Compensating Controls: Security Through Prioritized Actions

by | Jul 17, 2024

Organizations often face technical and business constraints that make it difficult to implement standard security measures. Compensating controls offer a solution by providing alternative security measures that effectively mitigate risk to an acceptable level. At Veriti, we emphasize a modern approach to improving security posture through continuous automated assessment and optimization of security controls. Our two-pronged strategy leverages the same APIs used to fetch all configurations to apply actual remediation guidelines, encompassing compensating controls from the OS-level to the cloud.

Understanding Compensating Controls

Compensating controls are security measures implemented to meet the requirements of a security standard when the primary controls cannot be directly applied. These controls are designed to offer equivalent or greater levels of protection, addressing physical, administrative, or technical limitations. The purpose of compensating controls includes:

Common Scenarios for Using Compensating Controls

Legacy Systems

Upgrading or changing legacy systems to meet current security standards can be impractical or disruptive. Compensating controls offer a way to protect these systems without significant modifications.

Financial Constraints:

Budget limitations may prevent the implementation of the best security practices or technologies. Alternative measures can provide necessary security within budgetary limits.

Technical Limitations

In environments where desired security controls cannot be implemented without impairing system functionality, compensating controls provide a viable solution.

Live Threats

When persistent threats can’t wait for scheduled downtime to apply a patch, compensating controls provide a quick preventive solution.

Examples of Compensating Controls

Expired Licenses for Multiple Products  

 If licenses for critical security products like Anti-Virus, Anti-Bot, Intrusion Prevention System (IPS), and Threat Emulation expire, compensating controls can involve deploying enhanced monitoring and logging to detect any anomalies or threats that these tools would have typically blocked. 

Addressing Disabled Anti-Virus Protections  

When an Anti-Virus license expires, compensating controls might include increasing the frequency of system scans using other available security tools and implementing stricter access controls to limit the potential spread of malware. 

Mitigating the Lack of Anti-Bot Protections 

If the Anti-Bot license expires, organizations can deploy compensating controls such as using network segmentation to isolate critical systems and deploying application firewalls to filter out suspicious traffic. 

Substituting Expired Intrusion Prevention System (IPS) Protections 

When an IPS license expires, compensating controls might involve increasing the sensitivity of other detection tools and employing manual threat hunting to identify and mitigate potential intrusions. 

To maximize the effectiveness of compensating controls, organizations should adopt best practices centered around Automated Security Control Assessment (ASCA). Regular automated analysis using ASCA is essential to ensure that compensating controls are functioning as intended and remain compliant with relevant standards. This ongoing assessment process helps to identify any gaps or weaknesses in the controls, allowing for timely adjustments. Additionally, ASCA facilitates continuous improvement by enabling organizations to regularly reassess and enhance their compensating controls in response to new threats and changes in the environment.

Veriti’s Approach to Compensating Controls

Veriti’s modern approach to improving security posture involves continuous automated assessment and optimization of security controls. Our solution provides bidirectional integrations with network security, endpoint security, vulnerability assessment, and other security tools. This enables cross-control configuration, event, and telemetry analysis, helping identify protection gaps or sources of false positive alerts.

Veriti leverages the same APIs used to fetch all configurations to apply actual remediation guidelines. This involves implementing compensating controls from the OS-level (changing registries on endpoints) to the cloud (SSE and CNAPP/CWPP tools). This comprehensive approach ensures that organizations can:

Swiftly Remediate Vulnerabilities:

By automating the entire lifecycle, from exposure identification and prioritization to evaluation and secure remediation.

Enhance Security Posture:

By closing exposure gaps and triggering surgical compensating controls for immediate efficacy.

Maintain Operational Continuity:

By predicting the ripple effects of any remediation action, ensuring that business operations remain uninterrupted.

As organizations strive to enhance their security posture, they often face challenges such as too many security tools, misconfigured controls, and the complexities of taking remediation actions. Compensating controls provide a viable solution to these challenges, ensuring proactive security, managing risks, and maintaining operational continuity. By leveraging automation and advanced threat intelligence, Veriti helps organizations move from seeking impossible certainty to actually remediating, mitigating, and sharing intelligence. This ensures that each step forward counts, integrating all tools at their disposal and mobilizing remediation efforts across security teams and tools.

Product

Product Overview

Maximize security posture while ensuring business uptime

Automated Security Controls Assessment

Validate your security control

Integrations

Connect Veriti with your security solutions

Veriti is a triple winner at the Global InfoSec Awards 2025

 

Read More >>

Use Cases

Security Control Hardening

Reduce risk across the network, endpoint and operating system.​​
Assessing Risks Icon

Threat intelligence enforcement

Extend and enforce threat intelligence across all security controls​

Vulnerability Remediation

Safely remediate vulnerabilities in one click

Agentless OS-Level Remediation

Remediate directly at the OS-Level on the endpoint​

Solutions

Veriti Cloud

First cloud native remediation for your workloads​

Safe Remediation

Ensure remediation actions do not give rise to additional exposures

Odin

AI-Powered Contextual Cybersearch

MITRE ATT&CK®

Quickly respond to live threats with safe and precise remediation

Industries

Veriti for Financial Services

Increase business outcomes

Veriti for MSSPs

Efficiently manage multiple clients in a consolidated platform

Veriti for Healthcare

Neutralize security gaps without impacting healthcare operations

Veriti for Manufacturing

Protecting the heart of your production

Resources

See all resources

Blog

Veriti's security blog

Downloads

The latest guides, white papers and infographics

Videos

Watch the latest in exposure assessments

Events

Live event and on-demand webinars

Glossary

Our Comprehensive Definitions Guide

Veriti is the Sole Vendor Recognized in
Gartner 2025 Preemptive Exposure Management

 

Read the Report >>

Our Story

Learn about Veriti

Careers

Work with us

Newsroom

Our latest updates

Contact US

Get in touch

CHANNEL PARTNERS

Become a partner

MSSPs

Reduce operational costs