Iso Iec TS 27100-2020
Iso Iec TS 27100-2020
Iso Iec TS 27100-2020
SPECIFICATION 27100
First edition
2020-12
Information technology —
Cybersecurity — Overview and
concepts
Reference number
ISO/IEC TS 27100:2020(E)
© ISO/IEC 2020
ISO/IEC TS 27100:2020(E)
Contents Page
Foreword......................................................................................................................................................................................................................................... iv
Introduction...................................................................................................................................................................................................................................v
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references....................................................................................................................................................................................... 1
3 Terms and definitions...................................................................................................................................................................................... 1
4 Concepts......................................................................................................................................................................................................................... 2
4.1 Cyberspace.................................................................................................................................................................................................. 2
4.2 Cybersecurity............................................................................................................................................................................................ 3
5 Relationship between cybersecurity and relevant concepts................................................................................... 3
5.1 Relationship between information security and cybersecurity.................................................................... 3
5.2 Relationship between ISMS and cybersecurity............................................................................................................ 4
5.2.1 Cyberspace as a field of risk sources for an ISMS................................................................................. 4
5.2.2 ISMS in support of cybersecurity....................................................................................................................... 4
5.3 Cybersecurity framework............................................................................................................................................................... 5
5.4 Cybersecurity and safety................................................................................................................................................................. 5
5.5 Cyber insurance....................................................................................................................................................................................... 5
6 Risk management approach in the context of cybersecurity.................................................................................. 6
6.1 General............................................................................................................................................................................................................ 6
6.2 Threat identification........................................................................................................................................................................... 6
6.3 Risk identification................................................................................................................................................................................. 7
7 Cyber threats............................................................................................................................................................................................................. 7
7.1 General............................................................................................................................................................................................................ 7
7.2 General business organization................................................................................................................................................... 7
7.3 Industrial organization and industrial automation and control systems............................................. 8
7.4 Products, services, and supplier relationships............................................................................................................. 8
7.5 Telecommunications services/internet service providers................................................................................ 9
7.6 Public authorities................................................................................................................................................................................... 9
7.7 Critical infrastructure..................................................................................................................................................................... 10
7.8 Individual person................................................................................................................................................................................ 10
8 Incident management in cybersecurity.....................................................................................................................................10
8.1 General......................................................................................................................................................................................................... 10
8.2 Incident management within an organization.......................................................................................................... 11
8.3 Cross-organizational coordination...................................................................................................................................... 11
8.4 Technical support by product and service supplier.............................................................................................. 11
Annex A (informative) A layered model representing cyberspace.....................................................................................13
Bibliography.............................................................................................................................................................................................................................. 17
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that
are members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www.iso.org/
iso/foreword.html.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
Introduction
Cybersecurity is a broad term used differently through the world.
Cybersecurity concerns managing information security risks when information is in digital form in
computers, storage and networks. Many of the information security controls, methods, and techniques
can be applied to manage cyber risks.
ISO/IEC 27001 provides requirements for information security management systems. The focus of
ISO/IEC 27001 is on security of information, and associated risks, within environments predominantly
under the control of a particular organization. Cybersecurity focuses on the risks in cyberspace, an
interconnected digital environment that can extend across organizational boundaries, and in which
entities share information, interact digitally and have responsibility to respond to cybersecurity
incidents.
1 Scope
This document provides an overview of cybersecurity.
This document:
— describes cybersecurity and relevant concepts, including how it is related to and different from
information security;
— establishes the context of cybersecurity;
— does not cover all terms and definitions applicable to cybersecurity; and
— does not limit other standards in defining new cybersecurity-related terms for use.
This document is applicable to all types and sizes of organization (e.g. commercial enterprises,
government agencies, not-for-profit organizations).
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
3.2
cybersecurity
safeguarding of people, society, organizations and nations from cyber risks (3.7)
Note 1 to entry: Safeguarding means to keep cyber risks at a tolerable level.
