Key diagram types used in information security

Architecture Diagram |Data Flow Diagram |Network Diagram |Process Flow Diagram

Almost every one of us has drawn some kind of information security diagram for various purposes including compliance, regulatory, contractual, and other requirements. You can draw any kind of diagram as needed for each control type as shown in the below diagram.

Administrative Controls: These controls focus on the management and governance of security and compliance. Examples include policies, procedures, security awareness training, risk assessments, incident response plans, and access control management. Example- Organizational Structural Diagram.

Technical Controls: These controls are implemented through technology to protect systems, networks, and data. Examples include firewalls, intrusion detection systems, encryption, access controls, antivirus software, and security monitoring tools. Example- network topology diagram

Physical Controls: These controls are physical measures implemented to safeguard physical assets, facilities, and resources. Examples include security cameras, locks, access control systems, biometric authentication, perimeter fencing, and secure storage. Example- building evacuation diagram.

Control types with associated diagrams and examples

Broadly Classification

--

--

Aakif Shaikh, CISSP, CEH, CHFI, CISA, GWAPT

Over 18 years of experience in a wide variety of technical domains within information security including information assurance, compliance, and risk management.