Bs 7799 3 2006 Open PDF
Bs 7799 3 2006 Open PDF
BRITISH STANDARD
Information security
management systems –
Licensed to Information Governance under licence number 2007JK0006©BSI
Publication history
Licensed to Information Governance under licence number 2007JK0006©BSI
Contents
Foreword ii
Introduction 1
1 Scope 4
2 Normative references 4
3 Terms and definitions 4
4 Information security risks in the organizational context 7
5 Risk assessment 9
6 Risk treatment and management decision-making 16
7 Ongoing risk management activities 21
Licensed to Information Governance under licence number 2007JK0006©BSI
Annexes
Annex A (informative) Examples of legal and regulatory
compliance 26
Annex B (informative) Information security risks and organizational
risks 30
Annex C (informative) Examples of assets, threats, vulnerabilities and
risk assessment methods 33
Annex D (informative) Risk management tools 47
Annex E (informative) Relationship between
BS ISO/IEC 27001:2005 and BS 7799-3:2006 48
Bibliography 49
List of figures
Figure 1 – Risk management process model 1
Figure C.1 – Types of assets 33
List of tables
Table C.1 – Vulnerabilities related to human resources security 41
Table C.2 – Vulnerabilities related to physical and environmental
security 42
Table C.3 – Vulnerabilities related to communications and operations
management 42
Table C.4 – Vulnerabilities related to access control 43
Table C.5 – Vulnerabilities related to systems acquisition, development
and maintenance 43
Table C.6 – Matrix with risk values 45
Table C.7 – Matrix ranking incidents by measures of risk 46
Table E.1 – Relationship between BS ISO/IEC 27001:2005
and BS 7799-3:2006 48
Summary of pages
This document comprises a front cover, an inside front cover,
pages i and ii, pages 1 to 50, an inside back cover and a back cover.
Foreword
Publishing information
This British Standard was published by BSI and came into effect on
17 March 2006. It was prepared by Technical Committee BDD/2,
Information security management.
0 Introduction
0.1 General
This British Standard has been prepared for those business managers
and their staff involved in ISMS (Information Security Management
System) risk management activities. It provides guidance and advice to
specifically support the implementation of those requirements defined
in BS ISO/IEC 27001:2005 that relate to risk management processes
and associated activities. Table E.1 illustrates the relationship between
the two documents.
Licensed to Information Governance under licence number 2007JK0006©BSI
The risk management process should be applied to the whole ISMS (as
specified in BS ISO/IEC 27001:2005), and new information systems
should be integrated into the ISMS in the planning and design stage to
ensure that any information security risks are appropriately managed.
This document describes the elements and important aspects of this risk
management process.
The information security risks need to be considered in their business
context, and the interrelationships with other business functions, such
as human resources, research and development, production and
operations, administration, IT, finance, and customers need to be
identified, to achieve a holistic and complete picture of these risks. This
Licensed to Information Governance under licence number 2007JK0006©BSI
Once the risk treatment decisions have been made and the controls
selected following these decisions have been implemented, the ongoing
risk management activities should start. These activities include the
process of monitoring the risks and the performance of the ISMS to
ensure that the implemented controls work as intended. Another activity
is the risk review and re-assessment, which is necessary to adapt the
risk assessment to the changes that might occur over time in the
business environment. Risk reporting and communication is necessary
to ensure that business decisions are taken in the context of an
organization-wide understanding of risks. The co-ordination of the
different risk related processes should ensure that the organization can
operate in an efficient and effective way. Continual improvement is an
Licensed to Information Governance under licence number 2007JK0006©BSI
1 Scope
This British Standard gives guidance to support the requirements given
in BS ISO/IEC 27001:2005 regarding all aspects of an ISMS risk
management cycle. This cycle includes assessing and evaluating the
risks, implementing controls to treat the risks, monitoring and
reviewing the risks, and maintaining and improving the system of risk
controls.
