The New Threat Intelligence Requirements in ISO 27001:2022

Jack Woods
|
Consultant at URM
|
PUBLISHED on
9 Feb
2024

ISO 27001, the World's leading Information Security Management Standard, was revised in October of 2022, and our blog Transitioning to ISO 27001:2022 provides practical guidance on meeting the new requirements.

The introduction of the threat intelligence control into the new Standard, we believe, requires careful consideration among organisations which have already achieved ISO 27001 certification, due to the required risk assessments in Clause 6.1, which implicitly require you to consider information security threats.  This means that the selection of Control 5.7 in your Statement of Applicability (SoA) is virtually unavoidable.  For most organisations, the inclusion of this control helps to formalise the collection and analysis of threat information, which is a key component of the risk assessment process detailed in Clause 6.1.

Changes to Risk Assessment

The requirements of this new control suggest that there needs to be a more proactive approach to risk management and threat analysis.  Risk assessments will now need to be updated in response to any threat intelligence that is received and, following an analysis of this intelligence, found to be impactful on information security.  Assessors will be looking for shortcomings in the effective collection and analysis of threat intelligence.

Collecting and Analysing Threat Intelligence

A key piece of information to take from this is that your organisation does not need to spend excessive amounts of money on threat intelligence services as there are multiple and varied sources of threat information available such as specialist threat intelligence forums, information security organisations (such as the National Cyber Security Centre, or NCSC), and information security news sites.  In addition to this, the majority of vendors are proactive in notifying users of security threat information that they become aware of.  The issues assessors have noted when auditing this control mainly relate to the organisation’s use of the information that they are given by threat intelligence sources.

Generally, organisations take threat intelligence very seriously and are now becoming more proactive in their approach due to the introduction of Control 5.7, but there are still numerous organisations that collect information on information security and think this alone means they’re doing enough to satisfy the requirements of the Standard.  This is not the case, as organisations are not only required to collect this information, but to analyse it also.

Collecting and Analysing Threat Intelligence

ISO 27002, which is largely seen as an ‘information security best practice guide’, divides threat intelligence into three distinctive layers:

  • Strategic threat intelligence: exchange of high-level information about the changing threat landscape (types of attackers, types of attacks, etc.)
  • Tactical threat intelligence: information about attacker methodologies, tools and technologies involved
  • Operational threat intelligence: details about specific attacks including technical indicators.

It is key to meeting the requirements of this Control that organisations are aware of and understand the different types of threat intelligence, as well as the need for sharing that information with the relevant stakeholders, both internally and externally.  By ensuring that you have a clear understanding of the types of threat intelligence, you can identify and implement appropriate mitigation measures where necessary.

Strategic threat intelligence relates more to long-term goals and behaviours your organisation wants to achieve and implement, whereas tactical threat intelligence is focused on the present impacts that threats can have and how they should be mitigated.  In addition to this, there is a similarity between operational and tactical threat intelligence in that they are both focused on the present dangers to the organisation, however, operational threat intelligence has a larger focus on specific attack vectors and technological alerts to reduce the risk of an attack.

For a comprehensive analysis of threat information, you should determine the relevance of identified threats to your organisation, and one way you could achieve this is by using a risk assessment to determine likelihood and impact.  You should also try to ensure the threat information is accurate by verifying the source.  In addition, you should consider the context in which a threat has been seen to impact other people, organisations, or systems it has infiltrated.  Finally, after your analysis of the threat information, your organisation should determine the need for action in response to the threat and ensure that any mitigation measures are swift and effective.

How Threat Intelligence Should Be Managed Within your Organisation

To ensure that your organisation is meeting the requirements of this control and is able to provide enough evidence of this to an assessor, it would be beneficial to establish threat intelligence related objectives and record the vetting of threat intelligence information sources as part of a management review/risk assessment discussion.  You should also consider analysing the effects that new threats, identified through threat intelligence, will have on risks facing the organisation, and keeping records of communication of threat intelligence information to relevant interested parties, both internally and externally.

Not only does obtaining and using threat intelligence allow you to detect and respond to cyber-attacks more quickly, but it can also allow you to identify attack vectors before the attacks occur, therefore reducing the overall risk of damage to your information assets. There is also a clear commercial benefit to the effective use and analysis of threat intelligence; by responding faster to incidents and reducing the likelihood of attack, your organisation will enhance its reputation, not only in your sector, but in sectors that may be looking to use your services.

Threat Intelligence Summary

In summary, the key takeaways from this blog on threat intelligence are that:

  • It is not enough to have a subscription to threat intelligence platforms, you need to do something with this information
  • An assessor will be looking for evidence that threat intelligence information has been considered and reviewed alongside existing risks
  • You don’t have to spend exorbitant amounts of money on threat intelligence services or platforms, there are plenty of free forums and subscriptions available
  • Establishing threat intelligence objectives ensures the organisation is clear on what it needs to achieve from threat intelligence, what types of intelligence it needs to gather, how it is going to analyse and then use this intelligence and, finally, how it is going to measure the effectiveness of this process
  • Organisations should make use of ISO 27002 as it is a best practice guide for the implementation of ISO 27001.

How URM can Help

If you or your organisation would like assistance in implementing not only threat intelligence controls, but also the entire ISO 27001:2022 framework requirements, URM’s large team of experienced ISO 27001 consultants can offer you reliable guidance and support.  With nearly 2 decades of ISO 27001 consultancy experience, URM is adept at supporting organisations at every stage of the Standard’s lifecycle, from conducting gap analyses and risk assessments, all the way through to implementation support and conducting the ISO 27001 internal audit. For organisations looking to transition their ISMS to the 2022 version of the Standard, we also offer an ISO/IEC 27001:2022 Transition training course, led by an experienced and practising ISO 27001 consultant.

Jack Woods
Consultant at URM
Jack is an experienced information security consultant who has been heavily involved in implementing both information security management systems (ISMS’)and integrated management systems (IMS). Jack has gained experience in all aspects of implementing ISO 27001:2022 working as an outsourced ISMS Manager
Read more

ISO 27002:2022 Update

If you want to learn more about ISO 27002:2022 and how to implement the new controls and the new attributes, you can attend URM’s ISO 27001:2022 Control Migration Course.
Thumbnail of the Blog Illustration
Information Security
Published on
22/7/2022
What are the Most Common Insider Threats to Information Security?

Broadly speaking, information security is held up by three pillars – People, Process and Technology. It is widely accepted that humans are the weakest link

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
27/7/2022
How do You Avoid Information Security Breaches?

With the news often including stories regarding high-profile information security breaches, many of us find ourselves asking how we can avoid it.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
21/6/2023
ISO 27001 vs SOC 2 - Part 1

URM delivered a question and answer session where it compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.

Read more
Without doubt, URM helped us to achieve our planned objectives a lot sooner than expected. The engagement was a huge success and couldn’t have gone any better.
Group IT Director, UK Mail
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.