3.3
cybersecurity event
occurrence indicating a possible breach of cybersecurity (3.2) or failure of controls
[SOURCE: ISO/IEC 27035-1:2016, 3.3, modified — In the term and the definition, “information security”
has been replaced with “cybersecurity”.]
3.4
cybersecurity incident
one or multiple related and identified cybersecurity events (3.3) that can harm people, society,
organizations or nations
[SOURCE: ISO/IEC 27035-1:2016, 3.4, modified — In the term and the definition, “information security”
has been replaced with “cybersecurity”. In the definition, new wording has been added after "harm".]
3.5
cyberspace
interconnected digital environment of networks, services, systems, people, processes, organizations,
and that which resides on the digital environment or traverses through it
Note 1 to entry: Interconnected digital environment that traverses public infrastructure e.g. the internet, rather
than parts of the organisation’s internal network or air-gapped digital environments that may not traverse public
infrastructure.
[SOURCE: ISO/IEC 27102:2019, 3.6, modified — In the definition, the part after "processes" has
been added.]
3.6
cyber threat
potential cause of an unwanted cybersecurity incident (3.4), which can result in harm to a system,
people, society, organization, or other entities in cyberspace (3.5)
[SOURCE: ISO/IEC 27000:2018, 3.74, modified — The term “threat” has been replaced with “cyber
threat”. In the definition, “incident” has been replaced with “cybersecurity incident”, and new wording
has been added after "system".]
3.7
risk
effect of uncertainty on objectives
Note 1 to entry: Cyber risk can be expressed as effect of uncertainty on objectives of entities in cyberspace (3.5).
Note 2 to entry: Cyber risk is associated with the potential that threats will exploit vulnerabilities in cyberspace
and thereby cause harm to entities in cyberspace.
[SOURCE: ISO/IEC 27000:2018, 3.61, modified — Notes 1 to 6 to entry have been replaced.]
4 Concepts
4.1 Cyberspace
Cyberspace is a complex environment based on digital technologies that provides a global place for
digital interaction among people including formal and informal interactions with public or private
entities such as businesses, governments, non-profit organizations and other groups. Cyberspace
is public but as individual components of cyberspace are owned by a variety of entities, it can be
considered both public and private space. People and entities interact in cyberspace for many different
purposes. This interaction is manifested as sharing, exchange, processing or receipt of information.
Any interaction taken in cyberspace by an individual or an entity potentially has a near-instantaneous
impact anywhere in the world.
While interactive actions in cyberspace create knowledge and power, the following features of
cyberspace can bring both advantageous and adverse consequences:
a) cyberspace is borderless;
b) anyone can enter and leave cyberspace freely or at a very low cost;
c) cyber actors can be anonymous or obfuscated; and
d) a threat agent can be anywhere in cyberspace from the opposite side of the globe to a close
neighbour of the target.
An action in cyberspace and its impacts can be asymmetric. The originating action can have
consequences disproportionate in difficulty and cost of counteraction. In order to take advantage of
cyberspace, it is important to prevent adverse consequences, that is, to ensure cybersecurity.
4.2 Cybersecurity
The objective of adequate cybersecurity is to maintain an acceptable level of stability, continuity and
safety of entities operating in cyberspace. While it is not possible to always achieve these objectives,
cybersecurity aims to reduce cyber risks to a tolerable level.
Areas of concern for cybersecurity include:
a) stability and continuity of society, organizations and nations;
b) property (including information) of people and organizations; and
c) human lives and health.
Cybersecurity with these characteristics is implemented by individual organizations. In cyberspace,
organizations need to consider not only themselves, but also other parties who share cyberspace. While
an organization needs to manage its vulnerabilities to ensure that the organization does not adversely
affect other actors, it needs to work with others to reduce cyber risks. In addition, cybersecurity needs
to reduce social and human losses in real space caused by cybersecurity incidents in cyberspace.
Therefore, immediate detection and appropriate response of information security incidents are
important elements of cybersecurity.
cybersecurity and information security differ in their objectives. Cybersecurity is primarily concerned
with protecting entities including people, society, organizations and nations from cyber risks (see
4.2), while information security addresses maintaining confidentiality, integrity and availability of
information with consequences.