The focus of this standard is effective information security through an
ongoing programme of risk management activities. This focus is
targeted at information security in the context of an organization’s
business risks.
Licensed to Information Governance under licence number 2007JK0006©BSI
2 Normative references
The following referenced documents are indispensable for the
application of this document. For dated references, only the edition
cited applies. For undated references, the latest edition of the
referenced document (including any amendments) applies.
BS ISO/IEC 27001:2005 (BS 7799-2:2005), Information technology –
Security techniques – Information security management systems –
Requirements
3.4 risk
combination of the probability of an event and its consequence
[ISO Guide 73:2002]
3.18 threat
a potential cause of an incident, that may result in harm to system or
organization [BS ISO/IEC 13335-1:2004]
3.19 vulnerability
a weakness of an asset or group of assets than can exploited by one or
more threats [BS ISO/IEC 13335-1:2004]
The scope of the ISMS should be suitable and appropriate to both the
organization’s capability and its responsibility to provide information
security that meets the requirements determined by its risk assessment
and by appropriate legal and regulatory controls. Indeed, such a scope
is an absolute necessity for organizations seeking to claim conformity
with BS ISO/IEC 27001:2005 (see 1.2 of BS ISO/IEC 27001:2005). Also
to claim this conformity nothing should be excluded from the ISMS
scope which affects the organization’s ability, and/or responsibility, to
provide information security that meets the security requirements
determined by the risk assessment and appropriate regulatory
requirements.
Licensed to Information Governance under licence number 2007JK0006©BSI
5 Risk assessment
5.1 Risk assessment process
The assessment of information security risks includes risk analysis and
risk evaluation, and depends upon the following factors used in these
processes. The risk analysis should include:
• identification of assets (see BS ISO/IEC 27001:2005, 4.2.1 d) and
5.2 of this standard);
• identification of legal and business requirements that are relevant
for the identified assets (see 5.3);
• valuation of the identified assets, taking account of the identified
legal and business requirements and the impacts resulting from a
loss of confidentiality, integrity and availability (see 5.4);
• identification of significant threats and vulnerabilities for the
identified assets (see BS ISO/IEC 27001:2005, 4.2.1 d) and 5.5 of
the current standard); and
• assessment of the likelihood of the threats and vulnerabilities to
occur (see BS ISO/IEC 27001:2005, Clause 4.2.1 e) and 5.6 of the
current standard).
Risk evaluation should include:
• calculation of risk (see BS ISO/IEC 27001:2005, 4.2.1 e)3)
and 5.7); and
• evaluation of the risks against a predefined risk scale (see 5.8).
1)
Clause 7 of BS ISO/IEC 17799:2005 defines two specific objectives with regard
to assets: accountability for assets (in 7.1) and information classification
(in 7.2).
2) The term “owner” identifies an individual or entity that has approved
The input for the valuation of assets should be provided by owners and
users of assets, who can speak authoritatively about the importance of
assets, particularly information, to the organization and its business,
and how the assets are used to support the business processes and
objectives. In order to consistently assess the asset values, a valuation
scale for assets should be defined. More information about asset
valuation scales can be found in C.5.1.
For each of the assets, values should be identified that express the
potential business impacts if the confidentiality, integrity or availability,
or any other important property of the asset is damaged. An individual
value should be identified for each of these properties as these are
Licensed to Information Governance under licence number 2007JK0006©BSI
Based on this assessment and based on the scale that has been chosen
for the threat and vulnerability assessment (see C.5.2), the likelihood
of the threats occurring should be assessed. The overall likelihood of
an incident occurring also depends on the vulnerability of the assets,
i.e. how easily the vulnerability could be exploited. Vulnerabilities
should also be rated using the appropriate vulnerability valuation scale
(see C.5.2).
Information used to support the assessment of threat and vulnerability
likelihood is best obtained from those directly involved with the
business processes at risk. It might also be useful to use threat and
vulnerability lists (e.g. in C.2, C.3 and C.4) and links between threats
Licensed to Information Governance under licence number 2007JK0006©BSI
3) When combining asset, threat or vulnerability values, care should be taken that
no important information gets lost.
