Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is an ISO 27001 risk treatment plan?

An ISO 27001 risk treatment plan should be developed following a company’s completion of its risk assessment, documenting its actions to address each risk identified during the assessment process. When determining how to respond to an identified risk, companies typically select from options: acceptance, mitigation, transfer, and avoidance. 

A risk treatment plan will frequently contain the following elements: 

  • Summary of each of the identified risks
  • Responses designed for each risk 
  • Assigned owner to each identified risk, who is accountable for their respective risks
  • Designated risk mitigation activity owners, responsible for performing the tasks required to address the identified risks
  • Target completion date for risk treatment activities 

A company will subsequently determine which controls to implement to help address identified risks. Annex A of ISO 27001 provides an ideal starting point; it contains 114 controls, divided into 14 sections, each tailored to a specific aspect of information security. When selecting controls from Annex A, a company will want to begin filling out the Statement of Applicability (SoA), a list of all of the Annex A controls, including the justification for each control's inclusion or exclusion as part of the organization’s Information Security Management System (ISMS) implementation.

{{cta_withimage2="/cta-modules"}}

Additional resources you might like:

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Additional resources you might like:

Comparisons and reviews
Blog
The best TPRM software for 2026

Discover the best third-party risk management software solutions for 2026.

Comparisons and reviews
Blog
Top 5 OneTrust alternatives

Check out top OneTrust alternatives for compliance and risk management.

Comparisons and reviews
Blog
Top 4 Secureframe alternatives

Explore features, limitations, and scalable compliance solutions.

Vendor Risk Management
Blog
GDPR, NIS 2, and DORA converge on one problem: Third-party risk

Discover how EU regulations, GDPR, NIS 2, and DORA, make third-party risk a direct, continuous business liability. Find out why most teams still lack visibility.

Product updates
Events
Vanta Delivers: Live from New York

Join us to see new product capabilities and live demos, and learn how Vanta is delivering a unified risk experience for GRC teams.

Vendor Risk Management
Blog
When tokenmaxxing leads to riskmaxxing

AI mandates are creating a security nightmare: a rise in Shadow AI, where unmanaged, unapproved AI tools operate inside company environments without oversight.

Vendor Risk Management
Events
AI broke your Third Party Risk Management program. Now what?

In this webinar, we'll show you exactly where traditional TPRM breaks down in an AI-first world, and how one team rebuilt their program to actually keep up.

Comparisons and reviews
Blog
Best TPRM Software in 2026: The shift to continuous monitoring

Compare leading tools for continuous monitoring, risk scoring, and vendor assessment automation.

GRC
Blog
5 best GRC software solutions for enterprise teams in 2026

Enterprise risk is rising fast, but most teams still juggle disconnected tools that slow deals and create blind spots.