What is ISO 27001 Annex A 5.7 in ISO 27001?
Annex A 5.7 requires a documented process for threat intelligence. You must collect and analyse information regarding security threats. Integrate this process into business-as-usual tools like SharePoint or Jira. This ensures the organisation gains specific knowledge of risks. It moves beyond generic alerts to actionable business insights.
Auditor’s Eye: The Shortcut Trap
Many organisations rely on automated SaaS feeds for threat data. These platforms offer a false sense of security. Auditors often find that staff do not understand the automated alerts. We prefer seeing analysis within the organisation’s native document repositories. Using SharePoint or Jira proves management ownership. It shows your team actually evaluated the threat. A green tick in a black box tool lacks procedural evidence.
| Control Feature | ISO 27001:2013 | ISO 27001:2022 |
|---|---|---|
| Control ID | Not Specifically Listed | Annex A 5.7 |
| Primary Requirement | Ad-hoc threat monitoring | Formal intelligence process |
| Documentation | Implied in risk clauses | Mandatory process evidence |
How to Implement ISO 27001 Annex A 5.7 (Step-by-Step)
Establish a repeatable process to gather and use threat information. You must use existing tools to record your analysis and mitigation. This approach creates a cultural habit of proactive security. Documented evidence must exist in your internal repositories. Follow these steps for an integrated implementation.
Step 1: Identify Intelligence Sources
- Select internal and external information sources in Confluence.
- Document national and sector-specific feeds.
Step 2: Establish Collection and Analysis
- Record data collection methods in SharePoint libraries.
- Analyse raw data for business relevance.
Step 3: Disseminate and Act
- Use Jira tickets to assign threat mitigation tasks.
- Update the risk register based on intelligence findings.
ISO 27001 Annex A 5.7 Threat Intelligence Audit Evidence Checklist
Auditors require manual records that prove human oversight and intent. They look for evidence that your team processed the data. Prepare these items:
- A documented threat intelligence procedure in Confluence.
- Analysis reports with version history in SharePoint.
- Meeting minutes showing discussion of current threats.
- Jira logs showing the lifecycle of threat-related tasks.
- Records showing intelligence influenced your latest risk assessment.
Relational Mapping
Annex A 5.7 provides vital inputs for Clause 6.1.2. It informs the risk assessment process with real-world data. This control also supports Annex A 5.24 Incident Management. Furthermore, it strengthens Annex A 8.8 Management of technical vulnerabilities. Use internal links in SharePoint to connect these related activities.
Auditor Interview: Direct Process Management
Question: How does the organisation use threat intelligence?
Answer: We analyse sector feeds and log actions in Jira.
Question: Who is responsible for reviewing external threat data?
Answer: Our security lead reviews reports stored in SharePoint weekly.
Question: Does a SaaS platform manage your intelligence analysis?
Answer: No. We perform analysis internally to ensure business context.
Common Non-Conformities
| Failure Mode | Cause | Auditor Finding |
|---|---|---|
| Automated Complacency | Relying on a SaaS platform’s generic feed. | Major NC: No evidence of internal analysis. |
| Lack of Action | Collecting data but never mitigating threats. | Minor NC: Process fails to inform risk management. |
| Siloed Intelligence | Intelligence not shared with relevant owners. | Minor NC: Failure to disseminate threat information. |
Frequently Asked Questions
What is the bottom line for Annex A 5.7?
The bottom line is you must have a plan. You must collect threat data and analyse it. Use internal tools to prove your team is active. This shows management ownership of the threat landscape. Avoid black-box software for your primary evidence.
How can SharePoint support threat intelligence?
SharePoint stores your analysis reports with full version control. It provides a central repository for intelligence procedures. Auditors check these logs to verify human involvement. This integrates security into your daily organisational tools. It ensures data remains under your control.
Why is human analysis needed for threat feeds?
Automated feeds contain thousands of alerts. Most are not relevant to your business. Human analysis filters these for actual risk. Documenting this in Confluence proves your team understands your posture. It demonstrates a mature and active management system.
