1. ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection — Information security management systems — Requirements.
Reference: Clause 6.1.2, "Information security risk assessment," and Clause 6.1.3, "Information security risk treatment." The structure of the standard explicitly places the risk treatment process (which includes selecting controls) after the risk assessment process. The output of 6.1.2 is the input for 6.1.3.
2. University of Cambridge, University Information Services. "Information Security Risk Management Process."
Reference: The process diagram and description show a clear sequence where "Risk Assessment" (Step 2) is completed before "Risk Treatment" (Step 3). The document states, "The purpose of risk treatment is to select and implement appropriate controls to reduce risks identified in the risk assessment." This confirms controls are considered after the assessment.
3. Von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102. https://doi.org/10.1016/j.cose.2013.04.004
Reference: Page 100, Section 3. This peer-reviewed article discusses the evolution of information security management based on ISO 27001. It describes the risk management cycle where risk analysis and evaluation (assessment) precede the implementation of countermeasures (controls), reinforcing the correct sequence of activities.