ISO/IEC 27001 Control 5.7: Threat intelligence


Information relating to information security threats should be collected and analysed to produce threat intelligence.

Necessity of MidPoint

MidPoint's contribution to implementation of this control is marginal.

Implementation of the control is mostly outside the scope of identity governance and administration (IGA), therefore midPoint cannot provide significant advantage. However, midPoint can still provide minor supporting information and functionality.

Implementation Overview

MidPoint can provide additional information for operational threat intelligence, such as current or past access rights of users affected by a threat.

Was this page helpful?
Thanks for your feedback