Comparison Between ISO 27005
Comparison Between ISO 27005
Comparison Between ISO 27005
The term methodology means an organized set of principles and rules that drive action in a
particular field of knowledge. A methodology does not describe specific methods; nevertheless it
does specify several processes that need to be followed. These processes constitute a generic
framework. They may be broken down in sub-processes, they may be combined, or their
sequence may change. However, any risk management exercise must carry out these processes in
one form or another; the following document compares the processes foreseen by three leading
standards (ISO 27005, NIST SP 800-30 & OCTAVE).
Risk Identification
Risk identification states what could cause a potential loss; the following are to be identified:
assets, primary (i.e. Business processes and related information) and supporting (i.e.
hardware, software, personnel, site, organization structure)
threats
existing and planned security measures
vulnerabilities
consequences
related business processes
list of asset and related business processes to be risk managed with associated list of
threats, existing and planned security measures
list of vulnerabilities unrelated to any identified threats
list of incident scenarios with their consequences.
Risk estimation has as input the output of risk analysis and can be split in the following steps:
Risk Evaluation
The risk evaluation process receives as input the output of risk analysis process. It compares each
risk level against the risk acceptance criteria and prioritises the risk list with risk treatment
indications.
NIST SP 800-30 is most suited for Technology related risk assessment aligned with common
criteria.
The risk assessment methodology encompasses nine primary steps:
Risk Mitigation
Risk mitigation, the second process according to SP 800-30, the third according to ISO 27005 of
risk management, involves prioritizing, evaluating, and implementing the appropriate risk-
reducing controls recommended from the risk assessment process.
Reduce
Retain
Avoid
Transfer
Risk and produce a risk treatment plan, that is the output of the process with the residual risks
subject to the acceptance of management.
Risk Assumption. To accept the potential risk and continue operating the IT system or to
implement controls to lower the risk to an acceptable level
Risk Avoidance. To avoid the risk by eliminating the risk cause and/or consequence
(e.g., forgo certain functions of the system or shut down the system when risks are
identified)
Risk Limitation. To limit the risk by implementing controls that minimize the adverse
impact of a threat’s exercising a vulnerability (e.g., use of supporting, preventive,
detective controls)
Risk Planning. To manage risk by developing a risk mitigation plan that prioritizes,
implements, and maintains controls
Research and Acknowledgement. To lower the risk of loss by acknowledging the
vulnerability or flaw and researching controls to correct the vulnerability
Risk Transference. To transfer the risk by using other options to compensate for the
loss, such as purchasing insurance.
OCTAVE framework
The analysis team identifies network access paths and the classes of IT components related to
each critical asset. The team then determines the extent to which each class of component is
resistant to network attacks and establishes the technological vulnerabilities that expose the
critical assets.
Risk Mitigation
Phase 3: Develop security strategy and mitigation plans (strategy and plan development) —
The analysis team establishes risks to the organisation’s critical assets based on analysis of the
information gathered and decides what to do about them. The team creates a protection strategy
for the organisation and mitigation plans to address identified risks. The team also determines the
‘next steps’ required for implementation and gains senior management’s approval on the
outcome of the whole process.
Methodology
o NIST is primarily a management system and allows for third party execution.
NIST SP 800-30 is most suited for Technology related risk assess. NIST guidance
explores more tactical, organizational issues.
o OCTAVE Method is self directed. Only organizational resources are allowed to
implement the process. Evaluation is an actual process managed by conducting
elicitation, consolidation and analysis workshops.
o ISO 27005 covers People, Process & Technology and is generally geared towards
higher-level, management practices.
Assessment Team
o NIST mentions roles in methodology but does not create an assessment team
o OCTAVE details the creation on an analysis (assessment) team comprising
representatives from both the business lines and the IT department of the
organization
o ISO 27005 mention that right persons (both technical and business people) are
involved in the risk assessment
Information Gathering/Communication
o NIST uses typical techniques for information gathering such as questionnaires,
interviews and document reviews
o OCTAVE uses a workshop-based approach to both gather information and make
decisions
o ISO 27005 uses same techniques as used in NIST SP 800 – 30 with addition to
observation of processes mentioned in organization policies.
Human Resources
o NIST does not address human resources as a possible organizational asset
o OCTAVE Method seeks to identify human resources that may be a “mission-
critical” asset with respect to IT issues
o ISO 27005 specifically covers human resource security which include employees,
contractors and third – party users.
Software Tools
o NIST relies on role definition to determine use for testing purposes
o OCTAVE uses a workshop for process 5, whose participants are primarily the
core team, to use software tools specifically for previously identified
vulnerabilities.
o ISO 27005 uses system and network audit tools for technical compliance
checking
Documentation
o NIST develops Security Requirements Checklists for the security areas of
management, operational and technical.
o OCTAVE relies upon the creation of three catalogs of information: catalog of
practices, threat profile and catalog of vulnerabilities. These catalogs then create
the baseline for the organization.
o ISO 27005 documentation covers all security controls clauses defined in ISO
27002 standard. And each clause contains a number of main security categories
based on which an organization identify applicable clauses.