Your security and compliance glossary

All the terms you need to know when you’re trying to get compliance audit ready, fast.

Show filters

What is an ISO 27001 risk treatment plan?

An ISO 27001 risk treatment plan should be developed following a company’s completion of its risk assessment, documenting its actions to address each risk identified during the assessment process. When determining how to respond to an identified risk, companies typically select from options: acceptance, mitigation, transfer, and avoidance. 

A risk treatment plan will frequently contain the following elements: 

  • Summary of each of the identified risks
  • Responses designed for each risk 
  • Assigned owner to each identified risk, who is accountable for their respective risks
  • Designated risk mitigation activity owners, responsible for performing the tasks required to address the identified risks
  • Target completion date for risk treatment activities 

A company will subsequently determine which controls to implement to help address identified risks. Annex A of ISO 27001 provides an ideal starting point; it contains 114 controls, divided into 14 sections, each tailored to a specific aspect of information security. When selecting controls from Annex A, a company will want to begin filling out the Statement of Applicability (SoA), a list of all of the Annex A controls, including the justification for each control's inclusion or exclusion as part of the organization’s Information Security Management System (ISMS) implementation.

{{cta_withimage2="/cta-modules"}}

Additional resources you might like:

Compliance
Blog
CRI Cyber Profile: A complete guide for financial institutions

Get in-depth insights into the CRI Cyber Profile and what it means for financial institutions.

Compliance
Blog
How to choose the right AI standard: A 7-point guide

Discover the seven essential questions that help you choose an AI standard for your organization.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Additional resources you might like:

Compliance
Blog
CRI Cyber Profile: A complete guide for financial institutions

Get in-depth insights into the CRI Cyber Profile and what it means for financial institutions.

Compliance
Blog
How to choose the right AI standard: A 7-point guide

Discover the seven essential questions that help you choose an AI standard for your organization.

Compliance
Blog
Government contracting compliance 101: Everything you should know

Understand the regulations and standards government contractors must meet—and the challenges involved.

Compliance
Events
Beyond Compliance: Building a Scalable Trust Program with Vanta

Join us to see how high-growth companies use Vanta to build trust, stay audit-ready, and scale with confidence.

GDPR
Blog
How to make your website GDPR compliant in 8 steps

Learn the essential steps to achieve GDPR compliance for your website. Click here to learn the requirements and organizational benefits of GDPR compliance.

Compliance
Blog
How to choose the best access review software: A buyer’s guide

Learn why access review software is essential and how to choose and implement the right solution.

GDPR
Blog
GDPR basics: Everything you need to know to keep your business compliant

Learn the basics of GDPR, what GDPR compliance means for your organization, and how the GDPR rights granted to those in the EU may impact your business.

GDPR
Blog
GDPR compliance for US companies: Step-by-step guide

Learn how GDPR impacts US organizations and what it takes to achieve compliance.

GRC
Blog
How to choose the best risk management software for your organization

Understand how to manage rising organizational risk and what to look for in the right risk management software.