Reducing the risks of information security breaches with ISO/IEC 27005
July 2018 by Clare Naden, ISO
In our hyper-connected, technology driven world, data breaches and cyber-attacks remain a significant threat to organizations, and a lack of awareness of the risks is often to blame1). A newly revised standard will help.
Protecting the security of a company’s information – whether it be commercially sensitive or the personal details of their clients - has never been more under the spotlight. New legislation such as the European GDPR means organizations are under even greater pressure to ensure their information is secure. But having the most appropriate technologies and processes can be a minefield. The newly revised ISO/IEC 27005:2018, Information technology – Security techniques – Information security risk management, provides guidance for organizations on how to wade through it all by providing a framework for effectively managing the risks.
Complementary to ISO/IEC 27001:2013, which provides the requirements for an information security management system (ISMS), ISO/IEC 27005 has recently been updated to reflect the new version of ISO/IEC 27001 and thus ensure it is best equipped to meet the demands of organizations of today.
It provides detailed risk management guidance to help meet related requirements specified in ISO/IEC 27001.
Edward Humphreys, Convener of the ISO/IEC working group that developed both ISO/IEC 27001 and ISO/IEC 27005 said the updated standard is a key tool in the ISO/IEC ‘cyber-risk toolbox’.
“ISO/IEC 27005 provides the ‘why, what and how’ for organizations to be able to manage their information security risks effectively in compliance with ISO/IEC 27001,” he said. “It also helps to demonstrate to an organization’s customers or stakeholders that robust risk processes are in place, giving them confidence that they are good to do business with.”
ISO/IEC 27005 is one of more than a dozen standards in the ISO/IEC 27000 series that make up the cyber-risk toolkit, led by the flagship ISO/IEC 27001, Information technology – Security techniques – Information security management systems – Requirements. Others in the series include those for protecting information in the Cloud, information security in the telecoms and utility sectors, cybersecurity, ISMS auditing and more.
ISO/IEC 27005 was developed by working group 1 Information security management systems of technical committee ISO/IEC JTC 1, Information technology, subcommittee SC 27, IT Security techniques, the secretariat of which is held by DIN, ISO’s member for Germany.
It is available from your national ISO member or the ISO Store.
1) Forbes - IT Security: Get The Optimal Level With A Management Policy That Points To The User