Expert Advice Community

Guest

Mapping the threats against relevant Annex A controls

  Quote
Guest
Guest user Created:   Sep 21, 2018 Last commented:   Sep 21, 2018

Mapping the threats against relevant Annex A controls

I am using the standard threats and vulnerabilities from ISO 27005 to risk assess my organisation. Do you know of a document that directly maps each threat example against relevant Annex A controls?
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Sep 21, 2018

Answer:

There is no definitive document we can recommend, since for each organization the applicable controls may vary according to the organization's risk tolerance and results of risk assessment (for the same threat one or more controls may be applicable).

These materials will also help you regarding risk treatment:
- Diagram of ISO 27001:2013 Risk Assessment and Treatment process https://info.advisera.com/27001academy/free-download/diagram-of-iso-270012013-risk-assessment-and-treatment-process
- The basics of risk assessment and treatment according to ISO 27001 [free webinar on demand] https://advisera.com/27001academy/webinar/basics-risk-assessment-treatment-according-iso-27001-free-webinar-demand/
- Book ISO 27001 Risk Management in Plain English https://advisera.com/books/iso-27001-annex-controls-plain-english/

Quote
0 0
Guest
brianhopla Sep 21, 2018

Thanks; while I appreciate that the use of controls will vary depending on the organisation, I was thinking of a generic document that shows which controls work against the different threats in the threat/vulnerability catalogue.

Quote
0 0
Expert
Rhand Leal Sep 22, 2018

Unfortunately such generic document is not available. Organizations concerned with information security avoid to publish such documents because they may mislead organizations while implementing their own practices, because they may understand that these are the solution for their risk, without considering their own organizational context.

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Sep 21, 2018

Sep 22, 2018