ISO/IEC 27001 Control 5.7: Threat intelligence

Control

Information relating to information security threats should be collected and analysed to produce threat intelligence.

Necessity of MidPoint

MidPoint is not applicable for implementation of this control.

Implementation of the control is completely outside the scope of identity governance and administration (IGA).

Rationale

MidPoint can only provide negligible supporting information for threat intelligence.

Was this page helpful?
YES NO
Thanks for your feedback