USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Selecting Risk Treatment Options and Controls

Lesson 39/54 | Study Time: 25 Min

Once risks are identified and assessed through a risk assessment process aligned with ISO/IEC 27005, the next vital step is selecting appropriate risk treatment options and security controls to manage those risks effectively.

This is a critical phase in the Information Security Management System (ISMS) implementation, enabling organizations to reduce risk exposure to acceptable levels while balancing cost and operational impact.

Risk Treatment Options

ISO/IEC 27005 outlines four fundamental risk treatment strategies, which can also be combined as needed:


1. Risk Mitigation (Modification): Applying controls to reduce the likelihood or impact of a risk. This could include technical measures (like firewalls or encryption), procedural changes (such as incident response plans), or physical controls (secure access to facilities).


2. Risk Avoidance: Eliminating the activity or condition that creates the risk. For instance, an organization might choose to discontinue processing certain sensitive data that generates high security risks or relocate systems to safer environments.


3. Risk Transfer (Sharing): Shifting responsibility and consequences of a risk to a third party. Common methods include outsourcing certain processes, contracting with specialized security providers, or purchasing insurance coverage against cyber risks.


4. Risk Acceptance (Retention): Recognizing and consciously accepting risks that fall within the organization's risk appetite. This occurs when the cost of mitigation exceeds the expected benefits or when risks have low impact and likelihood.


Risk owners are responsible for deciding which approach to take, considering the organization's objectives, available resources, and risk tolerance.

Selecting Controls

Controls are specific safeguards or countermeasures implemented to treat risks—often derived from ISO/IEC 27001 Annex A, which lists 114 controls covering areas such as access control, cryptography, physical security, and supplier relationships.


Key considerations when selecting controls include:


1. Effectiveness: Will the control meaningfully reduce the identified risk?

2. Cost: Is the investment justifiable relative to risk severity and budget constraints?

3. Feasibility: Can the control be implemented given technical, operational, or cultural constraints?

4. Impact: What effect will the control have on business processes and user experience?


Organizations often perform cost-benefit analyses and prioritize controls that offer significant risk reduction with reasonable cost and minimal disruption.

Developing a Risk Treatment Plan

After selecting treatment options and controls, organizations document these in a risk treatment plan that specifies:


1. The risks being addressed

2. Chosen treatment strategy for each risk

3. Assigned responsibilities and risk owners

4. Implementation timelines and milestones

5. Resource allocation

6. Metrics to measure effectiveness


This plan should be reviewed regularly and updated as the risk landscape or business needs change.

Residual Risk and Acceptance

Implementing controls rarely eliminates risk completely. The remaining risk, called residual risk must be evaluated.

Top management or designated risk owners formally accept residual risks, acknowledging they fall within acceptable limits considering costs and benefits.

Practical Considerations

1. Sometimes, multiple treatment options are combined to optimize security and cost-effectiveness.

2. Controls used should be documented in the Statement of Applicability (SoA) for ISO/IEC 27001 compliance.

3. Constraints such as budget limits, technical capabilities, and organizational culture must be factored into treatment decisions.

Samuel Wilson

Samuel Wilson

Product Designer
Profile

Class Sessions

1- What is an Information Security Management System? 2- Key Concepts and Objectives of ISO/IEC 27001 3- Benefits of ISMS Implementation for Organizations 4- Defining the Organization’s Context for ISMS 5- Identifying Interested Parties and Their Requirements 6- Scoping the ISMS Boundaries and Applicability 7- Roles and Responsibilities in ISMS Implementation 8- Establishing Information Security Policies 9- Engaging Top Management and Building Organizational Buy-In 10- Identifying and Classifying Information Assets 11- Performing Risk Assessments Using ISO/IEC 27005 Principles 12- Selecting Risk Treatment Options and Controls 13- Creating and Managing ISMS Documentation 14- Implementing Technical, Procedural, and Physical Controls 15- Mapping Controls to Annex A of ISO/IEC 27001 16- Operating the ISMS in Day-to-Day Activities 17- Managing Communication and Training to Increase Security Awareness 18- Handling Incidents and Corrective Actions 19- Monitoring and Measuring ISMS Effectiveness 20- Conducting Internal Audits and Management Reviews 21- Identifying Improvement Opportunities 22- Applying the Plan-Do-Check-Act (PDCA) Cycle for Continuous Enhancement 23- Preparing for External Certification Audits 24- Addressing Nonconformities and Audit Findings 25- Real-World Case Studies and Scenario Discussions 26- Gap Analysis Workshops 27- Self-Assessment Exercises to Consolidate Learning 28- What is an Information Security Management System? 29- Key Concepts and Objectives of ISO/IEC 27001 30- Benefits of ISMS Implementation for Organizations 31- Defining the Organization’s Context for ISMS 32- Identifying Interested Parties and Their Requirements 33- Scoping the ISMS Boundaries and Applicability 34- Roles and Responsibilities in ISMS Implementation 35- Establishing Information Security Policies 36- Engaging Top Management and Building Organizational Buy-In 37- Identifying and Classifying Information Assets 38- Performing Risk Assessments Using ISO/IEC 27005 Principles 39- Selecting Risk Treatment Options and Controls 40- Creating and Managing ISMS Documentation 41- Implementing Technical, Procedural, and Physical Controls 42- Mapping Controls to Annex A of ISO/IEC 27001 43- Operating the ISMS in Day-to-Day Activities 44- Managing Communication and Training to Increase Security Awareness 45- Handling Incidents and Corrective Actions 46- Monitoring and Measuring ISMS Effectiveness 47- Conducting Internal Audits and Management Reviews 48- Identifying Improvement Opportunities 49- Applying the Plan-Do-Check-Act (PDCA) Cycle for Continuous Enhancement 50- Preparing for External Certification Audits 51- Addressing Nonconformities and Audit Findings 52- Real-World Case Studies and Scenario Discussions 53- Gap Analysis Workshops 54- Self-Assessment Exercises to Consolidate Learning