ISO/IEC 27001 Control 5.7: Threat intelligence
Control
Information relating to information security threats should be collected and analysed to produce threat intelligence.
Necessity of MidPoint
MidPoint is not applicable for implementation of this control.
Implementation of the control is completely outside the scope of identity governance and administration (IGA).
Rationale
MidPoint can only provide negligible supporting information for threat intelligence.
Was this page helpful?
YES
NO
Thanks for your feedback