One example of a technical control is data encryption. Other examples are network intrusion detection systems, passwords, firewalls and access control lists.
Technical controls secure computing system and information access through strategically designed software and hardware. This technology-enforced system protection reduces the possibility of errors and violations to security policies.
A basic premise of applying technical controls efficiently is that a single person, program or system process is not given more access than necessary to complete assigned duties. This is called the principle of least privilege. Technical controls are often used in conjunction with administrative and physical controls to maximize the security of a network.