Module 18: Information Security Control Design and Selection
What the Exam Is Really Testing
Every question on control design comes back to one principle:
Controls must be designed and selected based on risk, business objectives, and proportional protection — not technical preference.
Control design must:
- Reduce risk to within appetite
- Align with asset classification
- Reflect regulatory obligations
- Be cost-effective
- Be operationally sustainable
Over-control wastes resources. Under-control increases exposure.
The Executive Mindset Shift
Doer mindset:
Implement the strongest control possible.
Leader mindset:
Implement the most appropriate control based on risk level and business impact.
Security leaders must:
- Evaluate inherent risk
- Assess existing control gaps
- Select preventive, detective, and corrective controls appropriately
- Consider cost-benefit
- Avoid operational disruption beyond tolerance
Control design is risk-based — not technology-driven.
Types of Controls
Preventive Controls
- Stop incidents before they occur
- Access control
- Encryption
- Network segmentation
Reduce likelihood.
Detective Controls
- Identify incidents after occurrence
- Monitoring
- Logging
- Alerts
- Audits
Reduce impact through early detection.
Corrective Controls
- Restore systems after incident
- Backup recovery
- Patch remediation
- Incident response
Reduce duration and impact.
CISM expects layered defense — not reliance on a single control type.
Design Principles
Effective control design:
- Aligns with asset classification.
- Matches threat likelihood and impact.
- Integrates with governance frameworks.
- Is measurable.
- Assigns clear ownership.
- Is sustainable within staffing capacity.
Controls must be documented and monitored.
Cost-Benefit Consideration
Before implementing a control, ask:
- Does it reduce residual risk below appetite?
- Is cost proportionate to risk?
- Does it disrupt business operations?
- Can the organization support it long term?
Excessive controls can introduce operational risk.
Pattern Recognition
When control design appears in a question, ask:
- What is the underlying risk?
- What classification level applies?
- Is a preventive control realistic?
- Is layered defense needed?
- Is proportionality maintained?
Correct answers often involve:
- Risk-based control selection
- Balanced preventive/detective layering
- Alignment with business objectives
- Cost-benefit evaluation
- Clear accountability
Not:
- Implementing maximum restriction automatically
- Selecting technology without risk assessment
- Ignoring operational impact
- Relying solely on detective controls
Trap Pattern
Common wrong instincts:
- “Use the strongest control available.”
- “Encrypt everything equally.”
- “One control is sufficient.”
- “Ignore cost implications.”
CISM emphasizes balanced, risk-aligned control architecture.
Scenario Practice
Question 1
A system processes highly sensitive financial data. Inherent risk is high, and existing controls are minimal.
What is the MOST appropriate approach?
- Implement layered preventive and detective controls aligned with classification
- Increase monitoring only
- Accept the risk
- Outsource the system
Answer & Explanation
Correct Answer: A
High inherent risk requires layered controls aligned with asset classification.
Question 2
A preventive control would significantly disrupt a critical business process, but risk is moderate and within tolerance.
What is the MOST appropriate action?
- Implement the control anyway
- Evaluate alternative proportional controls
- Eliminate the business process
- Ignore the risk
Answer & Explanation
Correct Answer: B
Controls must balance security with operational feasibility.
Question 3
An organization relies solely on detective monitoring for high-risk systems.
What is the PRIMARY weakness?
- Encryption gap
- Vendor inefficiency
- Lack of preventive control layering
- Reduced automation
Answer & Explanation
Correct Answer: C
Layered controls reduce likelihood and impact.
Question 4
A control reduces risk significantly but exceeds budget constraints.
What should occur FIRST?
- Ignore budget limitations
- Immediately cancel the control
- Transfer the risk
- Conduct cost-benefit and risk impact analysis
Answer & Explanation
Correct Answer: D
Control decisions must align with economic rationality.
Question 5
A control is selected without evaluating asset classification.
What is the MOST significant risk?
- Monitoring gap
- Misaligned protection relative to business impact
- Increased automation
- Vendor delay
Answer & Explanation
Correct Answer: B
Control design must reflect asset criticality.
Key Takeaway
In CISM:
Controls reduce risk — they do not eliminate it. Design must align with classification and appetite. Balance security with operational sustainability.
Before selecting a control:
- Evaluate risk.
- Confirm asset classification.
- Assess cost-benefit.
- Ensure layered protection.
- Assign ownership.
- Plan for monitoring.
On the exam, the right answer almost always favors risk-proportional design over maximum-strength defaults.