Cyberspace can contain information systems controlling physical devices and systems. Compromising
information security of these connected information systems via the cyberspace can have implications
on society or individuals. Cybersecurity reduces the likelihood of such events.
In order to reduce social, human and economic impacts caused by cybersecurity incidents, entities who
connect to cyberspace have a responsibility for collectively managing cyber risks including sharing
information about cyber risks, implementing protective controls, monitoring and detecting potential
incidents, and cooperating in response and recovery from incidents. Activities of information security
are performed by an entity that handles the information to reduce its own risks. However, cybersecurity
is performed by an entity to address not only its own risks, but also risks of the other entities that are
directly or indirectly involved. Those entities can reside anywhere in cyberspace.
An ISMS provides a mechanism for organizations to use a risk-based, prioritized, flexible and
communications-enabling approach to manage information security risks based on their business
needs. An organization can operate its ISMS as a means of managing cyber risks. This is facilitated
by a consistent and iterative approach to identifying, assessing and managing risk and evaluating
implementation of the ISMS. An ISMS as described in ISO/IEC 27001 is applicable regardless of an
organization’s size and should reflect a clear understanding of the organization’s particular business
drivers and security considerations. An ISMS facilitates communication about the implementation
of desired outcomes and associated information security activities across the organization, from
the top management level by using the management system requirements, to the implementation
and operations levels by using the controls. The application of ISMS does not only provide a clear
and understandable set of controls as an outcome but also provide a clear scope, boundaries and
dependencies of cybersecurity activities in the organization.
An example of using an ISMS in support of cybersecurity is the use of ISO/IEC 27001 with ISO/IEC 27019
to establish, implement, maintain and continually improve an ISMS for the energy utility supplier. The
ISMS supports the stability of the energy supply and, hence, contributes to the cybersecurity of a nation.
6.1 General
To manage cyber risks, a clear understanding of the organization’s business drivers and security
considerations specific to its use of technology is required. Because each organization’s risks,
priorities and systems are unique, the tools and methods used to achieve the expected outcomes
vary. ISO/IEC 27005 provides information about managing information security risks and can also be
referred to for how to manage cyber risks.
The risk management process should allow for the organization to do the following.
a) Develop an organizational understanding of how to manage cyber risks to systems, people, assets,
data and capabilities for safeguarding the organization. This organizational understanding can
also contribute to the safeguarding of people, society, organizations and nations. These activities
are foundational. Understanding the business context, the resources that support critical functions,
and the related cyber risks enables an organization to focus and prioritize its efforts, consistent
with its risk management strategy and business needs. Examples of outcomes include: asset
management; business environment; governance; risk assessment; and risk management strategy.
b) Develop and implement appropriate safeguards to ensure delivery of critical services. This
supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of
outcomes include: identity management and access control; awareness and training; data security;
information protection processes and procedures; maintenance; and protective controls.
c) Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
This enables timely discovery of cybersecurity events. Examples of outcomes include: anomalies
and events; security continuous monitoring; and detection processes.
d) Develop and implement appropriate activities to take action regarding a detected cybersecurity
incident. This supports the ability to contain the impact of a potential cybersecurity incident.
Examples of outcomes include: response planning; communications; analysis; mitigation; and
improvements.
e) Develop and implement appropriate activities to maintain plans for resilience and to restore any
capabilities or services that were impaired due to a cybersecurity incident. This supports timely
recovery to normal operations to reduce the impact from a cybersecurity incident. Examples of
outcomes include: recovery planning; improvements; and communications.
7 Cyber threats
7.1 General
The definition of cybersecurity is inclusive of varied understandings of the term conceived by entities
including different persons, organizations and nations and of different roles in society, industry and
economy. Entities from sectors, e.g. general business organizations, persons, government agencies,
public utilities, financial service providers, transport service providers, manufacturers and ICT service
providers, can have respective views about cybersecurity characterized by their own threat scenarios.
