Skip to main content

Control Framework

Purpose

This section describes how security controls are defined, structured, and managed within the Scheol Security Lab.

The objective is to:

  • translate identified risks into concrete control measures
  • ensure traceability between risks, controls, and implementation
  • support monitoring, validation, and future audit activities

Controls are not treated as abstract requirements, but as practical mechanisms designed to reduce identified risks.


What is a Control in Scheol

A control is any measure that reduces the likelihood or impact of a risk.

Controls may be:

  • Technical - configurations, system hardening, access restrictions
  • Operational - procedures, workflows, administrative practices
  • Organizational - governance rules, ownership, documentation

Each control is expected to be:

  • clearly defined
  • linked to one or more risks
  • implemented or planned
  • verifiable

Control Lifecycle

Controls follow a structured lifecycle:

  1. Identification Derived from risk analysis and threat scenarios

  2. Definition Description of the control objective and expected outcome

  3. Implementation Deployment within the infrastructure or processes

  4. Validation Verification that the control is effective

  5. Monitoring Continuous observation of control performance

  6. Review & Improvement Adjustment based on observed gaps or evolving risks

This lifecycle ensures that controls remain aligned with actual risk exposure.


Risk-to-Control Traceability

A key principle of this framework is traceability.

Each control should be:

  • linked to one or more risk entries
  • associated with specific assets or architectural components
  • supported by documentation or configuration references

This allows:

  • understanding why a control exists
  • evaluating its relevance
  • identifying gaps or redundancies

Framework Alignment

The control framework is inspired by:

  • ISO/IEC 27001:2022
  • NIST Cybersecurity Framework (CSF)
  • GDPR security and data protection principles

These references are used to:

  • structure control categories
  • ensure coverage of key security domains
  • support alignment with common practices

However, the lab does not claim formal compliance with these frameworks.


Control Categories (High-Level)

Controls are progressively organized into categories such as:

  • Identity & Access Control
  • Network Security
  • System Hardening
  • Logging & Monitoring
  • Backup & Recovery
  • Vulnerability & Exposure Management
  • Governance & Documentation

These categories are intended to evolve as the lab matures.


Relationship with Architecture

Controls are closely tied to the architecture:

  • segmentation decisions influence network controls
  • identity model influences access controls
  • exposure level influences hardening requirements

Controls are therefore not defined in isolation, but as part of the overall system design.


Evolution

The control framework is under active development.

Current efforts focus on:

  • mapping controls to identified risks
  • structuring a consistent control catalogue
  • improving documentation and traceability

Future work will include:

  • formal control mapping (ISO / NIST alignment)
  • systematic validation of control effectiveness
  • integration with monitoring and audit activities

Current Maturity

At the current stage, the control framework is considered in early structuring phase.

Established

  • clear definition of control concept
  • initial linkage between risks and technical measures
  • early documentation of implemented safeguards
  • awareness of traceability requirements

In Progress

  • structured control catalog definition
  • consistent mapping between risks and controls
  • categorization of controls across domains
  • documentation of control objectives and scope

Planned / Next Phase

  • formal control mapping (ISO 27001 / NIST CSF)
  • integration with validation and monitoring processes
  • improved traceability (risk → control → evidence)
  • support for audit and review activities

This section is expected to significantly evolve as the lab matures.