Skip to main content

Control Index

Purpose

This page provides the canonical index of all security controls defined within the Scheol Security Lab.

It ensures that controls are:

  • uniquely identified
  • aligned with actual risks
  • traceable to implementation and validation
  • easy to navigate and review

Each control is documented as an individual entry.


Control Index

Control IDNameTypeRelated RisksStatusLink
C-001Reverse Proxy Exposure ControlPreventiveR-001ActiveView
C-002Network Segmentation EnforcementPreventiveR-001PlannedView
C-003Web Application HardeningPreventiveR-002In ProgressView
C-004Data Access RestrictionPreventiveR-002PlannedView
C-005Administrative Access HardeningPreventiveR-003In ProgressView
C-006Credential & Secrets ManagementPreventiveR-003ActiveView
C-007Logging & Detection BaselineDetectiveR-001, R-002, R-003PlannedView

Scope & Strategy

At the current stage, the control set is intentionally:

  • limited in number
  • directly aligned with active risks (R-001 to R-003)
  • focused on high-impact security improvements

This ensures:

  • strong coherence between risk and control layers
  • realistic implementation within the lab
  • avoidance of unnecessary or unused controls

Traceability Rules

Each control must be linked to:

  • at least one risk
  • one or more assets or architectural components
  • a defined validation method

This guarantees consistency across:

  • Risk Register
  • Applied Security Architecture
  • Validation & Monitoring

Status Definition

  • Active → control implemented and operational
  • In Progress → partially implemented or being deployed
  • Planned → defined but not yet implemented

Current Maturity

Established

  • clear control identification and structure
  • alignment with core risks (R-001 to R-003)
  • consistent control classification

In Progress

  • implementation of key controls (access, application, segmentation)
  • definition of validation mechanisms
  • linkage with assets and architecture

Planned

  • expansion aligned with future risks and scenarios
  • integration with monitoring and validation layers
  • improved audit and evidence traceability