ISO 27032 - The Internet Security companion to ISO 27001
Information Security is the protection of 'Confidentiality', 'Integrity', and 'Availability' of Information in General and that is what ISO 27001 is all about. ISO 27001 is about establishing an ISMS which ensures 'Confidentiality', 'Integrity', and 'Availability'.
ISO 27032 is about 'Cybersecurity'[2012] or 'Internet Security'[2023]. Cybersecurity is defined as the protection of privacy, integrity, and accessibility of data information in the Cyberspace or Internet. ISO/IEC 27032 as an international standard provides a policy framework to address the establishment of trustworthiness, collaboration, exchange of information, and technical guidance for system integration between stakeholders in cyberspace.
The 2023 version of ISO/IEC 27032 addresses Internet security i.e. “protecting Internet-related services and related ICT systems and networks as an extension of network security”.
When it comes to safeguarding our digital world, Internet security and cybersecurity work hand in hand. They are closely intertwined disciplines that aim to protect systems and online environments from various threats and vulnerabilities. Internet security focuses specifically on securing Internet access and usage, tackling risks tied to online services and ICT systems. Cybersecurity, on the other hand, covers a wider spectrum. It encompasses Internet security as a crucial part of its scope. This comprehensive approach safeguards systems connected to the Internet—covering hardware, software, programs, and data—from potential attacks. Within cybersecurity, various disciplines such as Internet security, network security, and data protection are effectively addressed.
ISO 27032 defines "Cyberspace" as “a complex environment resulting from the interaction of people, software, and services on the internet by means of technology devices and networks connected to it, which does not exist in any physical form.”
ISO 27032 is a complimentary standard to ISO 27001 that focuses on cybersecurity. ISO 27032 is not a standard that you can be certified in. It is a set of controls that should be implemented alongside ISO 27001 to help protect your organization in cyberspace. ISO 27032 is closely related to ISO 27001 but the difference is that ISO 27001 sets requirements to establish an ISMS whereas ISO 27032 aims to provide a guide for cybersecurity focussing on security domains in cyberspace.
Firstly it is recommended that organizations implement an ISMS using ISO 27001 and then additionally organizations can implement the additional controls of ISO 27032 to secure cyberspace. If an organization is ISO 27001 compliant, the technical controls for cyber security will be easier to apply.
The 2012 version of ISO 27032 [Information Technology — Security Techniques — Guidelines for Cybersecurity] provides guidance for improving the posture of an organization’s cybersecurity and is particularly focused on:
The 2023 version of ISO 27032 [Cybersecurity — Guidelines for Internet security] provides guidelines for Internet Security. It provides
The new ISO 27032 focuses on risk mitigation, threats, and vulnerabilities of the Internet. The guidance provided in ISO/IEC 27032:2023 covers multiple aspects of Internet security. Not only does it highlight the significance of preserving confidentiality, integrity, and availability of information on the Internet but other properties such as authenticity, accountability, non-repudiation, and reliability as well. Compared to the 2012 version it includes a more comprehensive risk assessment and risk treatment framework for Internet security. Additionally, an annexure in ISO 27032 includes a mapping between the ISO/IEC 27032:2023 controls and ISO/IEC 27002 controls.
The standard starts with an explanation of the relationship between internet security, web security, network security, and cybersecurity and then gives a detailed overview of internet security.
Then the document details the Risk Assessment and Treatment process specific to Internet Security. The guidelines and processes provided by ISO 31000 and ISO 27005 for risk management are adopted for addressing risk management in the context of the Internet. The methodologies defined in ISO 27005 can be used for Risk Assessment and Treatment associated with the use of the Internet.
The document further describes in brief the threats and vulnerabilities of the internet and 'Attack vectors' in detail. Attack vector is a path by which an attacker can gain access to a computer in order to deliver a malicious outcome.
Finally, the ISO 27032 document describes the "Security guidelines for the Internet". Organizations need to assess the risks to the assets and select appropriate controls. Controls are implemented to reduce the likelihood and consequences of these risks. The guidelines are described in terms of below controls and organizations should refer to ISO 27002 for detailed guidelines
References
ISO 27001:2022
ISO 27032:2023
IT Support Specialist | Information Security.
7movery very good article