Everything you need to know about ISO 27005: summary, requirements, pros and cons

ISO 27005 is an essential international standard in the field of information technology risk management. It helps organizations to rationalize sensitive data protection and anticipate the consequences of cyberattacks and cybercrimes. As a renowned international certification, ISO 27005 was well-used in 2021, a year during which companies had to deal with increasingly complex cyber risks. How does this ISO standard work? Who is it for? How can you train for it? And what are its possible limitations?

Christophe Forêt

An article from

Christophe Forêt
President and co-founder of C-Risk
Published
September 11, 2023
Updated
September 11, 2023
Reading time
minutes
ISO 270005 - C-Risk

What is ISO 27005 about?

The exact title of ISO 27005 as presented on the ISO website is “Information technology — Security techniques — Information security risk management”. As such, this standard helps companies manage risks related to information security.

ISO 27005, a definition

As its name suggests, ISO/IEC 27005 is an international standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). To be more specific, it supports information security based on a risk management approach. Unlike methods such as the NIST cybersecurity framework, this standard is subject to certification.

ISO 27005 is also based on the guidelines set out in ISO/IEC 27001 and ISO/IEC 27002. Originally published in June 2008 under the acronym ISO/IEC 27005:2008, it was reissued in 2011, and again in 2018. Our article will refer to this latest version.

Here is a summary of the concepts featured in ISO 27005: chapters six to 12 develop an information systems risk management approach; chapter seven deals more specifically with risk analysis, which remains the backbone of a proper cybersecurity strategy; chapter eight focuses on risk assessment; and chapters nine to twelve detail how to implement a risk treatment strategy and how to follow it up.

Who is the intended user of this ISO standard?

The International Organization for Standardization recommends the ISO 27005 standard to companies, but also to public establishments such as "government agencies" and to NPOs (non-profit organizations).

In practice, this information security standard is used to ensure data confidentiality and the availability and integrity of an organization’s key information assets. It is designed for all structures affected by cyber risks and by the continuous increase of data in their services.

What is the exact purpose of the ISO/IEC 27005 standard?

It is designed to support the satisfactory implementation of information security based on a risk management approach. Employee training is generally required in order to help them develop the skills to carry out effective information security risk management processes. People trained in ISO 27005 are theoretically able to identify, analyze, measure, and treat risks.

This standard also aims at helping your company set up an ISMS (Information Security Management System). An ISMS implies establishing cybersecurity processes and policies, while at the same time continuously improving risk management and taking into account human and technical factors during the process.

To this end, the ISO 27005 standard follows a logic which is reminiscent of the PDCA (Plan, Do, Check, Act) methodology of continuous improvement:

  • Plan: Identify and assess cyber risks, then reflect strategically on corresponding risk reduction measures;
  • Do: Have these measures implemented;
  • Check: Conduct a performance review;
  • Act: Ensure monitoring and improvement of your risk treatment strategy.
The Plan-DO-Check-Act Methodology

What are the ISO 27005 training courses?

There are several certification courses for ISO 27005 training:

  • ISO 27005 Foundation, which gives access to the PECB Certified ISO/CEI 27005 Foundation certification;
  • ISO 27005 Certified Risk Manager with EBIOS. This training explores risk management from the EBIOS method perspective, culminating in two exams: PECB Certified ISO/CEI 27005 Risk Manager and PECB Certified EBIOS;
  • ISO 27005 Certified Risk Manager with MEHARI, “harmonized risk analysis method”, developed by the CLUSIF in France;
  • ISO 27005 Risk Manager of the ANSSI (French National Agency for Information Systems Security).

Transform how you model, measure, and manage cyber risk.

Our FAIR-certified experts will help you prioritize your IT security investments, improve governance and increase your organization's cyber resilience..

How does ISO 27005 work?

This international standard includes more than 20 pages of information security risk management approaches. Broadly speaking, though, the document supports the general concepts of the methodology through four main steps:

1 / Contextualization of risk management

Risk analysis contextualization consists of determining where risk management starts and where it ends. This is also the time to set up a series of criteria:

  • assessment criteria help you identify the assets threatened by cyber risks and the thresholds above which risks must be dealt with;
  • impact criteria correspond to the minimum level of consequences, above which a risk needs to be taken into consideration;
  • risk acceptance criteria represent a threshold below which the risk can be tolerated.

2 / Risk assessment

During this step, you will first determine the elements at risk: the organization as a whole, but also information systems, services, and data groups. Next, you will need to pinpoint the threats and vulnerabilities revolving around these elements.

