Member-only story
Key diagram types used in information security
Architecture Diagram |Data Flow Diagram |Network Diagram |Process Flow Diagram
Almost every one of us has drawn some kind of information security diagram for various purposes including compliance, regulatory, contractual, and other requirements. You can draw any kind of diagram as needed for each control type as shown in the below diagram.
Administrative Controls: These controls focus on the management and governance of security and compliance. Examples include policies, procedures, security awareness training, risk assessments, incident response plans, and access control management. Example- Organizational Structural Diagram.
Technical Controls: These controls are implemented through technology to protect systems, networks, and data. Examples include firewalls, intrusion detection systems, encryption, access controls, antivirus software, and security monitoring tools. Example- network topology diagram
Physical Controls: These controls are physical measures implemented to safeguard physical assets, facilities, and resources. Examples include security cameras, locks, access control systems, biometric authentication, perimeter fencing, and secure storage. Example- building evacuation diagram.