How the two contributing factors (the impact and the likelihood value)
are combined to calculate the risk is up to the organization and the
particular risk assessment method chosen. The only thing that needs to
be ensured is that the risk level increases if any of these contributing
factors increase.
The next part of the risk evaluation is to compare the calculated levels
of risk with the risk level scale that was defined when the risk
assessment method was selected. The risk levels should be expressed in
terms of loss for the business and recovery time, such as “serious
damage for the organization’s business, from which the organization
cannot recover in less than half a year”. Relating the risk levels to the
Licensed to Information Governance under licence number 2007JK0006©BSI
6.2 Decision-making
Once a risk has been assessed a business decision needs to be made as
to how the risk is to be treated. Different business circumstances will
dictate what kind of decision is made. For example, a new technology
based start-up business might accept higher risks than a traditional,
well-established organization.
The two main factors that might influence the decision are:
a) the possible impact if the risk is realized, i.e. the cost each time it
happens;
b) how frequently it is expected to happen.
These will give an indication of the loss that might be expected to occur,
if nothing is done to mitigate the assessed risk. Information security
risks can be difficult to quantify in terms of the probability of
occurrence due in part to the lack of publicly available statistics on
frequency of occurrence. The decision makers should therefore
carefully judge the accuracy and reliability of the information upon
which they are making a decision and the degree of loss which they are
willing to accept.
In addition to considering estimated losses from security incidents
(5.7), the organization will need to consider the cost of acting on the
risk treatment decision. For example, the investment needed to
implement an appropriate set of control objectives and controls as
opposed to doing nothing, and the potential cost to the organization if
something goes wrong. An organization needs to ensure that it achieves
the right balance between achieving security and the benefits of
protection, at the right investment, whilst staying profitable, successful,
efficient and competitive.
Other factors that might also influence the risk management decision
making process are:
• the willingness to accept risks (also known as the risk tolerance or
appetite for risk);
• the ease of implementation of control;
• the resources available;
• the current business/technology priorities;
• organizational and management politics.
The person or team that manages security risk should have the
following characteristics.
• Systematic and organized in their approach to monitoring known
risks and suggesting appropriate action.
• Business-focused and aware of the current state of the business
and its priorities.
• Tenacious and independently-minded but able to see opposing
points of view and accommodate them if it is best for the business.
• Able to present a case in convincing manner (e.g. a case for
expenditure to reduce a high risk);
• Able to communicate at all levels in the organization;
• Having a good understanding of risk, and security technology and
measures.
7.5 Audits
Regular internal audits should be scheduled and should be conducted by
an independent party (BS ISO/IEC 27001:2005, Clause 6). The
independent party does not need to be from outside the organization.
However, audits by an external body are essential for certification under
BS ISO/IEC 27001:2005. Internal auditors should not be under the
supervision or control of those responsible for the implementation or
daily management of the ISMS. Where internal audits discover a need
for actions to be taken to adjust the ISMS these should be fully
documented, responsibility should be assigned and a target date
determined.
Licensed to Information Governance under licence number 2007JK0006©BSI
procedures for dealing with public relations issues that might arise from
publicity about security incidents.
A.3.1 General
National Security provisions are intended to protect citizens from
threats to the critical national infrastructure arising from perils such as
terrorists (however motivated), state-sponsored intervention, or natural
disaster.
A.3.2 Europe
European provisions in this area tend not to involve statutory
instruments. Most governments have an agency, or agencies that are
Licensed to Information Governance under licence number 2007JK0006©BSI
A.4.1 General
Legislation and regulation in this area is primarily directed at publicly
traded companies, requiring them to demonstrate due diligence in the
disclosure of financial information, to manage their operational risk
transparently and to implement a series of internal controls and
procedures that will enable them to do so. The intent here is to assure
potential and current investors that they can justifiably rely on the
records of the business to present a true picture of the organization.
