Iso 27016
Iso 27016
REPORT TR
27016
First edition
2014-03-01
Reference number
ISO/IEC TR 27016:2014(E)
© ISO/IEC 2014
ISO/IEC TR 27016:2014(E)
Contents Page
Foreword......................................................................................................................................................................................................................................... iv
Introduction...................................................................................................................................................................................................................................v
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references....................................................................................................................................................................................... 1
3 Terms and definitions...................................................................................................................................................................................... 1
4 Abbreviated terms............................................................................................................................................................................................... 3
5 Structure of this Document........................................................................................................................................................................ 3
6 Information Security Economic Factors........................................................................................................................................ 4
6.1 Management Decisions..................................................................................................................................................................... 4
6.2 Business Cases.......................................................................................................................................................................................... 4
6.3 Stakeholder Interests......................................................................................................................................................................... 7
6.4 Economic Decision Review............................................................................................................................................................ 8
7 Economic Objectives.......................................................................................................................................................................................... 8
7.1 Introduction............................................................................................................................................................................................... 8
7.2 Information Asset Valuations...................................................................................................................................................... 8
8 Balancing Information Security Economics for ISM......................................................................................................10
8.1 Introduction............................................................................................................................................................................................ 10
8.2 Economic Benefits.............................................................................................................................................................................. 11
8.3 Economic Costs..................................................................................................................................................................................... 11
8.4 Applying Economic Calculations to ISM.......................................................................................................................... 12
Annex A (informative) Identification of Stakeholders and Objectives for Setting Values...........................17
Annex B (informative) Economic Decisions and Key Cost Decision Factors..............................................................19
Annex C (informative) Economic Models Appropriate for Information Security................................................22
Annex D (informative) Business Cases Calculation Examples.................................................................................................26
Bibliography.............................................................................................................................................................................................................................. 31
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the national bodies
casting a vote.
In exceptional circumstances, when the joint technical committee has collected data of a different kind
from that which is normally published as an International Standard (“state of the art”, for example), it
may decide to publish a Technical Report. A Technical Report is entirely informative in nature and shall
be subject to review every five years in the same manner as an International Standard.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC TR 27016 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, IT Security techniques.
Introduction
This Technical Report provides guidelines on information security economics as a decision making
process concerning the production, distribution, and consumption of limited goods and services. Actions
for the protection of an organization’s information assets require resources, which otherwise could be
allocated to alternative non-information security related uses. The reader of this Technical Report is
primarily intended to be executive management who have delegated responsibility from the governing
body for strategy and policy, e.g. Chief Executive Officers (CEOs), Heads of Government Organizations,
Chief Financial Officers (CFOs), Chief Operating Officers (COOs), Chief Information Officers (CIOs), Chief
Information Security Officers (CISOs) and similar roles.
Information security management is often seen as an information technology only approach using
technical controls (e.g. encryption, access and privilege management, firewalls, and intrusion and
malicious code eradication). However, any application of information security is not effective without
considering a broad range of other controls (e.g. physical controls, human resource controls, policies
and rules, etc.). A decision has to be made to allocate sufficient resources to support a broad range
of controls as part of information security management. This Technical Report supports the broad
objectives of information security as provided in the ISO/IEC 27000 family of standards by introducing
economics as a key component of the decision making process.
Coupled with a risk management approach (ISO/IEC 27005[5]) and the ability to perform information
security measurements (ISO/IEC 27004[4]), economic factors need to be considered as part of information
security management when planning, implementing, maintaining and improving the security of the
organization’s information assets. In particular, economic justifications are required to ensure spending
on information security is effective as opposed to using the resources in a less efficient way.
Typically, economic benefits of information security management concern one or more of the following:
a) minimizing any negative impact to the organization’s business objectives;
b) ensuring any financial loss is acceptable;
c) avoiding requirements for additional risk capital and contingency provisioning.
Information security management may also produce benefits that are not driven by financial concerns
alone. While these non-financial benefits are important, they are usually excluded from financial based
economic analysis. Such benefits need to be quantified and included as part of the economic analysis.
