Looking for ISO/IEC 17799:2005-Security techniques?

ISO/IEC 17799:2005-Security techniques

ISO/IEC 17799:2005-Security techniques
ISO/IEC 17799:2005

What is ISO/IEC 17799:2005-Security techniques -Code of practice for information security management?

ISO/IEC 17799:2005-Security techniques is an international standard that provides guidelines and best practices for establishing, implementing, maintaining, and improving information security management systems (ISMS) within an organization. The standard was originally published in 2000 and was later revised in 2005. It has since been replaced by ISO/IEC 27002:2013.

Here are some key points about ISO/IEC 17799:2005:
  • Purpose: The primary purpose of ISO/IEC 17799:2005 is to offer a comprehensive set of controls and recommendations that organizations can use to manage and enhance their information security. It is designed to help organizations protect the confidentiality, integrity, and availability of their information assets.
  • Structure: The standard is structured into various sections, each addressing different aspects of information security, such as policy and organization, asset management, access control, cryptography, physical and environmental security, and more. It provides detailed guidance on implementing security measures in each of these areas.
  • Risk Management: ISO/IEC 17799:2005 emphasizes the importance of risk management in information security. It encourages organizations to assess the risks to their information assets and to implement controls and measures to mitigate those risks effectively.
  • Compliance: While ISO/IEC 17799:2005 provides valuable guidance, it is not a certification standard. Organizations can use it as a reference to develop their own information security policies and practices. Certification to ISO/IEC 27001, a related standard, is a formal process that certifying bodies use to assess an organization’s ISMS compliance.
  • Revisions: In 2013, ISO/IEC 17799:2005 was merged with ISO/IEC 27001 (Information Security Management System standard) and became ISO/IEC 27002:2013. ISO/IEC 27002:2013 retained the content of ISO/IEC 17799:2005 but integrated it into the broader ISO/IEC 27000 series of standards for information security.

In summary, ISO/IEC 17799:2005 and its successor, ISO/IEC 27002:2013, are valuable resources for organizations looking to enhance their information security practices and ensure the protection of their sensitive data and information assets. Organizations that seek formal certification for their ISMS typically use ISO/IEC 27001 in conjunction with ISO/IEC 27002 as a basis for their security management systems.

Requirements for ISO/IEC 17799:2005-Security techniques

ISO/IEC 17799:2005-Security techniques provides guidelines and best practices for information security management. While it doesn’t specify formal requirements in the same way that ISO/IEC 27001 does, it offers recommendations and controls that organizations can consider and implement to enhance their information security practices.

Here are some key areas and recommendations covered in ISO/IEC 17799:2005:
  • Security Policy (Section 4): Organizations are encouraged to establish and maintain an information security policy. This policy should be approved by top management, communicated to all relevant personnel, and regularly reviewed and updated.
  • Organization of Information Security (Section 5): This section outlines the need to define roles and responsibilities for information security, establish clear lines of communication, and ensure that employees are aware of their security responsibilities.
  • Asset Management (Section 6): Organizations should identify information assets, determine their value and importance, and implement appropriate protection measures based on their value.
  • Human Resources Security (Section 7): This section addresses the importance of screening employees, contractors, and third-party users, as well as providing security awareness training and defining disciplinary actions for security breaches.
  • Physical and Environmental Security (Section 9): Recommendations include securing physical access to information and equipment, protecting against environmental threats, and maintaining appropriate backup and redundancy measures.
  • Access Control (Section 10): Guidelines for managing user access to systems and data, including user authentication, access control policies, and monitoring user activities.
  • Cryptography (Section 11): Recommendations for the use of encryption to protect sensitive information and communication.
  • Operations Security (Section 12): Addressing security aspects of information processing and management, including procedures for system planning and acceptance, protection against malware, and management of technical vulnerabilities.
  • Incident Management (Section 13): Recommendations for establishing an incident response plan and reporting incidents when they occur.
  • Business Continuity Management (Section 14): Guidelines for ensuring business continuity by identifying and managing risks and disruptions to the organization’s information security.
  • Compliance (Section 15): Addressing legal and regulatory compliance issues related to information security.
  • Information Security Incident Management (Section 16): Outlines the importance of responding to and managing information security incidents effectively.
  • Information Security Aspects of Business Continuity Management (Section 17): Recommendations for integrating information security into an organization’s business continuity management processes.
  • Compliance with Legal and Regulatory Requirements (Section 18): Guidance on meeting legal and regulatory obligations related to information security.

Overall, ISO/IEC 17799:2005-Security techniques does not prescribe specific requirements for certification or compliance audits. Organizations typically use it as a reference to improve their information security practices and align with industry best practices. To pursue formal certification of their information security management system (ISMS), organizations typically turn to ISO/IEC 27001, which is a certification standard with specific requirements and a framework for ISMS certification. ISO/IEC 27002 is often used alongside ISO/IEC 27001 as a reference for implementing controls and practices in line with the broader ISO/IEC 27000 series.

What are the benefits of ISO/IEC 17799:2005 ?

