NF ISO/IEC 27005
Information technology - Security techniques - Information security risk management
ISO/IEC 27005:2008 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2008. ISO/IEC 27005:2008 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
ISO/IEC 27005:2008 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2008. ISO/IEC 27005:2008 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
ISO/IEC 27005:2011 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2011. ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
- Avant-proposv
- Introductionvi
-
1 Domaine d'application1
-
2 Références normatives1
-
3 Termes et définitions1
-
4 Structure de la présente Norme internationale3
-
5 Contexte3
-
6 Présentation générale du processus de gestion des risques en sécurité de l'information4
-
7 Établissement du contexte7
-
7.1 Considérations générales7
-
7.2 Critères de base7
-
7.3 Domaine d'application et limites9
-
7.4 Organisation de la gestion des risques en sécurité de l'information10
-
8 Appréciation des risques en sécurité de l'information10
-
8.1 Description générale de l'appréciation des risques en sécurité de l'information10
-
8.2 Analyse des risques11
-
8.3 Évaluation du risque18
-
9 Traitement des risques en sécurité de l'information19
-
9.1 Description générale du traitement des risques19
-
9.2 Réduction du risque21
-
9.3 Maintien du risque22
-
9.4 Refus du risque23
-
9.5 Transfert du risque23
-
10 Acceptation des risques en sécurité de l'information23
-
11 Communication relative aux risques en sécurité de l'information24
-
12 Surveillance et revue du risque en sécurité de l'information25
-
12.1 Surveillance et revue des facteurs de risque25
-
12.2 Surveillance, revue et amélioration de la gestion des risques26
- Annexe A (informative) Définition du domaine d'application et des limites du processus de gestion des risques en sécurité de l'information28
-
A.1 Étude de l'organisation28
-
A.2 Liste des contraintes affectant l'organisation29
-
A.3 Liste des références législatives et réglementaires applicables à l'organisation31
-
A.4 Liste des contraintes affectant le domaine d'application31
- Annexe B (informative) Identification et évaluation des actifs et appréciation des impacts34
-
B.1 Exemples d'identification des actifs34
-
B.2 Évaluation des actifs40
-
B.3 Appréciation des impacts43
- Annexe C (informative) Exemples de menaces types45
- Annexe D (informative) Vulnérabilités et méthodes d'appréciation des vulnérabilités47
-
D.1 Exemples de vulnérabilités47
-
D.2 Méthodes d'appréciation des vulnérabilités techniques50
- Annexe E (informative) Approches d'appréciation des risques en sécurité de l'information52
-
E.1 Appréciation des risques de haut niveau en sécurité de l'information52
-
E.2 Appréciation détaillée des risques en sécurité de l'information53
- Annexe F (informative) Contraintes liées à la réduction du risque59
- Bibliographie61
The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.
The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.
With Requirements, quickly access the main part of the normative text!

COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.
Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!
Request your free, no-obligation live demo
I discover COBAZ