Examples include:
a) enabling the business to participate in high-risk endeavours;
b) enabling the business to satisfy legal and regulatory obligations;
c) managing customer expectations of the organization;
d) managing community expectations of the organization;
e) maintaining a trusted organizational reputation;
f) providing assurance of completeness and accuracy of financial reporting.
Negative financial and non-financial economic impacts as a result of a failure by the organization to
provide adequate protection of its information assets are increasingly becoming a business issue. The
value of information security management includes identifying a direct relationship between the cost of
controls to prevent loss, and the cost benefit of avoiding a loss.
Increasing levels of competition are resulting in the need for organizations to focus on the economics of
risk.
This Technical Report supplements the ISO/IEC 27000 family of standards by overlaying an economic
perspective on protecting an organization’s information assets in the context of the wider societal
environment in which an organization operates.
1 Scope
This Technical Report provides guidelines on how an organization can make decisions to protect
information and understand the economic consequences of these decisions in the context of competing
requirements for resources.
This Technical Report is applicable to all types and sizes of organizations and provides information
to enable economic decisions in information security management by top management who have
responsibility for information security decisions.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management
systems — Overview and vocabulary
3.2
direct value
value that can be determined by a value of an identical replacement or substitute in the event of an
information asset or assets being harmed or lost
Note 1 to entry: This value is positive as long as the information asset is not harmed but seen as loss if the event
occurs.
3.3
economic factor
item or information that affects an asset’s value (3.22)
3.4
economic comparison
consideration of competing or alternative cases for the allocation of resource
3.5
economic justification
element of business case desiged to enable the allocation of resource
3.6
economic value added
measure that compares net operating profit to total cost of capital
3.7
economics
efficient use of limited resources
3.8
expected value
value estimated as an impact to the business by an information asset being harmed or lost
Note 1 to entry: This value is positive as long as the information asset is not harmed but seen as loss if the event
occurs.
3.9
extended value
expected value times the number of times that value might occur
3.10
indirect value
value that is estimated for the replacement or restoring in the event of an information asset or assets
being harmed or lost
Note 1 to entry: This value is positive as long as the information asset is not harmed but seen as negative if the
event occurs.
3.11
information security economics
efficient use of limited resources for information security management
3.12
information security management
ISM
managing the preservation of confidentiality, integrity and availability of information
3.13
loss
reduction in the value (3.22) of an asset
Note 1 to entry: In terms of information security economics (3.11), a loss may also be used in the context as a
positive value. In this document a cost is always negative unless otherwise stated.
3.14
market value
highest price that a ready, willing and able buyer will pay and the lowest price a seller will accept
3.15
net present value
sum of the present values (3.16) of the individual cash flows of the same entity
3.16
present value
current worth of a future sum of money or stream of cash flows given a specified rate of return
3.17
non economic benefit
benefit for which no payment has been made
3.18
opportunity cost
future estimated cost for a certain information security activity or activities
3.19
opportunity value
future estimated positive value gained from a certain information security activity or activities
3.20
regulatory requirements
mandatory resource demands associated with a specific market
3.21
return on investment
measurement per period rates of return on value invested in an economic entity
3.22
societal value
public distinction between right and wrong
3.23
value
relative worth of an asset to other objects or a defined absolute value
Note 1 to entry: In terms of information security economics (3.11) a value may be positive or negative. In this
document a value is always positive unless otherwise stated.
3.24
value-at-risk
VAR
summarizes the worst loss (3.13) over a target time that will not be exceeded with a given probability
Note 1 to entry: Target time for example could be 1 year and the given probability could also be referred to as
confidence level.
4 Abbreviated terms
BVM Basic Value Model
CIA Confidentiality–Integrity–Availability
organization’s ability to meet its objectives if an activity is (not) done? A business case should aim to
provide a clear answer to this question.
The business case should present a balanced cost–benefit-risk view so that the organization is aware
of the options and implications of any decision, thus enabling a basis upon which the desirability of
a given security investment can be considered to achieve the best outcomes. These implications and
options could be positive in terms of correct information security investments or negative if inadequate
investments are made.