ISO/IEC 17799:2005-Security techniques which has been superseded by ISO/IEC 27002:2013, offers several benefits to organizations that choose to implement its guidelines and best practices for information security management. These benefits include:

  • Improved Information Security: One of the primary benefits of ISO/IEC 17799:2005 is the enhancement of an organization’s information security posture. By following its recommendations and controls, organizations can identify and address vulnerabilities, mitigate risks, and protect their sensitive information assets more effectively.
  • Compliance with Best Practices: ISO/IEC 17799:2005 is based on industry best practices and internationally recognized standards. By implementing its guidelines, organizations align their information security practices with widely accepted standards, making it easier to demonstrate their commitment to security to clients, partners, and regulatory bodies.
  • Risk Management: The standard emphasizes the importance of risk management in information security. By conducting risk assessments and implementing controls to mitigate identified risks, organizations can reduce the likelihood and impact of security incidents and breaches.
  • Protection of Reputation: Effective information security management helps protect an organization’s reputation. Demonstrating a commitment to security can enhance customer trust and confidence, which can be critical for businesses in competitive markets.
  • Legal and Regulatory Compliance: ISO/IEC 17799:2005 provides guidance on legal and regulatory compliance related to information security. This can help organizations meet their legal obligations and avoid potential fines and penalties for non-compliance.
  • Efficient Resource Allocation: The standard helps organizations allocate resources more efficiently by identifying critical information assets and focusing security efforts where they are needed most. This can lead to cost savings and a more effective use of personnel and technology.
  • Improved Incident Response: ISO/IEC 17799:2005 includes recommendations for incident management, helping organizations establish effective processes for responding to security incidents. This can reduce the impact of incidents and minimize downtime.
  • Competitive Advantage: Organizations that can demonstrate compliance with ISO/IEC 17799:2005 or its successor, ISO/IEC 27002, may gain a competitive advantage in the marketplace. Clients and partners may prefer to work with organizations that have robust information security practices in place.
  • Continual Improvement: The standard encourages organizations to regularly review and update their information security policies and practices. This promotes a culture of continual improvement and adaptability in response to evolving threats and technologies.
  • Global Recognition: ISO/IEC standards are internationally recognized, which can be particularly beneficial for organizations operating in multiple countries. Compliance with ISO/IEC 17799:2005 can help organizations establish a consistent approach to information security across their global operations.

Overall, ISO/IEC 27001 incorporates the principles of ISO/IEC 17799:2005 and provides a framework for certification audits. ISO/IEC 27002 is often used in conjunction with ISO/IEC 27001 to provide detailed controls and practices for implementing an ISMS in line with the broader ISO/IEC 27000 series.

Who needs ISO/IEC 17799:2005?

ISO/IEC 17799:2005-Security techniques has been replaced by ISO/IEC 27002:2013, is a valuable resource for a wide range of organizations and individuals who are involved in information security management and wish to establish and improve their information security practices.

Here are some groups that can benefit from ISO/IEC 17799:2005:
  • Organizations of All Sizes: ISO/IEC 17799:2005 is applicable to organizations of all sizes, from small businesses to large enterprises. It provides a framework for developing and maintaining effective information security management systems (ISMS).
  • IT Professionals: Information technology professionals, including IT managers, security officers, and network administrators, can use ISO/IEC 17799:2005 as a reference to implement security controls and best practices in their IT environments.
  • Security Managers and Officers: Information security managers and officers can benefit from the guidance in ISO/IEC 17799:2005 to establish comprehensive security policies, procedures, and practices within their organizations.
  • Risk Managers: Risk managers can use ISO/IEC 17799:2005 to identify and assess information security risks and develop strategies to mitigate those risks effectively.
  • Compliance Officers: Compliance officers can use the standard to ensure that their organizations are meeting legal and regulatory requirements related to information security.
  • Auditors and Assessors: Auditors and assessors can refer to ISO/IEC 17799:2005 when evaluating an organization’s information security practices and controls. It can serve as a basis for auditing and assessing an organization’s security posture.
  • Consultants: Information security consultants can also use ISO/IEC 17799:2005 as a framework for helping their clients improve their information security management practices.
  • Business Owners and Executives: Business owners, CEOs, and executives can benefit from understanding the principles and importance of information security outlined in ISO/IEC 17799:2005. They can use this knowledge to make informed decisions about investments in security measures and to ensure that security aligns with business goals.
  • Government and Regulatory Bodies: Government agencies and regulatory bodies can use ISO/IEC 17799:2005 as a reference when developing information security regulations and requirements.
  • Academic and Training Institutions: Educational institutions and training providers can incorporate ISO/IEC 17799:2005 into their curricula to educate future professionals in the field of information security.
  • Vendors and Service Providers: Vendors and service providers in the IT and information security industries can use the standard to align their products and services with best practices and security requirements.
It’s important to note that ISO/IEC 17799:2005 is a guidance standard rather than a certification standard. Organizations seeking formal certification of their information security management system (ISMS) typically use ISO/IEC 27001, which incorporates the principles of ISO/IEC 17799:2005 as well as provides a framework for certification audits. ISO/IEC 27002 is often used alongside ISO/IEC 27001 to provide detailed controls and practices for implementing an ISMS in line with the broader ISO/IEC 27000 series.

At last, Pacific Certifications is accredited by ABIS, you need more support with ISO/IEC 17799:2005-Information technology-Security techniques, please contact us at +91-8595603096 or support@pacificcert.com

Read About : ISO/IEC 18000

Contact us to know more about ISO/IEC 17799:2005-Security techniques

Related Certifications

Get in Touch

Email Address


Call Us