Implementing the Information Security Management System (ISMS) based on ISO/IEC 27001 for certification requirements and code of practices based on ISO/IEC 27002 become the essential approach for enterprises on managing information security. Also, the legislative and regulations are increasingly developed based on this standard. This requires the essential process to be established, so-call Information Security Risk Management.
ISO/IEC 27005 is the specific standard for Information Security Risk Management in implementing ISMS and information security controls. This standard is differential from the other standards using in IT risk and other enterprise risks. However, the main concepts and framework of ISRM are similarly to the other IT risk standards, but some more specific detail like identification of assets, vulnerabilities, threats, and selection of controls are more specific and particularized for information security controls.
Module 1: Introduction to ISMS Requirements and Risk Management
Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy