{"id":48884,"date":"2023-11-29T07:28:28","date_gmt":"2023-11-29T12:28:28","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=48884"},"modified":"2024-10-18T12:25:12","modified_gmt":"2024-10-18T16:25:12","slug":"control-design-why-it-needs-to-be-part-of-your-risk-management-process","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/control-design-why-it-needs-to-be-part-of-your-risk-management-process\/","title":{"rendered":"Control Design: Why It Needs to Be Part of Your Risk Management Process"},"content":{"rendered":"<h2 style=\"font-weight: 400; text-align: center;\">In this blog, we discuss how control design is a key part of your risk management process.<\/h2>\n<hr \/>\n<p style=\"font-weight: 400;\">We have noticed a trend that has caused some concern. <span data-contrast=\"none\">Many organizations are testing controls to see how well they work.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335557856&quot;:16777215,&quot;335559738&quot;:0,&quot;335559739&quot;:360}\">\u00a0<\/span><span data-contrast=\"none\">However, they are not paying enough attention to <\/span><a href=\"https:\/\/centricconsulting.com\/blog\/usability-testing-the-importance-of-using-it-in-your-product-design-process\/\">design testing<\/a>. An essential part of the risk management process is ensuring the controls established by management are operating effectively. But focusing on control design is just as important, if not more so.<\/p>\n<p style=\"font-weight: 400;\"><span class=\"TextRun SCXW139505815 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW139505815 BCX8\">If a control is not well-written and designed to <\/span><span class=\"NormalTextRun SCXW139505815 BCX8\">mitigate <\/span><span class=\"NormalTextRun SCXW139505815 BCX8\">risk, it may not be effective. Even if the control is working properly, it still may not be effective. It <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cybersecurity-consulting-services\/\">takes proper evaluation<\/a>, change management, and commitment to alter, test, and improve design of controls over time.\u00a0<\/span><\/span><\/p>\n<h2>Control Design Case Study: Before<\/h2>\n<p style=\"font-weight: 400; text-align: left;\"><span class=\"TextRun SCXW139505815 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW139505815 BCX8\">Let\u2019s<\/span><span class=\"NormalTextRun SCXW139505815 BCX8\"> take a real-world example of implementing control design improvements related to user access reviews:\u00a0<\/span><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Risk<\/strong>: Users\u2019 access rights are inappropriate based on their job responsibilities, leading to data misuse or modifications, both intentional and unintentional.<\/li>\n<li style=\"font-weight: 400;\"><strong>Control in Place<\/strong>: On an annual basis, risk managers review users\u2019 access to all key systems to ensure that access is appropriate.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">On the surface, this control seems to be properly designed to mitigate the risk of inappropriate access to key systems. Let\u2019s add more context to the situation:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Fact:<\/strong> 85 percent of the users of key systems participate in a rotational program. This<span class=\"TextRun SCXW54722530 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW54722530 BCX8\"> program allows them to switch departments and business units every quarter. It gives them valuable exposure to different areas of the company.<\/span><\/span><\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><span class=\"NormalTextRun SCXW163968800 BCX8\">This fact changes the situation of our control designed to mitigate the risk. If users <\/span><span class=\"NormalTextRun SCXW163968800 BCX8\">frequently<\/span><span class=\"NormalTextRun SCXW163968800 BCX8\"> change departments, the system administrator will <\/span><span class=\"NormalTextRun SCXW163968800 BCX8\">likely need<\/span><span class=\"NormalTextRun SCXW163968800 BCX8\"> to adjust their access to important systems accordingly.<\/span><\/p>\n<h2>Case Study Example: After<\/h2>\n<p style=\"font-weight: 400;\">Even the best <a href=\"https:\/\/centricconsulting.com\/blog\/organizational-change-management-the-secret-to-data-governance-success\/\">change management<\/a>, provisioning, and deprovisioning programs miss items from time to time. But having the proper mitigating controls in place helps reduce risk to a more acceptable level.<\/p>\n<p style=\"font-weight: 400;\">Considering the additional facts learned above, we should change our control design to read as follows:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>New Control Verbiage<\/strong>: On a quarterly basis, managers review users\u2019 access to all key systems to ensure access is appropriate.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">While the above example is a simple one, it does a great job of demonstrating the importance of designing specific controls. <strong>Organizations should perform careful process walkthroughs to gain an understanding of how their business operates. Evaluate what your risks really are, and which controls could help <a href=\"https:\/\/centricconsulting.com\/resources\/cybersecurity-is-not-a-device-effective-approaches-to-managing-cyber-risk\/\">mitigate those risks<\/a>.<\/strong><\/p>\n<p style=\"font-weight: 400;\"><span class=\"TextRun SCXW100510381 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW100510381 BCX8\">After designing your controls correctly, you can <\/span><span class=\"NormalTextRun SCXW100510381 BCX8\">proceed<\/span><span class=\"NormalTextRun SCXW100510381 BCX8\"> to test their effectiveness. However, make sure not to overlook the importance of the <\/span><span class=\"NormalTextRun SCXW100510381 BCX8\">control <\/span><span class=\"NormalTextRun SCXW100510381 BCX8\">design phase. In a changing world where risks are increasing, companies will be glad they carefully considered these control design issues.<\/span><\/span><\/p>\n<p style=\"font-weight: 400;\">\n        <div class=\"inline-cta purple\">\n            <div class=\"inline-cta--content\">\n                 Wonder what a cyber attacker sees when they target your organization? Wonder no more. Watch a live network attack demo simulated by an industry-leading offensive security expert. In our on-demand webinar, you\u2019ll learn how to uncover vulnerabilities that the average pen test misses. \n            <\/div>\n            <div class=\"inline-cta--button\">\n                <a\n                    class=\"button\"\n                    href=\"https:\/\/centricconsulting.com\/ub-nat-pen-testing-ondemand-wbnr\/\"\n                    target=\"_blank\"\n                    >\n\n                    WATCH WEBINAR\n                <\/a>\n            <\/div>\n        <\/div>\n","protected":false},"excerpt":{"rendered":"<p>In this blog, we discuss how control design is a key part of your risk management process, including taking a look at a real world example.<\/p>\n","protected":false},"author":456,"featured_media":48886,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23823,23785],"coauthors":[23762],"class_list":["post-48884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-controls","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2025-12-05 06:41:56","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/456"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=48884"}],"version-history":[{"count":9,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48884\/revisions"}],"predecessor-version":[{"id":54228,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/48884\/revisions\/54228"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/48886"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=48884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=48884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=48884"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=48884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}