The business case should be considered in terms of the information security investment costs against
any costs associated with risks. The key fundamental elements of the business case should provide
decision makers with sufficient information to understand:
a) The value of the information asset.
b) The potential risks to the information asset.
c) The known cost of protecting the information asset.
d) The reduction of risk in relation to applying protection.
At some point the protection costs applied to the value of the information asset will reach an optimum
balance point. This optimum point between the protection costs is when the reduction of risk that will
affect the value will be less than the cost of protection (see also model C.4).
Figure 1 symbolizes the need for the business case to include economic factors as part of the business
process.
When preparing the business case the organization needs to be mindful that resources are always finite
and that areas of concern need to be considered and prioritised dependent on the organization’s needs.
In this context, information security aspects should be founded on facts and hard data where available
and calculations should be made based on best knowledge and experience, which may include:
e) Calculation with a time-span (maximum, minimum time period, etc.).
f) Cost estimates.
g) Quotations.
h) Predictions of market values.
Further information about economic decisions and key decision factors are described in Annex B.
Other functions within an organization may have already considered these values for their own
economic calculations and should be encouraged to provide valuable input when information security
is being considered.
Further information on stakeholders and their objectives are found in Annex A.
7 Economic Objectives
7.1 Introduction
The application of economics to information security management requires appropriate data from the
information security management programme to be used as input factors in any economic decision-
making tools used by the organization. This process is straightforward for financial economic
considerations, but more difficult for non-financial consideration.
Economic decisions involve the prioritization of available limited goods and service resources to optimize
the achievement of organizational objectives. These economic decisions apply equally to information
security management as to other parts of the organization.
Annex B provides examples of information security specific decision factors for consideration when
optimising the achievement of multiple objectives. Each cost decision has the potential to influence the
achievement of information security outcomes. For example, increasing investment in risk mitigation
would allow the organization to operate at lower risk, but may not improve the organization’s
responsiveness to change.
required by the organization). When establishing a value in monetary terms this value should reflect the
business impact value of the asset if the actual criterion is compromised. For example, if a public website
is compromised in terms of integrity (meaning that the information on that website is misleading), this
may incur a certain business impact which could be expressed in monetary terms. The confidentiality
value in monetary terms on the same website is zero as the information is publicly available. If the same
website becomes unavailable, the business impact will have a different impact in monetary terms due
to external parties not being able to access the information. Thus there exists three different values for
this asset. This guidance should be considered when conducting asset valuations.
Since evaluation of intangible assets can be difficult, there are two simple approaches that could be
adopted through the use of a simple comparative scale e.g. low, medium, high or a numerical scale such
as 1-4 . This is especially suitable when values and/or costs are calculated and/or presented as a range
of values (max, min).
Economic values that may be used as an economic justification relating to tangible and intangible assets
for information security investment are categorised in Table 2.
The basic value model should be used in conjunction with the balance sheet for evaluating and presenting
conclusions of information security economics and is based on the following characteristics:
Direct values are direct economic values, such as material loss, or direct investments based on an
occurrence that can be passive or active. In this area the values can be precise.
Indirect values are extensions to the direct values and reflect the additional and more intangible values
lost or gained. The indirect values have a greater uncertainty and as such they can be within a range.
These values could include the value of lost output, increased administration, etc.
Extended values are those affected by the direct and indirect values and can be quite substantial. The
extended values have a greater range and have to be evaluated based on the same basis as direct and
indirect values, but will be affected by other factors as well such as impact on the society and/or the
organization as a whole. This could include others such as share price if relevant, etc. Extended values
here are often considered as unquantifiable values such as brand, reputation, etc. (Note extended values
are most likely to be negative but may also be positive.)
An organization should complete its valuation of its information assets by considering the different
stakeholders which include:
a) Tangible assets that comprise an organization.
b) Value of business generated by the portfolio of clients.
c) Intangible assets like information, customer perception, brand value, societal perception.
