Zum Hauptinhalt springen
Standard · ISO

ISO/IEC 27005 — Information Security Risk Management

Updated on 4 min Reviewed by: Cenedril Editorial
ISO 27005ISO 27001

During the management review, the ISMS lead presents the risk register: 47 risks, likelihood and impact each on a 1-5 scale, risk owners assigned, treatment measures prioritised. Top management discusses the top-10 extract and decides on the residual risk acceptance level. Without a structured methodology this meeting quickly turns into a gut-feeling debate without repeatability.

ISO/IEC 27005:2022 provides the methodology for information security risk management in the context of an ISO 27001 ISMS. The standard is written as guidance and describes the full risk management process, from establishing the context through risk assessment to continuous monitoring.

What does the standard cover?

ISO 27005 structures the risk management process into six steps and an iterative cycle. The logic follows ISO 31000 but focuses on information security risks.

The risk management process

  • Context establishment: scope, risk acceptance criteria, method selection, stakeholder involvement.
  • Risk identification: which risk sources, threats and vulnerabilities exist? Which assets are affected, what consequences are possible?
  • Risk analysis: assessing likelihood and impact, qualitatively or quantitatively.
  • Risk evaluation: comparing analysed risks with the acceptance criteria, prioritising.
  • Risk treatment: choosing a treatment option (avoid, reduce, transfer, accept), selecting concrete controls — typically from ISO 27001 Annex A.
  • Residual risk acceptance: documented decision by the responsible management.

Running in parallel throughout:

  • Communication and consultation with stakeholders
  • Monitoring and review of risks and the effectiveness of treatment

Risk identification: two approaches

ISO 27005:2022 explicitly names two approaches that can also be combined:

  • Event-based: the starting point is plausible damage events (“what if our web shop is offline for three days?”). Top-down, well-suited to top management and risk workshops.
  • Asset-based: the starting point is the assets (asset inventory), for which threats and vulnerabilities are identified. Bottom-up, well-suited to IT teams and detailed risk registers.

In practice, mature organisations often use a hybrid: event-based top risks from workshops are supplemented with asset-based detailed risks in the register.

Risk treatment and Statement of Applicability

The controls selected during risk treatment feed into the Statement of Applicability under ISO 27001 Clause 6.1.3. ISO 27005 describes the mechanism:

  • At least one treatment option is chosen per risk.
  • For “reduce”, concrete controls are assigned — typically from ISO 27001 Annex A.
  • The SoA lists all Annex A controls with status (applicable or not) and justification.
  • The risk treatment plan documents measures, responsibilities and deadlines.

Relation to ISO 27001

ISO 27005 is not certifiable and complements ISO 27001 with methodology. ISO 27001 requires a risk management process but does not prescribe a method. Organisations that use ISO 27005 document their alignment with the standard in the risk management policy and follow its logic. During the audit, the auditor typically asks:

  • How is the risk management process documented?
  • Which risk assessment criteria have been defined?
  • How was risk identification carried out? Is a complete risk register in place?
  • How are risk owners assigned?
  • How is residual risk acceptance documented (ideally with date and signature)?

Mapping to other standards

StandardRelation to ISO 27005
ISO/IEC 27001:2022Provides the requirement for a risk management process; ISO 27005 provides the methodology
ISO 31000:2018Overarching risk management standard; ISO 27005 uses its terminology
NIST SP 800-30US counterpart for risk assessment; comparable process, different scales
FAIR (Factor Analysis of Information Risk)Quantitative methodology; compatible with ISO 27005
OCTAVE AllegroAsset-centred methodology; alternative approach with a similar outcome
BSI Standard 200-3Risk analysis for IT-Grundschutz; own methodology with modules

Implementation effort

Initial risk assessment (SME): 5-15 days. Covers asset identification, workshops with business units, assessment and treatment plan. More for widely distributed or complex business processes.

Annual update: 1-3 days of focused work plus ongoing maintenance following material changes (new systems, outsourcing, major incidents).

Risk workshops with top management: 2-4 hours before each management review, often semi-annually.

Tooling decision: Excel works for the first 1-2 years and becomes unwieldy from 100+ risks or several business units onward. At that point a dedicated risk register with links to assets, controls and incidents pays off.

Sources

Frequently asked questions

Is ISO 27005 mandatory for an ISO 27001 certification?

No. ISO 27001 requires a documented risk management process but leaves the method open. ISO 27005 offers an established methodology, plugs into audits directly and shortens discussions with auditors. Alternatives such as OCTAVE, FAIR or a custom methodology are acceptable as long as they are documented consistently.

How does ISO 27005:2022 differ from the previous version?

The 2022 revision structures the process more strictly along Plan-Do-Check-Act, integrates terms from ISO 31000 (general risk management) and drops the earlier annex example with concrete scales. The choice of method now sits explicitly with the organisation; the standard only provides the frame.

Which impact scale is typical?

In practice 4- or 5-level qualitative scales dominate, often with monetary anchoring per level (for example < 10,000 EUR, 10,000-100,000 EUR, 100,000-1M EUR, > 1M EUR). Quantitative methods such as FAIR or Monte Carlo simulation are more demanding and mainly pay off in large corporations or in an insurance context.