Lesson 3 Flashcards

(21 cards)

1
Q

What does ISO 27005 provide guidelines for?

A

Information security risk management aligned with ISO 27001’s ISMS requirements

It does not prescribe a single risk management method but promotes a continual and systematic process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the core components of ISO 27005 risk management?

A
  • Context Establishment
  • Risk Assessment
  • Risk Treatment
  • Communication and Consultation
  • Monitoring and Review

These components form the foundation for effective risk management processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is involved in the Context Establishment component?

A
  • Define organizational and risk management context
  • Set risk evaluation criteria
  • Clarify asset identification and risk ownership
  • Ensure consistent risk assessment foundation

This step is crucial for understanding the environment in which risks are managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the steps in the Risk Assessment component?

A
  • Risk Identification
  • Risk Analysis
  • Risk Evaluation
  • Maintain a risk register

These steps help prioritize and rank risks based on their likelihood and impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the common treatment options in Risk Treatment?

A
  • Risk mitigation
  • Risk avoidance
  • Risk transfer
  • Risk acceptance

Each option addresses risk in different ways, depending on the organization’s risk appetite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Communication and Consultation involve in risk management?

A
  • Engage stakeholders continuously
  • Communicate risk-related information clearly
  • Ensure cooperation and awareness

Effective communication is essential for the success of the risk management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of Monitoring and Review in risk management?

A
  • Continuously monitor risks and controls
  • Adapt to changes in threat landscape
  • Conduct periodic reviews

This ensures that risk management remains effective and relevant over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Risk Management Process Flow?

A
  • Establish Context
  • Identify Risks
  • Analyze Risks
  • Evaluate Risks
  • Treat Risks
  • Monitor and Review
  • Repeat

This iterative process helps organizations manage risks effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the risk assessment methods mentioned?

A
  • Qualitative
  • Quantitative
  • Semi-Quantitative

These methods provide different approaches to assessing risk based on available data and analysis techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should be considered in Risk Treatment regarding existing controls?

A
  • Review effectiveness of existing controls
  • Assess control costs and business benefits

This ensures that new controls are necessary and effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does ISO 27005 integrate with ISMS?

A
  • Links tightly with ISO 27001 ISMS requirements
  • Informs the Statement of Applicability
  • Aligns security controls with business objectives

This integration is crucial for compliance and effective risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of risk owners in ISO 27005’s risk management process?

A

Risk owners are responsible for making decisions about how risks to their assets are treated, ensuring that risk treatment plans are appropriate, approving control implementations, and formally accepting residual risks. They provide accountability and alignment between risk treatment and business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does ISO 27005 define and use ‘risk acceptance criteria’?

A

Risk acceptance criteria are organization-specific thresholds that establish the conditions under which a risk can be tolerated without further treatment. These criteria are used throughout the risk evaluation process to prioritize which risks require action and which are acceptable to the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why does ISO 27005 encourage continual, iterative risk assessment instead of a one-time effort?

A

Because business environments, regulatory requirements, and threat landscapes evolve, a continual risk management approach ensures that new threats and vulnerabilities are addressed in real time, and controls remain relevant and effective, not obsolete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the importance of establishing a repeatable and consistent risk assessment methodology across the organization?

A

Consistency in risk assessment ensures comparability between different assessments, minimizes subjective bias, allows aggregation for enterprise-wide reporting, and meets compliance requirements by showing a systematic and objective approach to risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the relationship between ISO 27005 risk assessment and the asset inventory.

A

A current and comprehensive asset inventory forms the foundation of risk identification, ensuring that all organizational assets—hardware, software, data, people, processes—are considered and evaluated for potential threats and vulnerabilities.

17
Q

What is risk avoidance under ISO 27005, and when should it be used?

A

Risk avoidance means eliminating activities, projects, or systems that bring unacceptable risk, rather than trying to control the risk itself. It should be considered when the potential impact or likelihood of a risk exceeds the organization’s risk appetite and mitigation or transfer is not feasible or cost-effective.

18
Q

How are risk analysis and risk evaluation distinguished in ISO 27005?

A

Risk analysis determines the level of risk by assessing the likelihood and potential impact of threats. Risk evaluation compares these risk levels against the risk acceptance criteria to decide which risks must be further treated or can be accepted as is.

19
Q

What challenges may organizations face when implementing ISO 27005?

A

Common challenges include: lack of top management support, insufficient or inconsistent asset inventories, unclear assignment of risk ownership, subjective or ad hoc risk analysis, difficulties in collecting risk data, and complexity in aligning controls with evolving threats and business processes.

20
Q

Why is stakeholder communication emphasized throughout the ISO 27005 risk process?

A

Stakeholder communication ensures mutual understanding of risks and treatments, builds buy-in for recommendations, ensures risk assumptions are accurate, and helps create a culture of transparency and proactive engagement in risk management across the business.

21
Q

What are typical outputs produced at each phase of the ISO 27005 risk management process?

A

Typical outputs include: the risk context statement, risk register (for identification, analysis, evaluation results), risk treatment plans, records of risk acceptance/transfer/mitigation actions, and monitoring reports showing the ongoing effectiveness and status of risk management.