ISO 27001 Glossary

What is a Vulnerability in ISO 27001?

Overview

A Vulnerability is a weakness in an asset or control that can be exploited by a threat to cause harm. In ISO 27001:2022, identifying vulnerabilities is essential during risk assessment (Clause 6.1.2) because they represent the entry points through which threats can impact your information security.

Vulnerabilities exist in technology, processes, people, and physical infrastructure—addressing them reduces your organization's exposure to risk.

Vulnerabilities in Practice

During risk assessment, you identify vulnerabilities associated with your information assets. A vulnerability alone doesn't create risk—it must be paired with a credible threat that could exploit it.

Risk equation: Risk = Threat × Vulnerability × Asset Value × Impact

Controls from Annex A are designed to reduce or eliminate vulnerabilities, making it harder for threats to succeed.

Vulnerabilities change over time as systems age, new software is deployed, configurations drift, and employees change. Regular vulnerability assessments (at least annually or when significant changes occur) are essential.

Categories of Vulnerabilities

Technical Vulnerabilities

Weaknesses in technology systems and software:

  • Unpatched software: Known security flaws in operating systems, applications, or firmware

  • Misconfigurations: Insecure settings (default passwords, open ports, excessive permissions)

  • Weak encryption: Outdated cryptographic algorithms or poor key management

  • Lack of input validation: Code vulnerable to SQL injection, cross-site scripting

  • Missing security controls: No firewall, antivirus, or intrusion detection

Example: An e-commerce server running outdated software with a known remote code execution vulnerability. Threat: External hacker. Control: Patch management (A.8.8).

Human Vulnerabilities

Weaknesses related to people and behavior:

  • Lack of security awareness: Employees unaware of phishing, social engineering, or security policies

  • Insufficient training: Staff don't know how to handle sensitive data securely

  • Poor password practices: Weak, reused, or shared passwords

  • Excessive privileges: Users with more access than needed for their role

  • No segregation of duties: Single person controls critical processes

Example: Employees lacking security awareness training are vulnerable to phishing attacks. Threat: Social engineering. Control: Security awareness training (A.6.3).

Process Vulnerabilities

Weaknesses in organizational procedures and workflows:

  • No change management: System changes made without review or testing

  • Inadequate access reviews: Former employees still have active accounts

  • Poor incident response: No plan to detect and respond to security events

  • Weak vendor management: Third parties not assessed for security risks

  • Missing backup procedures: No reliable recovery from data loss

Example: No process for deactivating accounts when employees leave creates a vulnerability for unauthorized access. Threat: Disgruntled ex-employee. Control: Identity lifecycle management (A.5.18).

Physical Vulnerabilities

Weaknesses in physical security:

  • Unsecured facilities: No access controls to server rooms or offices

  • Inadequate environmental controls: No fire suppression, temperature monitoring

  • Unprotected equipment: Servers, laptops, or backup media left unsecured

  • Poor visitor management: Unrestricted access for vendors or guests

Example: Server room accessible to all employees is vulnerable to theft or sabotage. Threat: Malicious insider. Control: Physical access controls (A.7.2).

A single vulnerability can enable multiple threats. For example, missing multi-factor authentication (MFA) makes systems vulnerable to credential theft, phishing, password guessing, and insider abuse.

Vulnerability Assessment Methods

ISO 27001:2022 requires identifying vulnerabilities as part of risk assessment (Clause 6.1.2). Common assessment methods include:

Automated Vulnerability Scanning

Use tools to scan systems for known vulnerabilities (CVEs), misconfigurations, and missing patches.

Tools: Nessus, Qualys, OpenVAS, cloud provider scanners (AWS Inspector, Azure Security Center).

Penetration Testing

Simulated attacks by security professionals to identify exploitable vulnerabilities before real attackers do.

Code Reviews

Manual or automated analysis of application source code to find security flaws.

Configuration Audits

Review of system settings against security baselines (CIS Benchmarks, vendor hardening guides).

Gap Analysis

Compare current controls against Annex A requirements to identify missing or weak controls.

Annex A includes A.8.8 (Management of technical vulnerabilities) requiring you to obtain information about technical vulnerabilities, evaluate exposure, and take action to address them.

Vulnerability Lifecycle

Managing vulnerabilities follows a continuous cycle:

  1. Identification: Discover vulnerabilities through scanning, audits, threat intelligence

  2. Assessment: Evaluate severity based on exploitability and potential impact

  3. Prioritization: Rank vulnerabilities by risk (consider CVSS scores, threat context, asset criticality)

  4. Remediation: Apply patches, reconfigure systems, implement compensating controls

  5. Verification: Confirm vulnerabilities are resolved

  6. Monitoring: Continuously watch for new vulnerabilities

Vulnerability vs. Threat vs. Risk

These concepts work together in risk assessment:

  • Vulnerability: Weakness that can be exploited (e.g., unpatched web server)

  • Threat: Potential cause of harm that exploits the weakness (e.g., automated bot scanning for vulnerable servers)

  • Risk: Likelihood and impact of the threat exploiting the vulnerability (e.g., high risk of data breach from SQL injection attack)

Control selection: Implement vulnerability management (A.8.8), secure configuration (A.8.9), and web application security controls to reduce risk.

Common Vulnerability Examples

Technology Company

  • Vulnerability: API endpoints lack rate limiting

  • Threat: Credential stuffing attack

  • Risk: Account takeover and data breach

  • Control: Implement rate limiting and monitoring (A.8.16)

Healthcare Organization

  • Vulnerability: Medical devices on network with default passwords

  • Threat: Ransomware spreading through network

  • Risk: Patient care disruption and data encryption

  • Control: Network segmentation (A.8.22), password policy (A.5.17)

Financial Services

  • Vulnerability: Employees lack phishing awareness

  • Threat: Targeted spear-phishing campaign

  • Risk: Wire fraud or credential theft

  • Control: Security awareness training (A.6.3), email filtering (A.8.7)

Use ISMS Copilot to identify common vulnerabilities for your asset types, map vulnerabilities to appropriate Annex A controls, or generate remediation plans based on vulnerability scan results.

Documentation Requirements

Your risk assessment documentation should include:

  • Identified vulnerabilities for each asset

  • Assessment of severity and exploitability

  • Which threats could exploit each vulnerability

  • Selected controls to address vulnerabilities

  • Timelines for remediation

  • Residual vulnerabilities accepted with justification

  • Threat – What exploits vulnerabilities

  • Risk Assessment – Process for identifying vulnerabilities

  • Asset – What contains vulnerabilities

  • Control – Measures that reduce vulnerabilities

Was this helpful?