermeasures that protect the confidentiality, integrity, and availability of your information assets.
This module provides a structured approach to control management, enabling you to:
Define and document security controls based on industry frameworks
Assess control implementation and effectiveness
Link controls to policies, risks, and compliance requirements
Collect and organize evidence of control implementation
Monitor control status and compliance across your organization
Key Features
Control Framework Support
Industry Frameworks - Implement controls based on standard frameworks (ISO 27001, NIST 800-53, CIS Controls, etc.)
Custom Frameworks - Create organization-specific control frameworks
Framework Mapping - Map controls across multiple frameworks
Control Categories - Organize controls by domain, function, or type
Control Hierarchy - Establish relationships between high-level and detailed controls
Control Assessment
Assessment Workflows - Define and execute control assessment processes
Assessment Scheduling - Set regular assessment frequencies
Assessment Criteria - Establish clear criteria for evaluating controls
Scoring Methodology - Rate control implementation and effectiveness
Gap Analysis - Identify and address control deficiencies
Control Integration
Policy Mapping - Link controls to relevant security policies
Risk Mapping - Connect controls to specific risks they mitigate
Compliance Mapping - Associate controls with regulatory requirements
Evidence Linking - Attach documentation proving control implementation
Control Dependencies - Identify relationships between controls
Control Monitoring
Status Tracking - Monitor the implementation status of each control
Compliance Dashboards - Visualize control compliance across the organization
Remediation Tracking - Manage the resolution of control deficiencies
Audit Trail - Maintain a history of control changes and assessments
Reporting - Generate comprehensive control status reports
Getting Started
Accessing the Control Management Module
Log in to your AskInfosec account
Navigate to the main dashboard
Select "Controls" from the main navigation menu
You will be directed to the Control Management dashboard
Control Management Dashboard
The Control Management dashboard provides an overview of your organization's security controls, including:
Control Status Summary - Visual representation of control implementation status
Recent Activity - Latest control changes and assessments
Upcoming Assessments - Controls scheduled for review
Control Search - Quick access to specific controls
Control Categories - Organized view of controls by domain or type
Creating a New Control
Step 1: Initiate Control Creation
From the Control Management dashboard, click the "New Control" button
Select a control framework or choose to create a custom control
Enter basic control information:
Control Name
Control ID/Code
Description
Category
Owner/Approver
Assigned Team Members
Step 2: Define Control Details
Provide detailed information about the control:
Control Objective - What the control aims to achieve
Control Description - Detailed explanation of the control
Implementation Guidance - How the control should be implemented
Assessment Criteria - How to evaluate the control's effectiveness
Evidence Requirements - What documentation is needed to demonstrate compliance
Step 3: Establish Control Relationships
Link the control to relevant elements:
Policies - Connect to security policies that mandate the control
Risks - Associate with risks the control helps mitigate
Compliance Requirements - Map to specific regulatory requirements
Related Controls - Identify dependencies or relationships with other controls
Step 4: Set Assessment Parameters
Define how the control will be assessed:
Assessment Frequency - How often the control should be evaluated
Assessment Method - How the assessment will be conducted
Assessment Owner - Who is responsible for evaluating the control
Evidence Collection - What evidence should be gathered during assessment
Step 5: Save and Activate
Save the control definition
Set the initial status (e.g., Planned, In Progress, Implemented)
The control is now active in your control inventory
Managing Existing Controls
Viewing Control Details
To view a control's details:
Navigate to the Control Management dashboard
Locate the control using search or category filters
Click on the control name to open the control details page
The details page shows:
Control definition and requirements
Implementation status
Assessment history
Related elements (policies, risks, etc.)
