Iso Iec 27005 2018 en PDF
Iso Iec 27005 2018 en PDF
Iso Iec 27005 2018 en PDF
INTERNATIONAL ISO/IEC
STANDARD 27005
Third edition
2018-07
Reference number
ISO/IEC 27005:2018(E)
© ISO/IEC 2018
Provläsningsexemplar / Preview
ISO/IEC 27005:2018(E)
ISO/IEC 27005:2018(E)
Contents Page
Foreword...........................................................................................................................................................................................................................................v
Introduction................................................................................................................................................................................................................................. vi
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references....................................................................................................................................................................................... 1
3 Terms and definitions...................................................................................................................................................................................... 1
4 Structure of this document......................................................................................................................................................................... 1
5 Background................................................................................................................................................................................................................. 2
6 Overview of the information security risk management process...................................................................... 3
7 Context establishment..................................................................................................................................................................................... 5
7.1 General considerations..................................................................................................................................................................... 5
7.2 Basic criteria.............................................................................................................................................................................................. 6
7.2.1 Risk management approach................................................................................................................................... 6
7.2.2 Risk evaluation criteria............................................................................................................................................... 6
7.2.3 Impact criteria.................................................................................................................................................................... 6
7.2.4 Risk acceptance criteria.............................................................................................................................................. 7
7.3 Scope and boundaries........................................................................................................................................................................ 7
7.4 Organization for information security risk management................................................................................... 8
8 Information security risk assessment............................................................................................................................................ 8
8.1 General description of information security risk assessment........................................................................ 8
8.2 Risk identification................................................................................................................................................................................. 9
8.2.1 Introduction to risk identification..................................................................................................................... 9
8.2.2 Identification of assets................................................................................................................................................. 9
8.2.3 Identification of threats........................................................................................................................................... 10
8.2.4 Identification of existing controls................................................................................................................... 10
8.2.5 Identification of vulnerabilities........................................................................................................................ 11
8.2.6 Identification of consequences.......................................................................................................................... 12
8.3 Risk analysis............................................................................................................................................................................................ 12
8.3.1 Risk analysis methodologies............................................................................................................................... 12
8.3.2 Assessment of consequences.............................................................................................................................. 13
8.3.3 Assessment of incident likelihood.................................................................................................................. 14
8.3.4 Level of risk determination.................................................................................................................................. 15
8.4 Risk evaluation...................................................................................................................................................................................... 15
9 Information security risk treatment.............................................................................................................................................16
9.1 General description of risk treatment............................................................................................................................... 16
9.2 Risk modification................................................................................................................................................................................ 18
9.3 Risk retention......................................................................................................................................................................................... 19
9.4 Risk avoidance....................................................................................................................................................................................... 19
9.5 Risk sharing............................................................................................................................................................................................. 19
10 Information security risk acceptance..........................................................................................................................................20
11 Information security risk communication and consultation...............................................................................20
12 Information security risk monitoring and review..........................................................................................................21
12.1 Monitoring and review of risk factors.............................................................................................................................. 21
12.2 Risk management monitoring, review and improvement............................................................................... 22
Annex A (informative) Defining the scope and boundaries of the information security risk
management process.....................................................................................................................................................................................24
Annex B (informative) Identification and valuation of assets and impact assessment.................................28
Annex C (informative) Examples of typical threats.............................................................................................................................37
ISO/IEC 27005:2018(E)
ISO/IEC 27005:2018(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
This third edition cancels and replaces the second edition (ISO/IEC 27005:2011) which has been
technically revised. The main changes from the previous edition are as follows:
— all direct references to the ISO/IEC 27001:2005 have been removed;
— clear information has been added that this document does not contain direct guidance on the
implementation of the ISMS requirements specified in ISO/IEC 27001 (see Introduction);
— ISO/IEC 27001:2005 has been removed from Clause 2;
— ISO/IEC 27001 has been added to the Bibliography;
— Annex G and all references to it have been removed;
— editorial changes have been made accordingly.
ISO/IEC 27005:2018(E)
Introduction
This document provides guidelines for information security risk management in an organization.
However, this document does not provide any specific method for information security risk management.
It is up to the organization to define their approach to risk management, depending for example on
the scope of an information security management system (ISMS), context of risk management, or
industry sector. A number of existing methodologies can be used under the framework described in
this document to implement the requirements of an ISMS. This document is based on the asset, threat
and vulnerability risk identification method that is no longer required by ISO/IEC 27001. There are
some other approaches that can be used.
This document does not contain direct guidance on the implementation of the ISMS requirements given
in ISO/IEC 27001.
This document is relevant to managers and staff concerned with information security risk management
within an organization and, where appropriate, external parties supporting such activities.
1 Scope
This document provides guidelines for information security risk management.
This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the
satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/
IEC 27002 is important for a complete understanding of this document.
This document is applicable to all types of organizations (e.g. commercial enterprises, government
agencies, non-profit organizations) which intend to manage risks that can compromise the organization’s
information security.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
ISO/IEC 27005:2018(E)
5 Background
A systematic approach to information security risk management is necessary to identify organizational
needs regarding information security requirements and to create an effective information security
management system (ISMS). This approach should be suitable for the organization’s environment
and, in particular, should be aligned with overall enterprise risk management. Security efforts should
address risks in an effective and timely manner where and when they are needed. Information security
risk management should be an integral part of all information security management activities and
should be applied both to the implementation and the ongoing operation of an ISMS.
Information security risk management should be a continual process. The process should establish
the external and internal context, assess the risks and treat the risks using a risk treatment plan to
implement the recommendations and decisions. Risk management analyses what can happen and what
the possible consequences can be, before deciding what should be done and when, to reduce the risk to
an acceptable level.
Information security risk management should contribute to the following:
— risks being identified;
— risks being assessed in terms of their consequences to the business and the likelihood of their
occurrence;
— the likelihood and consequences of these risks being communicated and understood;
— priority order for risk treatment being established;
— priority for actions to reduce risks occurring;
— stakeholders being involved when risk management decisions are made and kept informed of the
risk management status;
— effectiveness of risk treatment monitoring;
— risks and the risk management process being monitored and reviewed regularly;
ISO/IEC 27005:2018(E)
Figure 2 shows how this document applies this risk management process.
The information security risk management process consists of context establishment (Clause 7), risk
assessment (Clause 8), risk treatment (Clause 9), risk acceptance (Clause 10), risk communication and
consultation (Clause 11), and risk monitoring and review (Clause 12).
ISO/IEC 27005:2018(E)
As Figure 2 illustrates, the information security risk management process can be iterative for risk
assessment and/or risk treatment activities. An iterative approach to conducting risk assessment can
increase depth and detail of the assessment at each iteration. The iterative approach provides a good
balance between minimizing the time and effort spent in identifying controls, while still ensuring that
high risks are appropriately assessed.
The context is established first. Then, a risk assessment is conducted. If this provides sufficient
information to effectively determine the actions required to modify the risks to an acceptable level,
then the task is complete and the risk treatment follows. If the information is insufficient, another
iteration of the risk assessment with revised context (e.g. risk evaluation criteria, risk acceptance
criteria or impact criteria) is conducted, possibly on limited parts of the total scope (see Figure 2, Risk
Decision Point 1).
The effectiveness of the risk treatment depends on the results of the risk assessment.
Note that risk treatment involves a cyclical process of:
— assessing a risk treatment;
ISO/IEC 27005:2018(E)
7 Context establishment