NF ISO/IEC 27005
Information technology - Security techniques - Information security risk management
ISO/IEC 27005:2011 provides guidelines for information security risk management.It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2011.ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
ISO/IEC 27005:2011 provides guidelines for information security risk management.
It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2011.
ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
ISO/IEC 27005:2008 provides guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of ISO/IEC 27005:2008. ISO/IEC 27005:2008 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.
This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of this document. This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that can compromise the organization's information security.
-
1 Domaine d'application1
-
2 Références normatives1
-
3 Termes et définitions1
-
4 Structure de la présente Norme internationale6
-
5 Contexte6
-
6 Présentation générale du processus de gestion des risques en sécurité de l'information7
-
7 Établissement du contexte11
-
7.1 Considérations générales11
-
7.2 Critères de base12
-
7.3 Domaine d'application et limites13
-
7.4 Organisation de la gestion des risques en sécurité de l'information14
-
8 Appréciation des risques en sécurité de l'information15
-
8.1 Description générale de l'appréciation des risques en sécurité de l'information15
-
8.2 Identification des risques16
-
8.3 Analyse des risques20
-
8.4 Évaluation des risques23
-
9 Traitement des risques en sécurité de l'information24
-
9.1 Description générale du traitement des risques24
-
9.2 Réduction du risque26
-
9.3 Maintien des risques28
-
9.4 Refus des risques28
-
9.5 Partage des risques28
-
10 Acceptation des risques en sécurité de l'information28
-
11 Communication et concertation relatives aux risques en sécurité de l'information29
-
12 Surveillance et revue du risque en sécurité de l'information30
-
12.1 Surveillance et revue des facteurs de risque30
-
12.2 Surveillance, revue et amélioration de la gestion des risques31
- Annexe A (informative) Définition du domaine d'application et des limites du processus de gestion des risques en sécurité de l'information33
- Annexe B (informative) Identification et valorisation des actifs et appréciation des impacts39
- Annexe C (informative) Exemples de menaces types50
- Annexe D (informative) Vulnérabilités et méthodes d'appréciation des vulnérabilités52
- Annexe E (informative) Approches d'appréciation des risques en sécurité de l'information57
- Annexe F (informative) Contraintes liées à la réduction du risque64
- Annexe G (informative) Différences de définitions entre l'ISO/IEC 27005:2008 et l'ISO/IEC 27005:201166
- Bibliographie77
The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.
The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.
With Requirements, quickly access the main part of the normative text!

At a glance, you will be able to identify the additions, deletions or modifications to a text, table, figure and formula.

The Redlines + service is offered to you on the collection of French standards in force, in French language and in HTML and PDF format.
For an overview of the service, click on View a standard in redline format
COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.
Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!
Request your free, no-obligation live demo
I discover COBAZ