A.4.2 Europe
In Europe corporate governance has, in general, been seen as an issue
that is dealt with through regulations such as the Combined Code for
Internal Control (Turnbull) [3], for companies quoted on the London
Stock Exchange (LSE); the Basel II operation risk control provisions for
banks that trade internationally; and the “Financial Services Authority
(FSA) Handbook” for Banks and Financial Services Organizations in the
UK [4]. However, control of audit processes has become part of
statutory law in the UK with the 2004 Companies (Audit, Investigation
and Community Enterprise) Act [5]. The legislation and regulation’s
intent is to assure potential and current investors that they can rely on
published financial statements of the business to present a true picture.
A.5.1 General
The legislation under this heading is that which is intended to govern the
use of information technology and networked systems, particularly in
Licensed to Information Governance under licence number 2007JK0006©BSI
A.5.2 Europe
Most countries in Europe have an equivalent of the UK’s Computer
Misuse Act [7]. The EU has been active in considering the legal
framework in this area and examples include:
• Electronic Signatures Directive [8];
• Consumer Protection and Distance Selling Directive [9];
• Directive on Privacy and Electronic Communications [10];
• Council of Europe, Convention on CyberCrime.
A.6.1 General
Instruments in this area are intended to identify the rights and
obligations of individuals and organizations with respect to the
collection, use, retention and disclosure of personal information.
Notification in the event of inappropriate disclosure is required.
4) Note that SOX applies to any company that is publicly-listed in the USA, which
may include companies headquartered elsewhere.
A.6.2 Europe
In the European Union all countries have implemented national
legislation on the basis of the European Union Data Protection
Directive [12].
A.8 Sector-specific
Sector-specific regulations are those targeted at specific industries,
intended to control aspects of their operation that are unique to that
sector and that might impinge on their security, or the security of the
wider public. Examples include the FDA provisions for pharmaceutical
companies and data retention laws that affect telecommunications
providers and ISPs. The regulations applicable to credit card companies
also apply to organizations dealing with these companies.
Sector-specific regulations are very important to many organizations,
but because they are so widely varied, they are not discussed in detail
here. Organizations should determine which sector-specific regulations
are relevant in the jurisdictions in which they operate, and factor them
into the risk evaluations.
Security [19] states the need for “... much greater emphasis on security
by governments, businesses, other organizations and individual users
who develop, own, provide, manage, service, and use information
systems and networks”. This greater emphasis is reflected in worldwide
regulatory and legal instruments that place requirements on
organizations to improve the management of the confidentiality,
availability and integrity of their information throughout the business
process. As a result, all businesses that use any form of information
processing facilities, such as IT or the Internet, have a significant role
to play in the management of information security.
Organizations of any size have a number of processes, some
internally-facing and some externally-facing. In small organizations a
number of these processes could be carried out by the same team or
even the same person (see also the relationship between roles and
responsibilities for organizational processes and assets described in
Annex D). As information risk assessment is a responsibility of the
whole organization, all parts of a business need to identify the
information assets that are critical to their ability to function, and
should ensure that the related risks are assessed and the appropriate
security controls are implemented and maintained to manage the
identified risks. However, certain risks are specific to certain types of
organizational processes, and examples of these are described later in
this annex.
B.1.2 Externally-facing organizational processes
Risks specific to particular externally-facing organizational processes
are as follows.
• Sales and marketing. These activities are a vital interface
between an organization and the public. In any organization, there
is potential risk from failure to protect the confidentiality of
sensitive information during sales and marketing operations and of
damaging the reputation of the organization through failure to
ensure the accuracy and availability of information.
• Production and operations. Information used by the production
and operations processes needs to be highly accurate and
consistent, and available when required. The risks of failure should
be clearly identified and addressed for those assets that are critical
to the production and operations processes.
• Customer service. This process requires accurate information
that is available when required. The consequences of failure are
damage to the reputation of the organization, and consequent loss
of business.
• falsification of records;
• fire;
• flooding;
• fraud;
• hardware failure;
• hurricane;
• introduction of unauthorized or untested code;
• illegal import/export of software;
• illegal use of software;
Licensed to Information Governance under licence number 2007JK0006©BSI
• industrial action;
• information leakage;
• information security incidents;
• interception;
• interference;
• interruption to business activities and processes;
• lightning;
• loss of integrity;
• loss of records;
• loss of service;
• maintenance error;
• malfunctions of supporting utilities;
• malicious code;
• masquerading of user identity;
• misuse of audit tools;
• misuse of information processing facilities;
• misuse of resources or assets;
• network access by unauthorized persons;
• operational support staff error;
• power fluctuation;
• security failure;
• software failure;
• system failure;
• system misuse (accidental or deliberate);
• theft;
• unauthorized access;
• unauthorized access to audit logs;
• unauthorized access to audit tools;
• unauthorized modification of audit logs;
• unauthorized or unintentional modification;
• unauthorized physical access;
C.3.1 General
The following illustrates by example how the various threats given
earlier in this annex relate to selected control objectives given in
BS ISO/IEC 17799:2005.
• bomb attack;
• earthquake;
• environmental contamination (and other forms of natural or
man-made disasters);
• flooding;
• hurricane;
• industrial action;
• interference;
• theft;
• unauthorized physical access;
• wilful damage.
• interference;
• interruption of activities;
• lightning;
• maintenance error;
• malfunctions of supporting utilities;
• malicious code;
• power fluctuation;
• theft;
• unauthorized physical access;
Licensed to Information Governance under licence number 2007JK0006©BSI
• user error;
• vandalism;
• wilful damage.
• acts of terrorism;
• disasters (natural or man-made);
• destruction of the business continuity;
• plans;
• fire;
• errors;
• equipment failure;
• information security incidents;
• interruption to business activities and processes;
• loss of service;
• security failure;
• system failure;
• theft;
• unavailability.
C.3.5 Compliance
C.3.5.1 Compliance with legal requirements
NOTE This subclause corresponds to BS ISO/IEC 17799:2005, Clause 15.
Objective: To avoid breaches of any law, statutory, regulatory or
contractual obligations, and of any security requirements. The design,
operation, use, and management of information systems may be
subject to statutory, regulatory, and contractual security
requirements.
C.4.1 General
The following lists give examples for vulnerabilities in various security
areas, including examples of threats, which might exploit these
vulnerabilities. The lists can provide help during the assessment of
vulnerabilities.
It is emphasized that other threats could also exploit these
vulnerabilities.
An organization should define its own limits for the asset valuation
scale. It is entirely up to the organization to decide what is considered
as being a low or a high damage. A damage that might be disastrous for
a small organization could be low or even negligible for a very large
organization.
The asset valuation scales should address confidentiality, integrity or
availability, or any other important property5) of the asset if damaged.
Giving interpretations of the asset valuations in terms that are
appropriate to the respective audience is vital in obtaining relevant
information and well-focused input into the valuation process, e.g. from
asset owners and users.
C.5.3 Matrix using asset values and values for threats and
vulnerabilities
The asset values, and the threat and vulnerability levels, are matched in
a matrix such as that shown in Table C.6, to identify for each
combination the relevant measure of risk. When linking the asset values
and the threats and vulnerabilities together, consideration needs to be
given to whether the threat/vulnerability combination could cause
problems to confidentiality, integrity and/or availability. Depending on
the results of these considerations, the appropriate asset value(s)
should be chosen, i.e. the one that has been selected to express the
impact of a loss of confidentiality, or the one that has been selected to
express the loss of integrity, or the one chosen to express the loss of
availability.
Using this method can lead to one, two or three risks for each of the
assets, depending on the particular threat/vulnerability combination
considered. If additional properties are used (see also C.1), there might
be even more than three risks calculated for each of the assets and each
threat/vulnerability combination. In this example, the risk values are on
a scale of 1 to 8.
