
Threat Intelligence Services Aligned to ISO/IEC 27001:2022
Inform-ISO offers a bespoke threat intelligence service designed to support organisations in meeting the evolving requirements of ISO/IEC 27001:2022, particularly around threat identification, risk management, and control selection.
Our Services


Deep Asset Understanding
We begin by working closely with your teams to understand your information assets, their value, and the risks they currently face. This foundational step ensures that threat intelligence is relevant, targeted, and aligned with your business context.

Intelligence Gathering From Across the Information Domain
We collate threat data from a wide range of sources — including open-source intelligence (OSINT), sector-specific feeds, regulatory advisories, and global threat databases. This multi-source approach ensures a comprehensive view of the threat landscape.

Embedded Threat Intelligence Procedures
Rather than simply delivering data, we implement threat intelligence procedures alongside your teams. This collaborative approach ensures your organisation understands how threat intelligence works, how it supports ISO 27001 compliance, and how it can be sustained internally.

Asset-Specific Threat Feeds
We tailor threat feeds to your specific assets — mapping threats to asset types, business functions, and known vulnerabilities. These feeds are then integrated directly into your risk register, enabling dynamic risk assessment and informed control selection.

Enhanced Assurance
This service provides an additional layer of assurance for organisations seeking to strengthen their information security posture. By aligning threat intelligence with ISO 27001’s risk-based approach, clients gain confidence that their controls are not only compliant — but responsive to real-world threats.

Embedded Threat Intelligence Procedures
Our threat intelligence service is directly aligned with the requirements of ISO/IEC 27001:2022, particularly:
- Control A.5.7 – Threat Intelligence
We help organisations implement this control by providing demonstrable evidence of a structured threat intelligence process. This includes identifying relevant threats, analysing their potential impact, and integrating findings into the risk management process.
By embedding threat intelligence into your ISMS, we help ensure your organisation is not only compliant — but also proactive in addressing emerging risks.

Who This Service Is For
Our threat intelligence service is ideal for:
- Organisations already certified to ISO/IEC 27001:2022 that want to enhance their threat intelligence capabilities and demonstrate stronger alignment with control A.5.7.
- Organisations preparing for ISO/IEC 27001 certification, looking to embed threat intelligence into their ISMS from the outset.
Whether you're maintaining certification or working toward it, our service helps you build a more resilient, threat-aware security posture.

How the Service Is Delivered
Our threat intelligence service is typically delivered onsite, working directly with your ISMS managers and risk owners. This face-to-face approach allows us to:
- Collaboratively map assets and threats
- Build internal understanding of threat intelligence processes
- Integrate findings directly into your ISMS and risk register
However, we also offer remote delivery for clients who prefer virtual engagement or are based internationally. Regardless of format, the service remains hands-on, tailored, and fully aligned with ISO 27001 requirements.

What Makes Our Approach Unique
What sets Inform-ISO apart is the real-world intelligence experience embedded in our team. Several of our consultants have previously worked in intelligence and security management roles within the UK Ministry of Defence (MOD) and other government departments.
This background brings:
- A deep understanding of threat actors, tactics, and behaviours
- Experience in handling classified and sensitive threat data
- A proven ability to translate intelligence into actionable risk insights
This level of expertise engenders assurance — giving our clients confidence that their threat intelligence processes are not only ISO-compliant, but also grounded in operational security best practice.