This valuation can also be graded so as to apply an appropriate combination of the relevant categories.
For example, information assets associated with an entire database of 100,000 customer records
containing personally identifiable information could be much more valuable when all organizational
(category A), stakeholder (category C) and other affected party (category B) interests are aggregated.
Valuations may also be graded based on categories of important assets. For example, a database of
100,000 customer records containing personally identifiable information would be very important to a
government department. Similarly, unpublished final accounts of a major international company would
be very sensitive, with dangers of insider trading and major international economic repercussions.
Organizations can make informed economic decisions by mapping the relationship between cost decisions
and the relative consequences. As each cost decision (e.g. on risk mitigation costs, on certification costs)
can have multiple consequences, it may be possible to represent this relationship in a table.
8.1 Introduction
A well-functioning organization needs an information security management system that ensures its
information assets remain protected from adverse events, while at the same time being available to those
who need to use such information for sustainable organizational delivery of its business objectives. The
common requirements associated with determining benefits and costs to be achieved by an organization
to meet its business objectives are typically associated with:
a) Reduction of losses (often annualized).
b) Minimizing the costs associated with making financial and other provisions for loss events
(incidents).
c) Effectiveness of the information security management programme designed to protect information
assets.
d) Efficiency of the information security programme associated with the cost of planning, designing,
implementing, maintaining and improving the programme.
Reporting and assurance procedures (including any auditing by customers, 3rd parties internal auditing
or other assurance approaches) should also be included in the costs. Similarly, costs associated with
training and maintaining awareness of people operating or using information security controls should
be included in the costs.
Costs should also cover the entire information security management programme (see ISO/IEC 27001[1])
and should be associated with a measurement of all the anticipated benefits, not just the economic
benefits (see ISO/IEC 27004[4]). This approach should be taken as it is often unrealistic to separate costs
into categories associated with economic benefits and other benefits.
Maintaining knowledge about the costs and the effectiveness of the Information security management
programme provides an additional benefit that would enable the organization to convey confidence and
trust to organizational stakeholders.
Key cost areas should be considered when assessing the Information security management programme
as shown in Table 4.
8.4.1 Overview
To achieve objectives for information security a business case has to be presented that includes
information security economics based on a calculation model, see Annex C.
An economic business rationale for information security investments should include costs, revenues
and returns, i.e. the business rationale for accepting the costs and investments involved.
As any case will be unique, a case specific approach should be considered. Information security economics
is not very different to economics used to justify investments designed to use marketing to create a sales
impact. The benefit in terms of revenues and returns are very seldom known and have to be estimated.
The business cases can be categorized into two types as described in 6.2. The application of models to a
case can be seen as a hierarchy as shown in Figure 2. The method can be applied in several layers and if
suitable, aggregated. Aggregation is easier to use in a category B business case as this has a more limited
scope.
Category A
High Level Business
Case
Category B Category B
Level 2 business case Level 2 business case
Limited Scope Limited Scope
The biggest difference when applying an economic model is that the organizational wide category (A) is
often applied “Top-Down”, while the partial category (B) has a more narrow scope applied “Bottom-Up”.
A model for the organizational wide category (A) could be supported by a more detailed model(s) if
accurate data are available. When applying the organizational wide model (A) or the partial model (B),
the accuracy of the calculation will be affected by:
a) Availability of existing information related to the economics calculation such as value of assets,
statistics, etc.
b) Available resources for the results such as time, people, finance, etc.
c) Availablity of business knowledge such as expertise, internal or external.
A simplistic approach can use categorization as the starting point and then evolve the economics
calculation based on the initial calculation.
8.4.2 Guidance
The following steps should be taken as part of ISM in order to identify the business rationale and use an
economic method, referred to as “the case”:
a) Establish Context
1) Get business based description if available.
2) Establish the scope of the case.
3) Establish the context of the case.
4) Establish the stake holders.
5) Establish who should make the business decision on the case.
