A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time.In the payment card industry, compensating controls were introduced in Payment Card Industry Data Security Standard (PCI DSS) to give organizations an alternative to security requirements that could not be met due to legitimate technological or business constraints. According to the PCI Council, compensatory controls must:
1) Meet the intent and rigor of the original stated requirement;
2) Provide a similar level of defense as the original requirement;
3) Be "above and beyond" other requirements (not simply in compliance with other requirements); and
4) Be commensurate with the additional risk imposed by not adhering to the original stated requirement.Examples of compensating controls for information technology security include:
Segregation of Duties (SoD) - an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task. Fraud and error are risks in payroll management. To mitigate that risk, a company might have one employee responsible for the accounting portion of the job and another responsible for signing the checks. However, segregation of duties can be difficult for businesses with small staffs. Compensating controls, in this case, might include maintaining and reviewing logs and audit trails.
Encryption - converting all electronic data into ciphertext and changing cryptographic keys periodically can be difficult and expensive to implement. As is frequently the case, multiple compensating controls may be required to provide security that is equivalent to the control being replaced. Compensating controls in lieu of comprehensive data encryption might include the use of database security applications and services, network access control (NAC), data leak prevention strategies and e-mail encryption.
email@example.com or 609 818 1802.
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
Anyone who would like to review the book and have it posted on my blog or website, please contact me firstname.lastname@example.org.
In addition to this blog, I maintain a radio show on BlogtalkRadio online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahooa member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.