More Practical Insights on the Critical Security Controls