Table C.6 Matrix with risk values
Level of vulnerability
L M H L M H L M H
0 0 1 2 1 2 3 2 3 4
1 1 2 3 2 3 4 3 4 5
2 2 3 4 3 4 5 4 5 6
3 3 4 5 4 5 6 5 6 7
4 4 5 6 5 6 7 6 7 8
A matrix or table can be used to relate the factors of impact (asset value)
and likelihood of incident occurrence (threats and vulnerabilities
coming together to cause a particular incident). The first step is to
evaluate the impact (asset value) on a predefined scale, e.g. 1 to 5 of
each asset (column b in Table C.7). The second step is to evaluate the
likelihood of incident occurrence on a predefined scale, e.g. 1 to 5 of
each incident (column c in Table C.7). The third step is to calculate the
measure of risk by multiplying b by c. Finally the incidents can be
ranked in order of their exposure factor. It should be noted that in this
example, 1 is taken as being the lowest impact and the lowest likelihood
of occurrence.
Table C.7 Matrix ranking incidents by measures of risk
Incident desciptor Impact (asset) value Likelihood of Measure of risk (d) Incident ranking (e)
(a) (b) occurrence (c)
Incident A 5 2 10 2
Incident B 2 4 8 3
Incident C 3 5 15 1
Incident D 1 3 3 5
Incident E 4 1 4 4
Incident F 2 4 8 3
Bibliography
Standards publications
For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any
amendments) applies.
BS EN ISO 9001, Quality management systems – Requirements
ISO Guide 73:2002, Risk management – Vocabulary – Guidelines for
use in standards
BS ISO/IEC 13335-1:2004, Information technology – Security
Licensed to Information Governance under licence number 2007JK0006©BSI
Revisions
British Standards are updated by amendment or revision. Users of British Standards
should make sure that they possess the latest amendments or editions.
It is the constant aim of BSI to improve the quality of our products and services.
Licensed to Information Governance under licence number 2007JK0006©BSI
Buying standards
Orders for all BSI, international and foreign standards publications should be
addressed to Customer Services. Tel: +44 (0)20 8996 9001.
Fax: +44 (0)20 8996 7001. Email: [email protected]. Standards are also
available from the BSI website at http://www.bsi-global.com.
In response to orders for international standards, it is BSI policy to supply the BSI
implementation of those that have been published as British Standards, unless
otherwise requested.
Information on standards
BSI provides a wide range of information on national, European and international
standards through its Library and its Technical Help to Exporters Service. Various
BSI electronic information services are also available which give details on all its
products and services. Contact the Information Centre. Tel: +44 (0)20 8996 7111.
Fax: +44 (0)20 8996 7048. Email: [email protected].
Subscribing members of BSI are kept up to date with standards developments and
receive substantial discounts on the purchase price of standards. For details of these
and other benefits contact Membership Administration. Tel: +44 (0)20 8996 7002.
Fax: +44 (0)20 8996 7001. Email: [email protected].
Information regarding online access to British Standards via British Standards
Online can be found at http://www.bsi-global.com/bsonline.
Further information about BSI is available on the BSI website at
http://www.bsi-global.com.
Copyright
Copyright subsists in all BSI publications. BSI also holds the copyright, in the UK, of
the publications of the international standardization bodies. Except as permitted
under the Copyright, Designs and Patents Act 1988 no extract may be reproduced,
stored in a retrieval system or transmitted in any form or by any means – electronic,
photocopying, recording or otherwise – without prior written permission from BSI.
This does not preclude the free use, in the course of implementing the standard, of
necessary details such as symbols, and size, type or grade designations. If these
details are to be used for any other purpose than implementation then the prior
written permission of BSI must be obtained.
389 Chiswick High Road Details and advice can be obtained from the Copyright & Licensing Manager.
London Tel: +44 (0)20 8996 7070. Fax: +44 (0)20 8996 7553.
W4 4AL Email: [email protected].