Evidence and documentation
Comments and activity log
Editing a Control
To edit an existing control:
Open the control details page
Click the "Edit" button
Make your changes to the control definition
Save your changes
The system will track the change history
Control Assessment Process
Regular control assessments are essential for maintaining an effective security program:
Navigate to the control details page
Click "Conduct Assessment"
Follow the assessment workflow:
Review control requirements
Gather and evaluate evidence
Determine compliance status
Document findings and observations
Assign remediation actions if needed
Complete the assessment by providing an overall rating
The assessment results are saved to the control's history
Control Remediation
When control deficiencies are identified:
From the assessment results, click "Create Remediation Plan"
Define the remediation actions:
Description of required actions
Assigned responsibility
Due date
Priority level
Save the remediation plan
Track progress through the remediation workflow
Once completed, conduct a follow-up assessment to verify effectiveness
Control Evidence Management
Adding Evidence to Controls
To document control implementation:
Navigate to the control details page
Select the "Evidence" tab
Click "Add Evidence"
Choose the evidence type:
Document upload
Link to existing document
Screenshot
Text description
External reference
Provide a description explaining how the evidence demonstrates compliance
Upload or link the evidence
Save the evidence record
Managing Evidence
To organize and maintain control evidence:
Navigate to the control details page
Select the "Evidence" tab
View all evidence associated with the control
Filter evidence by type, date, or assessment
Update or replace outdated evidence
Remove irrelevant or obsolete evidence
Evidence Review
During control assessments, review evidence for:
Relevance - Does the evidence directly relate to the control?
Completeness - Does it fully demonstrate compliance?
Currency - Is the evidence up-to-date?
Authenticity - Is the evidence reliable and trustworthy?
Sufficiency - Is there enough evidence to support compliance?
Control Reporting
Control Status Reports
Generate reports on control implementation status:
Navigate to the Reports section
Select "Control Status Report"
Choose filtering and grouping options:
Framework
Category
Status
Owner
Generate the report
Export to PDF, Excel, or CSV format
Compliance Mapping Reports
Create reports showing control coverage of compliance requirements:
Navigate to the Reports section
Select "Compliance Mapping Report"
Choose the compliance framework
Generate the report
Identify gaps in control coverage
Assessment Reports
Document control assessment results:
Navigate to the Reports section
Select "Control Assessment Report"
Choose the assessment period and scope
Generate the report
Use for audit evidence and program improvement
Control Frameworks
Supported Frameworks
The Control Management module supports several industry-standard frameworks:
ISO 27001/27002 - International standard for information security management
NIST 800-53 - Security controls for federal information systems
CIS Controls - Top 20 critical security controls
SOC 2 - Trust Services Criteria for service organizations
PCI DSS - Payment Card Industry Data Security Standard
HIPAA - Health Insurance Portability and Accountability Act
Custom Frameworks - Organization-specific control sets
Framework Mapping
To map controls across multiple frameworks:
Navigate to the Framework Mapping section
Select the source and target frameworks
Create mappings between equivalent controls
Use these mappings to demonstrate compliance across multiple standards
Best Practices
Control Definition
Be specific - Clearly define what the control requires
Set measurable criteria - Establish objective ways to assess compliance
Consider context - Adapt controls to your organization's environment
Document exceptions - Note any situations where the control doesn't apply
Review regularly - Update control definitions as requirements change
Control Assessment
Use consistent methodology - Apply the same assessment approach across controls
Gather objective evidence - Rely on documentation rather than verbal assertions
Involve subject matter experts - Include technical specialists in assessments
Document thoroughly - Record assessment methods, findings, and conclusions
Follow up on deficiencies - Ensure remediation actions are completed
Control Management
Assign clear ownership - Ensure each control has a designated owner
Establish review cycles - Regularly reassess all controls
Maintain evidence - Keep documentation current and accessible
Track changes - Document modifications to control implementations
Align with policies - Ensure controls support policy requirements
Troubleshooting
Common Issues
Control overlap - Identify and manage redundant controls
Incomplete evidence - Address gaps in control documentation
Assessment inconsistency - Standardize assessment approaches
Remediation delays - Track and escalate overdue remediation actions
Framework conflicts - Resolve differences between control requirements
Getting Support
If you encounter issues with the Control Management module:
Check the in-app help documentation
Contact your organization's system administrator
Submit a support ticket through the AskInfosec support portal
Conclusion
Effective control management is essential for implementing and maintaining a strong security posture. The Control Management module provides the tools and structure needed to define, assess, and monitor security controls across your organization.
By following the processes outlined in this guide, you can establish a robust control framework that protects your information assets, meets regulatory requirements, and demonstrates your commitment to security best practices.
Last updated