ISO/IEC 27001 Control 5.7: Threat intelligence
Control
Information relating to information security threats should be collected and analysed to produce threat intelligence.
Necessity of MidPoint
MidPoint's contribution to implementation of this control is marginal.
Implementation of the control is mostly outside the scope of identity governance and administration (IGA), therefore midPoint cannot provide significant advantage. However, midPoint can still provide minor supporting information and functionality.
Implementation Overview
MidPoint can provide additional information for operational threat intelligence, such as current or past access rights of users affected by a threat.
Related Features
Was this page helpful?
YES
NO
Thanks for your feedback