Effective control design is driven by operations, not by compliance interpretation. Rather than starting with Annex A or the Trust Services Criteria, better outcomes are achieved by answering practical questions such as how access requests are approved, reviewed, and revoked in practice.
Similarly, clarity is needed on how changes move from request to production, how security incidents are detected, escalated, and resolved, and how vendors are evaluated before onboarding and monitored afterwards.
Controls that mirror real workflows are easier to execute, easier to evidence, and easier to maintain. They also map more naturally to multiple frameworks. In contrast, controls written solely for certification purposes tend to be abstract and difficult to sustain outside of audit cycles.