ISO 27001 Risk Treatment

Home / ISO 27001 / ISO 27001 Risk Treatment

hello I’m Stuart Barker the ISO 27001 Ninja and in this blog we’re going to do an overview of ISO 27001 Information Security Risk Treatment.

ISO 27001 Risk Treatment is covered in detail in the implementation guide: ISO 27001 Clause 6.1.3 Information Security Risk Treatment but here we take a look at a summary overview.

Watch

Introduction

So, the risk treatment forms part of the wider risk management, there are blogs and videos and guides on risk management where we take a deep dive and there are other detailed implementation guides related to the other ISO 27001 Clauses but here we’re going to look at information security risk treatment and then I’m going to give you some tips and some walkthroughs about how you can satisfy that. First of all we’re going to start off with a little look and see what the standard says then we’ll look at how we’re going to address it.

Definition

So, ISO 27001 6.1.3 information security risk Treatment – the organisation shall define and apply an information security risk treatment process to

– we’re going to select the appropriate information security risk treatment options,

– we’re going to determine all of the controls that are necessary to implement the information security risk treatment options chosen,

– we’re going to compare those controls to ISO 27001 annex A

– we’re going to produce a statement of applicability that contains the controls that mitigate our risks.

– We’re going to formulate our information security risk treatment plan and

– we’re going to obtain the approval, well, we’re going to identify risk owners and then we are going to obtain their approval for the risk treatment options that we’ve got.  

The standard also says that the organization shall retain documented information about the information security risk treatment process, so, you’re going to keep that history and you’re going to keep that documentation.

Let’s have a look through each one of those.

DO IT YOURSELF

ISO 27001

ISO 27001 Toolkit Business Edition

information security risk management procedure

So, the first thing we’re going to do is we are going to implement our risk management procedure.

ISO 27001 Risk Management Procedure Template

We’ve touched on it before so I don’t need to go into it in detail but there are various things that are covered within that and yes it’s an ISO 27001 Template on the hightable.io website, yes it’s part of the ISO 27001 Toolkit, as are all the documents. It looks at things like risk register, risk identification, risk assessment, and risk treatment, which is the thing that we’re interested in today.

ISO 27001 Risk Treatment Options

We’re going to identify what our risk treatment options are for us. Risk assessment generates a risk score – we covered that in ISO 27001 Risk Assessment and based on that score we have a risk treatment option. Our risk treatment options are going to be –

  • risk avoidance
  • risk reduction
  • risk acceptance
  • risk transfer

Risk avoidance

Risk avoidance is where the failure cost is too great and therefore, the risk is not taken and we don’t accept the risk.

Risk reduction

Risk reduction is where the gross risk is high thereby reducing the probability or impact of the risk through controls.

Risk acceptance

Risk acceptance is where the gross risk is accepted as it stands.

Risk Transfer

Risk transfer is that we transfer part of a risk to a third party, for example, via insurance or outsourcing.

ISO 27001-Risk-Classification-and-Mitigation-Table

Determining Controls

So, we’ve identified what our risk treatments options are, now we’re going to determine the controls that are necessary, now determining the control for B and C in the standard, I kind of flip these around a little bit.

The actual way that you go about it is you identify what the risks are to your information security management system, you identify what the risks are to your information security posture and then you choose the controls that help to mitigate those risks, okay, so it’s kind of like horse before the cart in terms of the standard.

The standard is saying – go away and choose some controls then compare it to the ISO 27001 Annex A. I find the easiest way of doing it is going through the Annex A and then picking the controls within Annex A that mitigate the risks that you’ve got.

Now the reality again, top tip, the reality is the majority of the controls are going to be controls that you’re going to implement so start with a statement of applicability, looking at the risks that you’ve identified choose the controls from the statement of applicability, then if there are additional controls that you think that you need then add them on.

I would therefore flip those two the other way around.

ISO 27001 Statement of Applicability

So we’ve gone through our risk, we’ve identified our risk, we know what our risk treatment options are, we’ve now picked our controls, what the standard then says is to create a statement of applicability. Again, there are videos on the statement of applicability but let’s take a little look at what that looks like.

When it comes to our statement of applicability the template that is on high table actually covers the 2013 and the 2022 version. Let’s look at the 2022 Version.

ISO 27001 2022 Statement of Applicability Laptop

So, the way that the statement of applicability is set out is we take the annex a controls and we list what those annex A controls are, we set the control objective, then we need to know why we need it – so here what you can see is we have the driver of why this is required, either it’s a business need, a risk need, a legal need or a contractual need. There is an argument to be said that within our statement of applicability, if it is a risk reason, that we can from a bureaucratic overhead point of view, map which particular risks this control satisfies. Whether you do that on the risk register, or whether you do that in the statement of applicability is up to you but I prefer to keep the statement of applicability as clean as possible and I keep it nice and simple. What we then state is whether or not this control is applicable or not. We record the date it was last assessed and if it isn’t applicable, which some of the controls won’t be, then we put why this is not applicable.