6) Determine the category of the case.
b) Define assets that are affected by information security within the scope of the case such as:
1) Critical information.
2) ICT system.
3) Any other assets defined.
4) The assets’ information security value which should be listed for the assets defined.
5) The basic approach to be used for calculations including models and aggregation.
c) Determine objectives of the case.
1) Description in qualitative terms.
2) Description in quantitative terms.
3) Conclude in monetary terms.
d) Determine time.
1) How long is the case expected to have an impact on the organization:
i) Long term cases - more than one year, and if so, how many years.
ii) Short term – maximum one year.
e) Define costs for applying the case such as:
1) Short term costs (not to be used for more than a year and will have no impact on the organization
after that).
2) Investment costs (one time costs but will have an effect during the case).
3) Running costs – annual costs for the case during its time.
4) It is useful to consider costs as direct costs, indirect costs or extended costs (see also model
C.3).
f) Define benefits and value of the case such as:
1) Compliance benefits by avoiding penalties.
2) Compliance/sales opportunities by attracting new markets.
3) Image/sales opportunities by attracting new markets.
4) The positive value of risk reduction.
5) The value of increased internal efficiency.
6) The information security value of each asset if compromised.
7) Any other comparable case.
8) For value the concept of turning negative cost into opportunity value can be used (see also
Annex C).
g) Use possible interaction between cost and value
All the above may be applicable but often the context of the case means that only some of the values
apply. Information on values may also come from different,but related sources. For example, risk
reduction value may also include compliance penalties. The information security value is often also
a reflection of consequences related to risk. In practical terms many sources may be used.
A wider context case (Category A) could be applied through economic values being either broken down
in detail and then aggregated (Bottom-Up) or identified using an overview analysis method (Top-Down)
where details are estimated. The latter method is likely to contain a lot of uncertainty which may make
it invalid, while giving an impression of being precise for management making the decision on the case.
It will also be quite time consuming without providing the intended quantitative results.
The method can be implemented in stages . The method is generally an iterative process with inputs
changing as information is gathered and therefore changes are being made before a final calculation is
made. It is often easier to identify a range of input values or results than precise values. Where a range
can be used, it might be useful to document likely maximum and minimum values.
Input Positive:
a) Direct annual opportunity value, such as incident cost reduction.
b) Indirect opportunity value applied over the time of the case, such as avoiding penalties through
compliance.
c) Extended opportunity value applied over the time of the case, such as sales opportunities for new
market.
Input Negative:
d) 1. Direct annual costs, such as running costs.
e) 2. Indirect cost applied over the time of the case, such as setting up a project.
f) 3. Extended cost applied over the time of the case, such as sales loss.
See D.1 for an example (using the model mentioned in C.2 and C.5).
This could also be calculated from the assets within the scope (“Bottom-Up”) using the principle in table
two. This approach will be more accurate but is extensive work and depends on assets being defined; in
many instances this is not easily available. This refers to the “Bottom – Up” approach based on Figure 2.
A partial context case (Category B) means that all economic values have to be gathered at a detailed
level, and then aggregated (“Bottom-Up”).
The complexity of a partial category (Category B) case may vary greatly. Models D.2 and D.3 show a
narrow scope application and then a broader one.
The method can be applied in stages. It is generally an iterative process with inputs changing as
information is gathered. A final calculation cannot be made until all the changes are complete. It is often
easier to identify a range of input values or results than precise values. Where a range can be used, it
might be useful to document likely maximum and minimum values.
Input Positive:
a) CIA value of the asset/assets within the scope of the business case.
b) Define the impact on the value taking account of CIA risk.
c) Turn the negative impact to an opportunity value assuming correct information security levels
for each of the confidentiality, integrity and availability scenarios (i.e. none of the risks identified
materialise).
Input Negative:
d) Direct annual costs, such as running costs for mitigating the risk.
e) Any indirect cost applied over the time of the business case, such as setting up a project.
f) Extended cost applied over the time of the case, such as sales loss.
See D.2 for example.
