One of my favorite security analogies is that enterprise information security is like an onion. Each layer of the onion represents a different control that secures the data at the center. Common layers are endpoint protection, mobile device management, MFA, firewalls, encryption, security policies, and staff training. All of these (and more) are certainly critical controls that you should have in your environment. There is one set of controls that rarely gets mentioned in this context, though, and that is compliance. (Shocking, since it is everyone's favorite topic, right?....)