Marty wants to deploy a corrective control to deal with a recently compromised system. Which of the following would be considered a corrective control?
Answer Options
Patching the vulnerability that allowed the compromise to occur
Deploying full-disk encryption
Deploying an endpoint detection and response (EDR) tool
Enabling logging and sending logs to a SIEM
Correct Answer: A
Explanation
Corrective controls attempt to remediate security issues that have already occurred. Patching the flaw that allowed an attack to succeed is an example of a corrective control. Deploying full-disk encryption or an EDR tool are both examples of preventive controls, and logging and log monitoring are examples of detective controls. It is important to note that in many cases, controls could be identified as multiple potential control types. In cases where controls might fit multiple control types, you should look for the control that is most obviously the correct control type.