A partial context business case (category B) that is very limited in scope means that all economic values
have to be gathered at a detailed level, which could then be directly applied to the case.
Construct a short analysis and select a simple method such as the negative to positive model which can
be rapidly conducted and understood (refer to C.5).
Input Positive:
a) Estimate actual or potential business impact related to information security.
b) Estimate the positive value for the activity of the business case.
c) Conclude if there are any other positive values that may occur depending on the activity and decide
if to include them or not. This will depend on the case and the information available.
Input Negative:
d) Define the direct and indirect control(s) required to mitigate the impact.
e) Define the direct and indirect costs for applying the control(s).
Conclude:
f) Establish the net value /costs.
g) Compare and decide.
See D.3.
Annex A
(informative)
A.1 Overview
The purpose of this annex is to assist organizations in understanding the wider economic impact of
their information security management programmes and related investments. There are a variety of
constituencies that could benefit from an organization’s improved information security management.
The nature and size of the economic benefit will depend on how organizations leverage the benefits they
can achieve associated with more efficient information security management.
A.6 Environmental
The proposed standard will not directly impact the environment to any significant extent.
Indirectly the proposed standard will have a positive effect on the environment because it is likely
that information critical to effective environmental management will receive better protection in
organizations that use it in association with an information security management system that may
currently be the practice.
A.7 Competition
Organizations that make good use of information security may achieve a competitive advantage over
those that do not because related risks are better managed.
Annex B
(informative)
COST DECISIONS
Ref BUSINESS OBJECTIVES Risk Mitigation Certification Risk Manage- Control Costs
Costs Costs ment Organiza-
tional Costs
A Enabling the business to participate in high Yes Yes. Yes Yes
risk endeavours, by increasing risk man- Systems with Business Business part-
agement maturity and operating at lower lower risk will partners may ners are more Controls applied are generally
risk than competitors allow participa- be influenced likely to partake a wide set of controls that
tion in a high risk to participate in higher risk affect the whole business
environment based on ventures if the such as training. Cost for each
demonstrable organization can control is dependent on the
security certi- demonstrate a controls themselves and the
fication more mature information security maturity
risk organization of the organization
COST DECISIONS
Ref BUSINESS OBJECTIVES Risk Mitigation Certification Risk Manage- Control Costs
Costs Costs ment Organiza-
tional Costs
F The annualized loss expectancy (ALE) Yes No Yes Yes
expresses the product of expectance values
(mean values) of losses as well as of occur- Risk mitigation Certifica- Increasing Controls can be applied
rence. Such a calculation of risk level does directly drives tion does not expenditure on directly to mitigate risks
not provide sufficient results for “very low expected loss directly drive operational risk
frequency / very large impact incidents” levels lower risk and organization is
at all. However, information security expected loss more likely to
controls should also cover these “very low rates reduce risks and
frequency / very high impact incidents”. expected losses
The calculation of an average expected loss
has the potential to deliver better results
than the ALE.
G Maintaining reputation and share price by Yes Yes Yes No
enabling the business to differentiate on
“trust”, e.g. by certifying to standards and Risks likely to Certification Increasing Controls directly do not con-
mitigating high impact risks that are more cause reputa- can improve expenditure on tribute to maintaining share
likely to impact reputation if they occur tional impacts reputation operational risk price. This has more to do with
can be mitigated organization can ISM and the maturity of the
improve reputa- ISMS
tion, especially
to prospective
employees
H Minimising expected operational costs of No No No No
operating information security and risk
management, e.g. by improving efficiency Mitigating risks Certifica- Increasing the Controls directly do not con-
may not cause tion is not amount spent on tribute to improving efficiency
operations to be expected to risk management related to risk management.
more efficient lower opera- is not expected This has more to do with ISM
tional costs to improve effi- and the maturity of the ISMS
ciency directly including awareness, measure-
ments, audits, etc.
