4.2 Control Selection, System Security, and Architecture Risk
Key Takeaways
- Control selection should begin with business impact, threat likelihood, legal obligations, and architecture constraints.
- System security capabilities include isolation, trusted paths, secure boot, memory protection, logging, configuration control, and recovery.
- Architecture risk often appears in dependencies, inherited trust, management planes, integration patterns, and lifecycle gaps.
- The best control set is defensible, measurable, affordable to operate, and tied to explicit residual risk acceptance.
Selecting Controls for Real Systems
Control selection is not a shopping exercise. It is a risk management decision that connects assets, threats, vulnerabilities, business impact, compliance duties, operating capability, and cost. A CISSP-level architect should be able to explain why a control belongs in the design, what risk remains, and how the control will be maintained.
Start with the mission of the system. A public marketing site, a hospital medication platform, a trading system, and an industrial controller do not need the same control emphasis. Confidentiality, integrity, availability, privacy, safety, and nonrepudiation compete differently in each environment, and the selected controls should reflect that context.
Controls can be administrative, technical, or physical. Administrative controls include policy, standards, training, vendor requirements, risk acceptance, and change management. Technical controls include access enforcement, encryption, endpoint hardening, network segmentation, vulnerability scanning, and logging. Physical controls include locks, guards, barriers, surveillance, fire suppression, and environmental protections.
Controls also have functional types. Preventive controls try to stop an event, detective controls identify events, corrective controls restore desired conditions, deterrent controls discourage behavior, recovery controls restore service, and compensating controls provide alternate risk reduction when the preferred control is not feasible. Mature designs combine these types instead of relying on one layer.
| Risk driver | Control question | Example control response |
|---|---|---|
| High business impact | What must not fail silently? | Strong monitoring, alerting, tested recovery |
| Privileged access | Who can change trust decisions? | PAM, approval workflow, session logging |
| Sensitive data | Where is data exposed or transformed? | Encryption, tokenization, DLP, access review |
| Legacy dependency | What cannot be fixed directly? | Segmentation, allow lists, virtual patching |
| Third-party connection | What trust is inherited? | Contract clauses, federation limits, monitoring |
System security capabilities are the built-in properties that make controls reliable. Secure boot helps ensure trusted firmware and boot components. Hardware roots of trust, TPMs, measured boot, and attestation can support stronger assurance, especially for endpoints, servers, and cloud workloads that must prove their state before receiving access.
Memory protection, process isolation, address space layout randomization, and execution prevention reduce the impact of coding errors and exploitation attempts. These are not substitutes for secure development, but they provide resilience. Security leaders should ask whether high-value workloads run on platforms with modern hardening enabled and monitored.
Trusted paths matter when users or administrators perform sensitive actions. A login prompt, privilege elevation process, or management console must be distinguishable from an imitation. Phishing-resistant authentication, signed administrative tools, hardened jump hosts, and protected management networks all support the idea that critical commands occur through trustworthy channels.
Reference monitors are conceptual enforcement points that mediate access between subjects and objects. For practical architecture, the key properties are always invoked, tamper resistant, and small enough to verify. Modern examples include kernel access checks, hypervisor controls, identity policy engines, API gateways, and storage access policies.
Architecture risk appears where diagrams become too optimistic. A single identity provider may become a systemic failure point. A shared CI/CD runner may become a path into production. A cloud management account may bypass network segmentation. A logging pipeline may collect sensitive data that creates a new privacy and breach exposure.
Risk also appears in inherited trust. If a SaaS platform, managed service, container image, open source library, certificate authority, DNS provider, or outsourced support team is trusted by the architecture, that trust must be deliberate. Contracts, assurance reports, configuration baselines, monitoring, and exit plans help manage what the organization does not directly control.
Use this architecture risk register pattern during design review:
| Item | Risk statement | Primary control | Residual risk owner |
|---|---|---|---|
| Management plane | Compromise could bypass application controls | MFA, PAM, network restrictions, logging | Platform owner |
| Build pipeline | Malicious build could reach production | Signed commits, protected branches, artifact signing | Engineering leader |
| Shared database | Tenant data could be exposed by query defect | Row controls, test coverage, monitoring | Product owner |
| Legacy service | Unsupported OS may be exploited | Isolation, virtual patching, replacement plan | Business sponsor |
Good control selection includes verification. A design that says encryption is required should identify approved algorithms, key ownership, rotation expectations, exception handling, and where plaintext exists. A design that says logging is required should specify event types, retention, time synchronization, access controls, alerting rules, and privacy constraints.
Compensating controls deserve careful treatment. They are valid when the primary control is infeasible, but they should be documented with scope, rationale, monitoring, expiration, and approval. A compensating control that becomes permanent without review is often a hidden acceptance of risk.
CISSP judgment favors proportionality. Overcontrolling a low-risk system can waste resources and create shadow IT. Undercontrolling a mission-critical system can create unacceptable loss exposure. The security architect should guide stakeholders toward a balanced design that is defensible to auditors, executives, engineers, and operations teams.
A legacy system cannot support modern endpoint protection, but it must remain online for six months. Which response best reflects compensating control use?
Which property is most important for a practical reference monitor?
A cloud administrator account can disable network controls, read storage, and change identity policies. What is the strongest architecture concern?