Skip to main content

Controls

Controls are the core building blocks of compliance management in Openlane. They represent specific security, privacy, or operational requirements that organizations must implement to meet compliance standards and manage risks effectively.

According to ISACA, "internal controls" include the policies, standards, procedures and other organizational structures that are designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented, detected and corrected.

The Institute of Internal Auditors (IIA) defines control, the control environment, and control processes as follows: A control is any action taken by management, the board, and other parties to manage risk and increase the likelihood that established objectives and goals will be achieved.

What is a Control?

A Control in Openlane represents a specific compliance requirement, security safeguard, or operational procedure that an organization implements to achieve compliance with standards and manage risks. Controls define what needs to be done, how it should be implemented, and how it will be tested or verified.

Control Types

Controls which alert employees to an action.


Example: Log Monitoring with Alerts, Data leak Prevention, Intrusion Detection System

Compliance Significance

AspectPurposeBenefit
Requirements ImplementationTranslate standards into actionable controlsConverts abstract compliance into specific, testable requirements
Evidence FoundationEnable systematic evidence collectionProvides clear audit trail and compliance demonstration
Risk ManagementAddress specific threats through controlsReduces organizational risk through preventive/detective measures
Assessment FrameworkEnable systematic compliance evaluationAllows measurement and improvement of compliance posture
Certification SupportProvide foundation for formal certificationsEnables SOC 2, ISO 27001, and other compliance certifications

Relationship Diagram

Control Categories

Control CategoryDescription
AdministrativeAdministrative controls are policies, procedures, and guidelines that are put in place to manage security risks. Examples include security training, incident response plans, and access control policies.
TechnicalTechnical controls are hardware and software solutions that are put in place to manage security risks. Examples include firewalls, intrusion detection systems, and encryption.
PhysicalPhysical controls are measures that are put in place to protect physical assets. Examples include security cameras, access control systems, and security guards.

Key Points to Remember

  • Policies set the direction:
    • Policies define the overall goals and expectations for managing risks, acting as the foundation for creating controls.
  • Controls are the active measures:
    • Controls are the actual mechanisms or processes used to manage risks, including things like approvals, verifications, monitoring systems, and security protocols.
  • Procedures provide the steps:
    • Procedures outline the specific actions and steps employees need to take to follow the policies and implement the controls effectively.

Control Classifications

By Function

TypePurposeExample
PreventivePrevent incidents before they occurMulti-factor authentication, firewalls
DetectiveIdentify incidents when they happenLog monitoring, intrusion detection
CorrectiveFix issues after detectionIncident response, patch management
DeterrentDiscourage potential violationsSecurity awareness, penalty policies

By Source

TypeUse CaseExamples
FrameworkStandard compliance requirementsSOC 2 CC6.1, ISO 27001 A.9.1.1
CustomOrganization-specific needsCryptocurrency controls, industry-specific
TemplateCommon implementation patternsBasic access control template
ImportedExternal or legacy systemsPrevious audit controls, vendor controls

Control Status Lifecycle

StatusMeaningNext Actions
PREPARINGControl being designed and plannedComplete implementation guidance, assign owners
NEEDS_APPROVALReady for management reviewReview requirements, approve or request changes
CHANGES_REQUESTEDRequires modifications before approvalAddress feedback, resubmit for approval
APPROVEDApproved and ready for implementationBegin implementation, collect evidence
NOT_IMPLEMENTEDApproved but not yet activeComplete implementation activities
ARCHIVEDNo longer active or relevantDocument reason for archival