I Providing assurance on the completeness Yes Yes Yes No
and accuracy of risk information and gov-
ernance reporting Increased Certification Increasing head Controls directly do not con-
investment in provides some count will allow tribute to risk and governance.
assurance is increase in increased assur- This has more to do with ISM
likely to identify process assur- ance function- and the maturity of the ISMS
ineffective risk ance ality including awareness, measure-
treatment, driv- ments, audits, etc.
ing subsequent
improvement
J Protecting staff from personal liability, e.g. Yes Yes Yes Yes
performing due diligence to avoid direc-
tors’ liability Directors could Directors may Directors may Controls of roles and responsi-
be negligent if be able to be negligent if bility for information security.
investment in demonstrate investment in
risk mitigation due diligence risk management
was inadequate by gaining is inadequate
external certi-
fication
K Meeting community expectations as an Yes Yes No No
infrastructure and service provider, by
protecting their information Risks to Certification Increasing Controls directly do not
customer infor- can be used expenditure on contribute to community
mation can be to improve risk manage- expectations. This has more to
mitigated protection ment does not do with ISM and the maturity
of customer directly result of the ISMS including aware-
information in improved ness, measurements, audits,
protection of etc. to provide feedback to the
customer infor- community
mation
L Providing employment opportunities to Yes No Yes No
the community
Spending on Certifica- Increasing Controls directly do not con-
risk mitiga- tion does not expenditure on tribute to employment oppor-
tion provides directly result risk management tunities. This has more to do
employment in employ- organization with ISM and the maturity of
opportunities for ment opportu- creates more the ISMS including awareness,
those doing the nities employment measurements, audits, etc..
mitigating opportunities
COST DECISIONS
Ref BUSINESS OBJECTIVES Risk Mitigation Certification Risk Manage- Control Costs
Costs Costs ment Organiza-
tional Costs
M Avoiding requirements for risk and audit Yes No No No
capital and additional oversight burdens by
operating within acceptable parameters Mitigating risks Certification Increasing Controls do not directly avoid
is the key means is unlikely to expenditure on risk and audit capital alloca-
of avoiding risk lead directly the risk manage- tion (unless those controls are
and audit capital to reduction ment organiza- deficient)
in risk and tion does not
audit capital lead directly to
allocation reduction in risk
and audit capital
N Avoiding impacts on external parties such Yes No No Yes
as infrastructure and service providers
Mitigation of Certifica- Increasing Controls may directly avoid
risks is likely to tion does not expenditure on impacts
reduce the risk directly result risk manage-
of impacts on in reduction ment organiza-
external parties, of impacts tion does not
infrastructure to external lead directly
and service pro- parties to reduction in
viders risk to external
parties
O Systems to manage and disseminate secu- Yes Yes No No
rity policies, procedures, etc.
Likely to reduce Part of certi- There is no Controls directly do not con-
the risks of fication audit increase in risk tribute to learning. This has
human errors scope and will management more to do with ISM and the
contribute organization maturity of the ISMS including
costs awareness, measurements,
audits, etc.
P Identity/authentication and access Yes No No Yes
management systems to control user IDs,
access rights/permissions, etc. for applica- Likely to reduce Maybe part of There is no The controls related to this
tion systems the risks of loss certification increase in risk subject apply
of confidentialty audit scope management
and integrity and organization
may increase costs
handling costs
as well as costs
of technical solu-
tions
Q Vulnerability and change management sys- Yes No No Yes
tems to help keep up to date with security
patches Likely to reduce Maybe part of There is no The controls related to this
the risks of loss certification increase in risk subject apply
of Confidentialty audit scope management
and Integrity. organization
May increase costs
handling costs
as well as costs
of technical solu-
tions
R Incidents with an estimated value sufficent Yes No Yes Yes
to justify ISMS generation which will lead
to overall savings. Provided estimates are If incidents are Maybe part of May increase The controls related to this
sufficiently conservative and rational to added to risk certification risk management subject apply
survive management challenge, reduced processes this audit scope organization
incident costs alone will typically be more will increase cost
than sufficient to justify the cost of the the complexity
ISMS even though they do not constitute but also provide
the whole business case more accurate
evaluations
S Addressing information security risks and Yes Yes Yes Yes
controls for market, legal or regulatory
reasons But this should Part of certifi- May increase Compliance controls apply
be a major part of cation risk organization
risk handling
Annex C
(informative)
Answering these questions in combination with the principle Basic Value Model, Figure C.1 will then
create a balance board with four squares as shown in Figure C.2.
