ISO/IEC 27000:2022 Terminology
ISO/IEC 27000 Information technology - Security techniques - Information security management systems is a series of international standard specifying best practice on information security management systems (ISMS). It describes management of information risks through information security controls.
First part of the series (ISO/IEC 27000:2022 Information technology - Security techniques - Information security management systems - Overview and vocabulary) specifies the terminology and concepts for ISMS, in order to promote a common understanding of cybersecurity management concepts.
Vast majority of ISO/IEC 27000 vocabulary is consistent with the terminology used by Evolveum. Following table summarizes the correspondence of ISO/IEC 27000 and Evolveum terms.
| ISO 27000 Term | Evolveum Term |
|---|---|
| access control | Access Control |
| attack | Cyberattack |
| audit | Audit |
| audit scope | Audit scope |
| authentication | Authentication |
| authenticity | Authenticity |
| competence | Competence |
| confidentiality | Confidentiality |
| conformity | Compliance |
| consequence | Consequence |
| continual improvement | Continual improvement |
| control | Control |
| control objective | Control objective |
| correction | Remediation |
| corrective action | Corrective action |
| documented information | Documented information |
| effectiveness | Effectiveness |
| event | Event |
| external context | External context |
| governance of information security | Cybersecurity governance |
| governing body | Governing body |
| information need | Information need |
| information processing facilities | Information processing facilities |
| information security | Cybersecurity |
| information security continuity | Cybersecurity resilience |
| information security event | Cybersecurity event |
| information security incident | Cybersecurity incident |
| information security incident management | Cybersecurity incident management |
| information security professional | Cybersecurity professional |
| information system | Information system |
| integrity | integrity |
| interested party | Interested party |
| internal context | Internal context |
| level of risk | Risk level |
| likelihood | Probability |
| management system | Management |
| monitoring | Monitoring |
| non-repudiation | Non-repudiation |
| nonconformity | Non-compliance |
| objective | Objective |
| organization | Organization |
| outsource | Outsourcing |
| performance | Performance |
| policy | Policy |
| process | Process |
| reliability | Reliability |
| requirement | Requirement |
| residual risk | Residual risk |
| review | Review |
| review object | Review object |
| review objective | Review objective |
| risk | Risk |
| risk acceptance | Risk acceptance |
| risk analysis | Risk analysis |
| risk assessment | Risk assessment |
| risk communication and consultation | Risk communication |
| risk criteria | Risk criteria |
| risk evaluation | Risk evaluation |
| risk identification | Risk identification |
| risk management | Risk management |
| risk management process | Risk management process |
| risk owner | Risk owner |
| risk treatment | Risk treatment |
| security implementation standard | Cybersecurity standard |
| threat | Threat |
| top management | Top management |
| vulnerability | Vulnerability |