Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Governance & Compliance Glossary

ISO 27005 (Risikomanagement)

ISO/IEC 27005 is the international standard for information security risk management. It defines the process for risk identification, assessment, treatment, and communication as part of an ISMS in accordance with ISO 27001. ISO 27005 is a methodological guide, not a certifiable standard, and describes how risks are assessed and treated in a structured manner.

ISO/IEC 27005 is the guideline for information security risk management in the context of ISO 27001. While ISO 27001 requires that risks be assessed and addressed, ISO 27005 explains how to carry out this process in a methodologically sound manner.

The ISO 27005 Risk Management Process

1. Context Establishment

  • Define the objective of risk management
  • Determine the scope: which assets, processes, systems?
  • Define risk acceptance criteria (e.g., “Risks with a score > 15 must be treated”)
  • Identify stakeholders

2. Risk Assessment (Risk Assessment)

2a. Risk Identification

  • Inventory assets
  • Identify threats per asset
  • Identify vulnerabilities per asset
  • Record existing controls

2b. Risk Analysis

  • Likelihood: Scale 1–5
  • Impact: Scale 1-5 (Confidentiality/Integrity/Availability)
  • Risk Score = Likelihood × Impact
  • Inherent Risk (before controls) vs. Residual Risk (after controls)

2c. Risk Evaluation

  • Comparison with acceptance criteria
  • Prioritization: Which risks to address first?

3. Risk Treatment

Four options:

  • Modify (Reduce): Implement controls
  • Retain (Accept): Consciously bear the risk (documented!)
  • Avoid (Avoid): Discontinue the risky activity
  • Share (Share): Insurance, outsourcing

4. Risk Acceptance

  • Management approves the residual risk
  • Documented and signed

5. Risk Communication and Consultation

  • Communicate risks to relevant stakeholders
  • Management reporting

6. Risk Monitoring and Review

  • Regular review (at least annually)
  • Incorporate new threats and vulnerabilities

Risk Analysis Methodology in Practice

Qualitative Risk Analysis (suitable for most SMEs)

Scale of 1–5 for probability and impact; risk value = P × I (1–25).

Risk Register Example:

IDAssetThreatPIRiskMitigation
R01Production DBRansomware4520 KRBackup, Segmentation, EDR
R02Email SystemPhishing → BEC5420 KRMFA, Anti-Phishing
R03VPN GatewayRCE Vulnerability3515 HPatch Management
R04Employee PCMalware5315 HEDR, Awareness Training
R05Cloud StorageMisconfiguration3412 MCSPM, Config Review
R06WebsiteDDoS326 NCDN (accepted)

P = Probability, I = Impact; CR = Critical (>15), H = High (10-15), M = Medium (5-9), L = Low (<5)

Protection Needs Assessment (according to BSI)

  • Normal: Standard protection needs, BSI Basic Protection baseline requirements
  • High: Additional measures required
  • Very high: Increased requirements, often requiring individual analysis

Example Protection Needs Analysis:

  • Asset: Customer database
  • Confidentiality: High (GDPR-relevant data)
  • Integrity: High (incorrect customer data → damage)
  • Availability: normal (24-hour outage tolerable)
  • Result: high → increased protective measures required

Quantitative Risk Analysis (for more mature organizations)

ALE = SLE × ARO

ALE = Annualized Loss Expectancy
SLE = Single Loss Expectancy (Loss per incident)
ARO = Annual Rate of Occurrence (Frequency per year)

Example - Ransomware attack:

  • SLE = 150,000 EUR (Recovery + Downtime + Ransom demand)
  • ARO = 0.3 (30% probability this year)
  • ALE = 150,000 × 0.3 = 45,000 EUR/year

A control measure costs 10,000 EUR/year and reduces ARO to 0.05:

  • New ALE: 150,000 × 0.05 = 7,500 EUR
  • Savings: 37,500 EUR/year → Control is cost-effective

Statement of Applicability (SoA)

The SoA is the central ISO 27001 document and contains the list of all ISO 27001 Annex A controls (93 in the 2022 version).

For each control, the following is recorded:

  • Applicable (yes/no)?
  • If applicable: how implemented?
  • If not applicable: justification
  • Link to risk management: which controls address which risks?

SoA Example:

Control IDControl NameApplicableStatusImplementationRisk Reference
A.8.5Secure AuthenticationYesImplementedMFA for all admin accountsR02 (Phishing)
A.6.7Remote WorkYesImplementedVPN, MDM, policyR04 (Malware)
A.5.7Threat IntelligenceNoN/AToo small for dedicated TI-

Connection between SoA and Risk Management:

Risk R02 “Phishing → BEC” is addressed by the following controls:

  • A.6.3 Information Security Awareness (Phishing Training)
  • A.8.5 Secure Authentication (MFA)
  • A.5.15 Access Control (Least Privilege)

All three controls are marked as “applicable” in the SoA, and the risk is therefore considered addressed.