The use of the model will ensure that all aspects will be covered. However there are also duplications
of values related to the same activity. This can be handled by using a simple balance table as seen in
Table C.1 below.
Referring to Table C.1, in some cases the amount in A1 is the same as in D2 and thus the negative
value/cost can be turned into a positive value when comparing the net for the two rows (1 and 2).
(If an activity is complex, further rows can be used but then the summary should still be between current
state (the possible activity not done) and when the activity is fully implemented/done.)
C.4 Generic Balance Investment for Protection Cost vs. Value Theory
The theory is that an optimum balance point can be reached by applying gradual protection costs to
value. The optimum point between the protection and value costs is when the reduction of risk that will
affect the value will be less than the cost of protection. The basic factors for the theory are:
a) The knowledge of value (which is constant)
b) The known cost of protection (which will increase depending on actions)
c) The reduction of risk in relation to applying protection (which is based on the value and how
effective the protection is)
The value and costs for protection can often be established but the reduction of risk is often an estimate.
Figure C.3 — Optimum Balance Theory between Protection Cost and Value
Annex D
(informative)
The initial calculation for the conclusion is based on estimated values without using a range.
Conclusion 1 BASE:
During the year after certification the extended value is: 3.0 M$
Sum: +1.6 M$
Conclusion 2 Range:
Second calculation for the conclusion is made based on estimated values using a range with maximum
(Max) and minimum (Min) values. The Max. values represent the highest values and lowest costs and
the Min. the lowest values and highest costs (Please see table above for changes because of range
uncertainties).
Max: During the year after certification the max extended value is: 5.00 M$
Sum: +3.88 M$
Min: During the year after certification the min extended value is: 1.00 M$
Sum: −1.35 M$
Conclusion 2 indicates that despite a more positive economic scenario there may be a situation where
the business case may turn out negative in terms of a decision based on economics. This indicates that
further analysis may be needed. The probability for the “Min” calculation should be recalculated and
possibly adding more estimates to the factors in the table to see if more values and costs may change the
negative economic result in the calculation.
The probability analysis should be the starting point as this may show clear indications that there is a
low probability which should then be included as a reason for presenting calculation 1 as the basis for
the business case.
Such an analysis could be, where the organization is not certificated, an alternative scenario provided
by the Sales and Marketing department indicates that there is a possible a decrease in sales over a
three year period by 15 %. This relates to the part of the customer base that is already asking about
ISO/IEC 27001[1] alignment. (A 15 % decrease is such a high value figure (as the negative impact is
positive value for motivating the business case) compared to the calculation 1 and 2 and shows that
further analysis will not result in any major changes.)
The business case can be presented as calculation 1 with the alternative scenario from the probability
analysis.
In the table below, the sum of costs represents the value for balancing the control costs in the next stage:
Conclusion: The net benefit of applying the training activity is +$100,000 during the three years. The
negative value/costs of not doing the activity is net – $250,000.
This calculation can serve a basis for deciding to undertake the activity and also to follow up how
correct the calculation was. If there is significant variation, further actions can be determined and
calculated. (The example may be more complicated as incidents can be further defined. It is assumed
that all incidents that are referred to in the example are user related.)
A sensitivity analysis of the calculation will consider by how much the incident impact needs to decrease
In order to reach a breakeven point. This is done by using the table in reverse on the activity done by
setting the positive value equal to the negative value/cost so that the Net = 0. The table below shows the
re-calculation of the positive value in order to get the breakeven percentage of incident reduction.
The sensitivity analysis shows that approximately only half the estimated reduction of incidents is
needed as an outcome of the training to make breakeven, i.e. covering the costs.
Bibliography
ICS 35.040
Price based on 31 pages