Risk Treatment Plan

So, we’ve identified and we’ve recorded our statement of applicability, we’ve looked at the necessary controls, we put that justification for inclusion, we’re putting in whether their necessary controls are implemented or not and we’re putting for the justification for exclusion, if it is the case that we are not going to implement a control and remember that the controls this is a risk-based system.  A lot of people will go through this and think it’s a checklist, it isn’t, we’re choosing our controls based on our risk and it is absolutely appropriate that some of these controls we’re not going to have. It is equally appropriate that some of these controls we’re just going to accept the risk, not actually necessarily going to mitigate the risk by implementing the control to the end degree.

Then what we do is we formulate our risk treatment plan. The way that we formulate our risk treatment plan is we populate, and we use our risk register, the risk register tool is a fundamental tool in our arsenal when it comes to the management of risk. I’m not going to go through in detail the risk register as there is another video on that that looks at all about how we do the risk, risk treatment, risk when it was first identified and residual risk but what I am going to show you is how we record that within the risk register. Be sure to check out the other video on the deep dive into the risk register but what we can see is we’ve got the risk scoring and we are going to formulate our risk treatment plan by identifying what that risk treatment is.

Risk Register

ISO 27001 Risk Register Example 2

We’re going to identify what our risk treatment plan is, we’re going to allocate a treatment owner, we’re going to set a treatment date, then we’re going to record whether or not it’s open or closed or not. Actually, once we’ve completed our treatment we’re then going to rescore our risk and this is called residual risk. So, what we do is we identify what the new control or controls are, we rescore it and that generates a new risk score – just as a point of note what should happen is that our risk when first identified and our residual risk, that risk posture should improve, we shouldn’t necessarily be doing a risk treatment that doesn’t mitigate, reduce, address, or treat that risk. We don’t want those risks increasing.

So, there’s a lot of information within there and a lot within the risk register. Once we’ve done that what we’re going to do then is we are going to identify who our risk owners are. Again, we can record that in the risk register and then we’re going to seek approval from them for that risk treatment plan.

Conclusion

So that is how we address our risk treatment and what we’re doing is we’re documenting all of that – so we have our risk register, we have our risk scoring, we have our archive you know, we have our previous version, so that we’ve got documented evidence of that. It may be the case that when you do your risk treatment planning, again depending on how mature you are, whether or not you follow some kind of project methodology, that you can supplement that and more detailed documentation around risk treatment plans but from the information security management perspective just recording it in the risk register is going to be sufficient

For today that was ISO 27001 Clause 6.1.3 information security risk treatment. As we continue our journey through, those the templates that you’ve seen today are available for download from the High Table ISO 27001 store, clearly, they’re part of the iso 27001 Toolkit, so be sure to check those out if it’s something that you would see some benefit in and gain from.

So, I am Stuart Barker. I am the ISO 27001 Ninja. That was ISO 27001 Clause 6.1.3 information security risk treatment and until the next blog, peas out

ISO 27001 QUICK LINKs

Organisational Controls - A5

ISO 27001 Annex A 5.1 Policies for information security

ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3 Segregation of duties

ISO 27001 Annex A 5.4 Management responsibilities

ISO 27001 Annex A 5.5 Contact with authorities

ISO 27001 Annex A 5.6 Contact with special interest groups

ISO 27001 Annex A 5.7 Threat intelligence – new

ISO 27001 Annex A 5.8 Information security in project management

ISO 27001 Annex A 5.9 Inventory of information and other associated assets – change

ISO 27001 Annex A 5.10 Acceptable use of information and other associated assets – change

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.13 Labelling of information

ISO 27001 Annex A 5.14 Information transfer

ISO 27001 Annex A 5.15 Access control

ISO 27001 Annex A 5.16 Identity management

ISO 27001 Annex A 5.17 Authentication information – new

ISO 27001 Annex A 5.18 Access rights – change

ISO 27001 Annex A 5.19 Information security in supplier relationships

ISO 27001 Annex A 5.20 Addressing information security within supplier agreements

ISO 27001 Annex A 5.21 Managing information security in the ICT supply chain – new

ISO 27001 Annex A 5.22 Monitoring, review and change management of supplier services – change

ISO 27001 Annex A 5.23 Information security for use of cloud services – new

ISO 27001 Annex A 5.24 Information security incident management planning and preparation – change

ISO 27001 Annex A 5.25 Assessment and decision on information security events 

ISO 27001 Annex A 5.26 Response to information security incidents

ISO 27001 Annex A 5.27 Learning from information security incidents

ISO 27001 Annex A 5.28 Collection of evidence

ISO 27001 Annex A 5.29 Information security during disruption – change

ISO 27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32 Intellectual property rights

ISO 27001 Annex A 5.33 Protection of records

ISO 27001 Annex A 5.34 Privacy and protection of PII

ISO 27001 Annex A 5.35 Independent review of information security

ISO 27001 Annex A 5.36 Compliance with policies and standards for information security

ISO 27001 Annex A 5.37 Documented operating procedures 

Technology Controls - A8

ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.4 Access To Source Code

ISO 27001 Annex A 8.5 Secure Authentication

ISO 27001 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9 Configuration Management 

ISO 27001 Annex A 8.10 Information Deletion

ISO 27001 Annex A 8.11 Data Masking

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.17 Clock Synchronisation

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001 Annex A 8.20 Network Security

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.23 Web Filtering

ISO 27001 Annex A 8.24 Use of CryptographyISO27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28 Secure Coding

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30 Outsourced Development

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 8.33 Test Information

ISO 27001 Annex A 8.34 Protection of information systems during audit testing