There can be sector-specific understandings of cybersecurity. Subclauses 7.2 to 7.6 provide descriptions
of cyber threats.
b) information theft by personnel to include external parties, external threat actors and remote
workers;
c) quality issues of ICT devices and systems resulting in failure of their operation; and
d) system management and operational issues that result in a failure to effectively implement
cybersecurity controls.
These cyber threats cause consequences impacting the organization. Additionally, an organization’s
behaviour can cause risks and consequences to other entities. Vulnerable devices of the organization
at the network boundary can be maliciously used as a tool for attacks on other entities. Incorrect
configuration of assets can generate abnormal data traffic on the network or provide entry points for
threats.
suppliers through cyberspace represents a risk to the organization. Extended supply chains present
additional risks due to lack of transparency or inconsistency of security controls implemented by
suppliers and sub-suppliers.
ICT supply chains present unique cyber risks because ICT forms systems and networks that comprise
cyberspace within and outside of the organization’s boundaries. When organizations acquire ICT
products and services, they inherit vulnerabilities and other quality defects in those products
and services. Limited visibility into quality practices of ICT suppliers represents a cyber risk to the
organization.
ICT service providers include telecommunication service providers, internet service providers (ISPs),
cloud service providers and related product and service providers. They provide products and services
to the wide sectors of general business organizations, industrial organizations, critical infrastructures
and other organizations and persons.
Organizations can manage cyber risks to ICT supply chains by establishing supplier agreements that
define rules for:
a) governing supplier relationships;
b) stating how suppliers connect to the organization’s systems and networks through cyberspace;
c) flowing security requirements to suppliers’ suppliers;
d) establishing quality assurance requirements for ICT products and services.
For cases where supplier agreement cannot be established (for example, the organization relies on an
information source that is publicly available for its critical functions), the organization should identify
and appropriately manage resulting cyber risks.
ISO/IEC 27036 (all parts) provides principles and guidelines for information security in supplier
relationships.
8.1 General
While cybersecurity activities aim at preventing occurrence of cybersecurity incidents, there is a
possibility of experiencing a cybersecurity incident. Cybersecurity incidents can have consequences on
the society, people, environment, organizations and nations. Cybersecurity incidents can be caused by:
a) governance, policy, procedure, process or other relevant failure;
b) unintentional actions or mistakes by organizational personnel or by third parties; and
c) intentional acts or attacks on digital devices, systems, machines, facilities or services or the
internet.
Once a cybersecurity incident has occurred, it should be responded to appropriately. To prevent and
respond to cybersecurity incidents, private and public sector organizations and people should have
awareness and knowledge of cybersecurity commensurate with their roles, and be prepared for
protecting, detecting, responding to and recovering from the cybersecurity incidents. Prior to taking
these actions, organizations and people need to identify their digital environment, stakeholders,
practices and associated cyber risks. Thus, organizations and people address cybersecurity incidents
through the phases of identifying, protecting, detecting, responding and recovering.
Incident management in cybersecurity has three areas:
a) incident management within an organization (8.2);
b) cross-organizational coordination (8.3); and
c) technical support by product and service supplier (8.4).
ISO/IEC 27035 (all parts) provides principles and guidelines for information security incident
management.
or not. It is possible that a vulnerability of device or system is exploited by a person with malicious
intent. It is also possible that non-vulnerable elements are abused to trigger a behaviour that results in
a cybersecurity incident, e.g. operation of networks, systems and services supporting the activities of
society, people, organizations and nations can be interfered by overloaded traffic.
In this context of cyberspace, product and service suppliers have roles in cybersecurity incident
management. They are expected to take part through the phases of identify, protect, detect, respond
and recover. Their activities can include:
a) operating a support desk of the product and service;
b) identifying and reporting about vulnerabilities of the product and service;
c) detecting and analysing cybersecurity incidents;
d) providing software updates, workarounds and other support;
e) reporting of the cybersecurity incidents; and
f) providing customers with patch management support.
