Coriacea: Your Digital Skin
Security Controls are our defense mechanisms, which are also used to reduce the level of risk.
Technically, we have 2x3x6 = 36 different types of Security Controls of different nature, which are, at the same time, cooperating with each other.
Each of the 36 possible types made up of the whole of this triad (Classes, Types, Categories) can contain an indefinite number of specific security controls. This means that in reality, we have a very large number of possible solutions to be put in place to defend our assets. However, identifying the high-risk T-V-A (Threat-Vulnerability-Assessment) triads is by no means an easy process.
Creating a very refined and efficient risk assessment is the first step to create your digital skin.