ISO 27001 Glossary

What is a Threat in ISO 27001?

Overview

A Threat is any potential cause of an unwanted incident that may result in harm to your information systems or organization. In ISO 27001:2022, identifying threats is a fundamental part of risk assessment (Clause 6.1.2) and determines which security controls you need to implement.

Understanding threats helps you assess the likelihood and impact of risks to your information assets.

Threats in Practice

During risk assessment, you identify threats that could exploit vulnerabilities in your assets and cause security incidents. Threats can be:

  • Intentional: Deliberate actions by threat actors (hackers, malicious insiders, competitors)

  • Accidental: Unintentional actions causing harm (employee errors, misconfigurations)

  • Environmental: Natural events or physical conditions (fires, floods, power outages)

Threats exploit vulnerabilities to create risks. A vulnerability without a credible threat may pose minimal risk, while a threat without a vulnerability to exploit cannot cause harm.

Categories of Threats

Cyber Threats

Threats targeting digital systems and data:

  • Malware: Viruses, ransomware, trojans, spyware

  • Phishing: Social engineering to steal credentials or sensitive information

  • Distributed Denial of Service (DDoS): Overwhelming systems to disrupt availability

  • Advanced Persistent Threats (APTs): Sophisticated, targeted attacks

  • SQL injection and web attacks: Exploiting application vulnerabilities

  • Zero-day exploits: Attacks using previously unknown vulnerabilities

Example: A ransomware threat could exploit an unpatched server vulnerability (A.8.8) to encrypt business-critical data, causing financial loss and operational disruption.

Human Threats

Threats involving people:

  • Malicious insiders: Employees or contractors intentionally stealing data or sabotaging systems

  • Social engineering: Manipulating users to bypass security controls

  • Privilege abuse: Authorized users exceeding their access rights

  • Unintentional errors: Accidental data deletion, misconfiguration, or sending sensitive information to wrong recipients

Example: An employee clicking a phishing email could provide credentials that allow unauthorized access to customer data (countered by security awareness training A.6.3 and MFA A.5.17).

Physical Threats

Threats to physical assets and facilities:

  • Theft: Stealing laptops, servers, backup media

  • Unauthorized access: Intruders entering secure areas

  • Vandalism: Intentional damage to equipment

  • Natural disasters: Earthquakes, floods, fires

  • Infrastructure failures: Power outages, HVAC failures, water damage

Example: Fire in a data center threatens server availability (addressed by physical security controls A.7.1-A.7.14 and backup procedures A.8.13).

Third-Party Threats

Threats from suppliers, partners, and service providers:

  • Supply chain attacks: Compromised software or hardware from vendors

  • Cloud service failures: Provider outages or security breaches

  • Contractor negligence: Third parties failing to maintain security controls

Example: A cloud provider breach exposing customer data (mitigated by supplier security assessments A.5.19-A.5.23 and contractual security requirements).

Threats are constantly evolving. Your risk assessment should be reviewed regularly (at planned intervals and when significant changes occur) to identify new threats like emerging malware variants or geopolitical risks.

Threat Assessment in Risk Assessment

When conducting risk assessment (Clause 6.1.2), you evaluate threats by considering:

  • Threat source: Who or what could cause the threat (cybercriminals, competitors, natural events)

  • Motivation: Why they would target your organization (financial gain, espionage, disruption)

  • Capability: Their skill level and resources

  • Likelihood: Probability the threat will materialize and exploit a vulnerability

Example threat scenario:

  • Asset: Customer payment database

  • Vulnerability: Weak password policy (no MFA)

  • Threat: External hacker seeking financial gain

  • Risk: Unauthorized access to payment data, resulting in data breach and regulatory fines

  • Treatment: Implement MFA (A.5.17), strong password policy (A.5.17), and encryption (A.8.24)

Threat Intelligence

ISO 27001:2022 Annex A includes A.5.7 (Threat Intelligence) as a new control requiring organizations to collect and analyze threat intelligence to understand relevant threats.

Sources of threat intelligence:

  • National cybersecurity agencies (CISA, NCSC, CERT)

  • Industry information sharing groups (ISACs)

  • Commercial threat feeds and security vendors

  • Dark web monitoring services

  • Incident reports from peer organizations

Use ISMS Copilot to identify relevant threats for your industry and assets, generate threat scenarios for risk assessments, or map threats to appropriate Annex A controls.

Threat vs. Vulnerability vs. Risk

These terms are related but distinct:

  • Threat: The potential cause of an incident (e.g., ransomware attack)

  • Vulnerability: A weakness that can be exploited (e.g., unpatched software)

  • Risk: The combination of threat, vulnerability, likelihood, and impact (e.g., high risk of ransomware encrypting unpatched servers, causing business disruption)

Controls address risks by:

  • Reducing vulnerabilities (e.g., patch management A.8.8)

  • Detecting or blocking threats (e.g., malware protection A.8.7)

  • Limiting impact if a threat succeeds (e.g., backups A.8.13)

Common Threats by Industry

Financial Services

Advanced persistent threats, phishing targeting customer credentials, DDoS attacks, insider trading, regulatory scrutiny.

Healthcare

Ransomware targeting patient systems, theft of medical records, insider access abuse, medical device vulnerabilities.

Retail/E-commerce

Payment card data theft, credential stuffing, supply chain attacks, DDoS during peak sales, fraudulent transactions.

SaaS/Technology

API abuse, account takeovers, data breaches, insider threats, cloud misconfigurations, zero-day exploits.

Document identified threats in your risk assessment register, linking each threat to assets, vulnerabilities, and selected controls. Update the register when new threats emerge.

Was this helpful?