1. ISO/IEC 27005:2022 - Information security, cybersecurity and privacy protection — Guidance on managing information security risks.
Section 8.4, "Risk treatment option selection," explicitly lists the four options for risk treatment: risk modification, risk retention (acceptance), risk avoidance, and risk sharing. This directly validates "Risk acceptance" as a strategy and shows that "Mobile updates" and "Software installation" are examples of risk modification, while "Risk exclusion" is not a listed option.
2. ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection — Information security management systems — Requirements.
Clause 6.1.3 c) 2) requires the organization to "determine all controls that are necessary to implement the information security risk treatment option(s) chosen." This clause implicitly references the selection of treatment options, which are detailed in supporting standards like ISO 27005.
3. Peltier, T. R. (2013). Information Security Risk Analysis (3rd ed.). CRC Press.
Chapter 7, "Risk Mitigation," discusses the primary risk mitigation (treatment) strategies. The text identifies them as: "risk assumption" (acceptance), "risk avoidance," "risk limitation" (modification/mitigation), and "risk transference." This academic source confirms that risk acceptance is a fundamental strategy. (Note: While a book, it is a widely cited academic and professional text in the field).