After that, ISO 27005 requires you to match those threats and their occurrences with the security needs of your structure. This entire process should help you rank priorities according to the assessment criteria you defined in step one.

While the ISO 27005 standard helps identify cybersecurity vulnerabilities, it does not provide for a risk rating scale. The team in charge of applying the standard must build an evaluation system of their own. This system can rely on qualitative or quantitative estimation methods, the latter being based on measurable costs. In practice, due to a lack of ISO standard prescription, analyses tend to end up qualitative more often than not.

Risk Management - ISO 27005

3 / Risk treatment strategy

During this step, your structure needs to set IT security goals while keeping in mind the results obtained during step two. Once those goals are set, you may then draft your specifications, which should help design measures for treating risks.

In ISO 27005, conceptualizing these measures means comparing a risk with its treatment cost. Four possibilities then emerge:

  • Refusal or avoidance: your organization deems the cyber risk too serious and states that it must be avoided at all costs. Then, you may decide to put a stop to the activity likely to cause it;
  • Transfer: your structure shares the risk with a third party – insurance or cybersecurity subcontractor – capable of protecting it from the risk, at least financially;
  • Mitigation: you design measures to mitigate the impact or the probability of occurrence of a risk in order to make it more tolerable;
  • Conservation: the risk is considered bearable and not enough of a threat, your structure chooses not to address it.

Each option involves a residual risk, which must be systematically assessed.

4 / “Risk acceptance”

The risk treatment strategy and residual risks need to go through an “acceptance” stage, which means, in practice, that the entire treatment plan has to be given the green light by senior management. During this step, heads of departments may question costs that they think are too high, or consider accepting certain risks. These exceptions should be justified.

The ISO 27005 methodology theoretically ends here, though you should keep in mind that all the work your organization has done to implement it can be used as part of a monitoring and review procedure. It provides a history of the risks you have identified, the scenarios you have imagined, the risk analysis you have performed, and the treatment strategies you have set up. Of course, this methodology should be repeated if threats and vulnerabilities were to evolve. This work can also serve as a support for communication with your stakeholders.

ISO/IEC 27005 is a certified training

ISO 27005: benefits and drawbacks

This cyber risk management standard comes with several advantages, one of the most remarkable being its adaptability to different kinds of structures. However, it lacks a prescriptive dimension in terms of risk analysis criteria.

Benefits of the ISO 27005 risk management method

Your organization can benefit from the ISO/CEI 27005 standard in multiple ways:

  • this method can be used on its own;
  • your teams develop the required skills for structured cyber risk management;
  • weaknesses and various threats to your organization will be spotted;
  • your organization will begin to benefit from a resilient ISMS;
  • the method can be adjusted to all structures, including organizations that constantly adapt to an ever-changing landscape;
  • the confidence of your stakeholders will be boosted.

Drawbacks of ISO 27005

The main drawback of ISO 27005 remains its lack of a prescriptive aspect. When it comes to defining scope for risk management, the organization is required to do everything independently, whether that is the scope of application of the ISMS or even the risk criteria. This approach is therefore only suitable for structures that wish to invest significant internal resources in developing their own methodology.

With regard to the contextualization step of risk management, and more specifically to the establishment of risk assessment criteria, ISO suggests you opt for quantitative criteria. A quantitative approach is the whole purpose of a method like FAIR™ Analysis (Factor Analysis of Information Risk).

This risk analysis standard is based on statistical and mathematical evaluation methods to assess and rank risks, and it factors in financial consequences. It is a significant upgrade from the subjective approximations of qualitative risk assessment methods. It simplifies decision-making and the implementation of a more objective strategy, which will be directly tied to the reality of the risks your structure faces.

ISO 27005 targets information security

Protect your business and support data-driven decisions with a risk-based approach to your cyber strategy. Contact us today to learn how we can help you safeguard your digital assets and stay compliant with regulators.

FAQ : ISO 27005

What is ISO 27005?

ISO 27005 is an international information security standard which provides a method and best practices for building an Information Security Management System (ISMS). It is designed to protect your structure from cyber threats and prevent the loss or corruption of sensitive data.

What is ISO 27005 used for?

ISO 27005 helps organisations protect their information systems in order to prevent critical data from being corrupted, deleted or stolen.

Are there any prerequisites for using ISO 27005?

You may want to have basic training in cybersecurity and check what you know about ISO 27001 compliance.

In this article
Improve decision-making with Cyber Risk Quantification

We build scalable solutions to quantify cyber risk in financial terms so organizations can make informed decisions to improve governance and resilience.

Related articles

Read more on cyber risk, ransomware attacks, regulatory compliance and cybersecurity.