Risk Treatment
The process of selecting and implementing measures to modify identified risks. The four primary risk treatment options are risk mitigation (applying controls to reduce risk), risk acceptance (acknowledging and tolerating the risk), risk transfer (sharing risk with a third party such as an insurer), and risk avoidance (eliminating the risk by ceasing the activity).
Risk treatment is the action-oriented phase of the risk management process, where organizations decide how to address the risks identified during risk assessment. ISO 27001 Clause 6.1.3 specifically requires organizations to define and apply an information security risk treatment process. For each identified risk, the organization selects one or more treatment options: mitigate the risk by applying security controls that reduce its likelihood or impact, accept the risk if it falls within the defined risk appetite, transfer the risk to another party (typically through insurance or contractual arrangements), or avoid the risk entirely by discontinuing the activity that gives rise to it.
The risk treatment plan is a critical compliance artifact. It documents which treatment option has been selected for each risk, what specific controls or measures will be implemented, who is responsible for implementation, the timeline for implementation, and how the effectiveness of the treatment will be measured. ISO 27001 requires a formal risk treatment plan and uses the Statement of Applicability (SoA) to document which Annex A controls have been selected as part of risk treatment. SOC 2 auditors evaluate whether the organization's risk management process includes appropriate treatment of identified risks. NIS2 requires essential entities to implement cybersecurity risk-management measures, which is effectively mandating risk treatment.
Effective risk treatment requires balancing security improvements against cost, operational impact, and organizational priorities. Not every risk needs to be mitigated to zero — the goal is to reduce residual risk to a level within the organization's risk appetite. When selecting controls, organizations should consider both their effectiveness at reducing risk and their feasibility in the operational context. After implementing risk treatment measures, the remaining risk (residual risk) must be formally evaluated and accepted by management. This accept-or-further-treat decision loop continues until residual risk is within acceptable bounds. Risk treatment is not a one-time exercise; it must be revisited as new risks emerge, as the threat landscape evolves, and as business conditions change.
Related frameworks
Related terms
Control Objective
A statement describing what a specific security control is intended to achieve. Control objectives define the desired outcome — such as preventing unauthorized access or ensuring data integrity — while allowing organizations flexibility in how they implement the control to meet that objective.
Residual Risk
The level of risk that remains after security controls and risk treatment measures have been applied. Residual risk must be formally evaluated and accepted by management to ensure it falls within the organization's defined risk appetite.
Risk Appetite
The level and type of risk an organization is willing to accept in pursuit of its objectives. Risk appetite defines the boundaries within which the organization operates and guides decision-making about which risks to accept, mitigate, transfer, or avoid.
Risk Assessment
A structured process for identifying, analyzing, and evaluating information security risks. Risk assessments determine the likelihood and potential impact of threats to an organization's information assets, guiding decisions about which controls to implement.
Statement of Applicability
A key ISO 27001 document that lists all 93 Annex A controls and states whether each is applicable to the organization, along with justification for inclusion or exclusion and a description of how applicable controls are implemented.
Assess your compliance posture
Run a free self-assessment for ISO 27001, SOC 2, GDPR, NIS2, or Tech DD and see exactly where you stand.
Start free assessment