To meet the needs of these activities consistently and effectively, a product and service supplier can have
the function called product security incident response team (PSIRT). For a CSIRT of an organization in
need of supplier’s support, the PSIRT can be the contact point of the supplier. Additionally, a vendor
management performance evaluation scorecard can be established to measure the performance and
effectiveness of vendors and suppliers that provide products, services or support during an incident.
Annex A
(informative)
A.1 General
This annex provides an example of how to represent cyberspace. This makes possible, at context
establishment, first process step of the risk management, the correct positioning of the primary and
supporting assets, their risk sources and the organization’s stakeholders.
This improves the approach for the contextualization of known attack scenarios, the assessment of
their consequence and likelihood, and optimizes the selection of the defence tactics to prepare the risk
treatment decisions.
The layered representation model allows a system and its ecosystem to be modelled with a flexible level
of detail. It is up to the analyst to select it, depending on the required depth of the analysis. The links
between layers are not presented to keep the simplicity of the drawing. The benefit of the layered model
is that it keeps the same regardless the size of the objects (nodes and links) being positioned on it.
Projections are made easier by using knowledge bases. Their level of detail is at the discretion of the
analyst, depending on the purpose of their study and the complexity of the observed system. This
option is possible thanks to the fractal nature of this layered model. Table A.1 provides classification
components for each layer of the model.
The layers communicate with each other. Exchanges between different layers are reflected by inter-
layer links. Each of these links has its own nature, which is different from the intra-layer links. Table A.2
shows further explanations about classification of inter-layer links. Figure A.2 shows an example of
location links.
While this type of modelling can initially appear complex, its approach is largely facilitated by the
contribution of several tools and techniques:
— the use of system patterns, which represent structures frequently found and modelled once for all
(e.g. hosting in the cloud services, social network, MPLS WAN network, etc.);
— use of existing knowledge bases from various sectors (e.g. physical security, psycho-social risks);
— application of an iterative methodology, by modelling high-level systems and applying successive
refinement;
— application of modelling techniques to limit complexity (e.g. symmetry study to only study part of
the symmetric pattern of the problem, etc.).
T1
T2
T3
Key
T1 intrusion phishing attack of an exposed user
T2 action taking control of the IT components
T3 exploitation target corruption
The cyberspace representation model is versatile enough to allow differing levels of analysis depending
on the analyst’s requirements.
Furthermore, the base model with 3 fundamental layers can be extended to 6 layers:
— the ANTHROPOGENIC-1 subdivision, called the COGNITIVE layer, is used to model the social
representation of human beings;
— the ANTHROPOGENIC-2 subdivision, called the HUMAN layer, is used to model individuals and their
organisation into social networks;
— the DIGITAL-1 subdivision, called the CYBER PERSONA layer, is used to model the digital persona of
individuals or digital components;
— the DIGITAL-2 subdivision, called the LOGICAL layer, is used to model technical computer data and
software running processes;
— the PHYSICAL-1 subdivision, called the COMPONENT layer, is used to model components which
make up IT system infrastructure;
— the PHYSICAL-2 subdivision, called the GEOGRAPHIC layer, is used to model the geographic location
of people and assets.
Figure A.4 shows the 6-layer cyberspace model.
Bibliography
[1] ISO/IEC 27001, Information technology — Security techniques — Information security management
systems — Requirements
[2] ISO/IEC 27005, Information technology — Security techniques — Information security risk
management
[3] ISO/IEC 27019, Information technology — Security techniques — Information security controls for
the energy utility industry
[4] ISO/IEC 27035 (all parts), Information technology – Security techniques – Information security
incident management
[5] ISO/IEC 27036 (all parts), Information technology — Security techniques — Information security
for supplier relationships
[6] ISO/IEC TS 27102, Information technology – Security techniques – Information security
management guidelines for cyber insurance
[7] ISO/IEC TS 27110, Information technology – Information security, cybersecurity and privacy
protection – Cybersecurity framework development guidelines
[8] ISO 31000, Risk management — Guidelines
[9] AFNOR CN SSI N0477, “Voluntary standards and innovative approaches to cybersecurity”,
December 2019
ICS 35.030
Price based on 17 pages