ISMS in a Nutshell - Part 3: Vulnerabilities, Threats, Risks

18. May 2021

Information security is first and foremost about protecting your corporate assets. In our mini-series, we explain the terms, concepts and interesting facts about information security management in companies.

Part 1: The basics
Part 2: The ISMS in the company
Part 4: Enterprise Risk Management


What are vulnerabilities?

In the context of information security management, a vulnerability is a security gap in an organisation's IT systems. Companies can suffer damage if attackers exploit these vulnerabilities, for example by accessing IT systems and stealing or manipulating company data. If vulnerabilities remain undetected or are improperly handled, they can have consequences that threaten a company's existence.

With the help of an information security management system (ISMS), companies can organise their handling of vulnerabilities through defined processes and rules. Thus, vulnerabilities are usually identified in risk management and dealt with according to a previously defined methodology. In addition to the early detection of security vulnerabilities, the goal is to strengthen and improve the protection of corporate assets.

Vulnerability
Insufficient protection of buildings
Insufficient access controls
Unencrypted information
Software vulnerability
Vulnerabilities - examples

What are threats?

Threats are causes of an unwanted incident that could harm an organisation. Threats exist permanently and can exploit undetected or inadequately addressed vulnerabilities in a company to its disadvantage. A list of typical threats can be found in the annex of ISO/IEC 27005:2018. According to the BSI definition, threats that exploit a vulnerability become hazards. A publicly available overview of elementary threats can be found in the IT-Grundschutz-Kompendium.

Not every vulnerability is necessarily relevant to every type of threat. For example, an application that is not accessible via the Internet may have a vulnerability. However, due to the lack of external accessibility, this does not create a risk from external attackers, as the vulnerability cannot be exploited by them. Even vulnerabilities that cannot be exploited by current threats should, however, be documented by the company so that it can react promptly to new threats.

VulnerabilityPotential threat
Insufficient protection of buildingsTheft
Insufficient access controlsWillful damage
Unencrypted informationInformation theft
Software vulnerabilityUnauthorised access by third parties
Vulnerabilities and associated potential threats - examples

What are risks?

A risk arises when a threat encounters the vulnerability of an asset and negatively affects the information security of that asset. In information security, risks potentially cause the loss of key protection objectives. Risks are usually identified, analysed, assessed and dealt with in an information security risk management process. A prerequisite for the identification of risks is the prior identification of assets, vulnerabilities and threats. Risks cannot be fully assessed if data is incomplete.

Risks can be assigned to known assets by identifying their vulnerabilities and threats. Using systematic approaches, these risks are assessed in the risk analysis and examined for their probability of occurrence and potential impact. Based on this assessment, risk mitigation measures are defined, if necessary. The result of these steps is a list of risks that includes the respective risk owners, the risk assessments and the resulting measures. Based on the risk assessment, vulnerabilities can be prioritised according to their criticality.

Possibility of risk assessment - simplified presentation

 

Also interesting:

Security Advisories on PRTG Network Monitor

Security Advisories on PRTG Network Monitor

The pentest professionals at usd HeroLab examined the PRTG Network Monitor web application as part of web application pentests and identified several vulnerabilities. Two vulnerabilities relate to cross-site scripting (XSS), which allows attackers to inject JavaScript...

PCI Secure Software Standard v2.0: What You Should Know

PCI Secure Software Standard v2.0: What You Should Know

On 15 January 2026, the PCI Security Standards Council (PCI SSC) released version 2.0 of the PCI Secure Software Standard. This is the first comprehensive revision since the introduction of the standard. Insight into the Key Changes The new version streamlines the...

Categories

Categories