ELI5: What are Mitigation Techniques?

When your house has problems — maybe the lock is broken or a window won’t close — you fix them so burglars can’t get in. Mitigation techniques are all the different ways we fix and protect computers from bad guys. Some fixes are like installing a better lock (patching software). Others are like adding a security camera (monitoring). Some are like teaching your family not to open the door for strangers (security training). The more layers of protection you add, the harder it is for anyone to break in.

Overview

Mitigation techniques are the security controls and strategies applied to reduce or eliminate the impact of identified threats and vulnerabilities. Effective mitigation follows a defense-in-depth approach, layering multiple controls so that the failure of one does not result in compromise. The Security+ exam tests knowledge of specific mitigations and the ability to select appropriate controls for given scenarios.

Key Concepts

  • Patching: Applying vendor-supplied fixes to close known vulnerabilities — the most fundamental mitigation
  • Network segmentation: Dividing the network into isolated zones to limit lateral movement and blast radius
  • Least privilege: Granting only the minimum access necessary to perform a job function
  • Input validation: Sanitizing and validating all user input to prevent injection and other application attacks
  • Encryption: Protecting data at rest and in transit to ensure confidentiality even if intercepted
  • Access control lists (ACLs): Defining explicit allow/deny rules for network traffic and resource access
  • Security baselines and hardening: Configuring systems according to CIS Benchmarks or STIGs before deployment
  • Application allowlisting: Only permitting approved software to execute — stronger than blocklisting
  • Configuration management: Maintaining consistent, secure configurations and detecting drift
  • Decommissioning: Properly retiring end-of-life systems that can no longer be patched
  • Compensating controls: Alternative measures when the primary control cannot be implemented (e.g., enhanced monitoring when patching is not feasible)
  • Security awareness training: Educating users to recognize and respond to social engineering and phishing

Exam Tips

Remember

Mitigation order of preference: Eliminate the vulnerability (patch/remove) > Reduce the impact (segment/encrypt) > Transfer the risk (insurance/contract) > Accept the risk (documented decision). Compensating controls are NOT equal to primary controls.

  • Network segmentation is a key mitigation for limiting ransomware spread
  • Compensating controls require documentation and approval — they are temporary measures
  • Defense in depth = multiple layers — no single control is sufficient

Connections

Practice Questions

Scenario

See case-mitigation-techniques for a practical DevOps scenario applying these concepts.