ISO/IEC 27033
ISO27k-aligned security awareness service

ISO/IEC 27033  Information technology — Security techniques — Network security (parts 1-5 published, part 6 DRAFT) Status update June 21

Introduction

ISO/IEC 27033 is a multi-part standard derived from the existing five-part network security standard ISO/IEC 18028.  It is being substantially revised, not just renamed, to fit into the ISO27k series.

Scope and purpose

“The purpose of ISO/IEC 27033 is to provide detailed guidance on the security aspects of the management, operation and use of information system networks, and their inter-connections. Those individuals within an organization that are responsible for information security in general, and network security in particular, should be able to adapt the material in this standard to meet their specific requirements.” [quoted from the FCD of 27033-1]. 

ISOI/IEC 27033 provides detailed guidance on implementing the network security controls that are introduced in ISO/IEC 27002.  It applies to the security of networked devices and the management of their security, network applications/services and users of the network, in addition to security of information being transferred through communications links.  It is aimed at network security architects, designers, managers and officers.

Both the number of parts to the standard and their scope may yet change as the standard continues to develop in parallel with  the evolution of network security.

ISO/IEC 27033-1:2009: network security overview and concepts

  • Revised and replaced ISO/IEC 18028 part 1;
  • Provides a roadmap and overview of the concepts and principles underpinning the remaining parts of ISO/IEC 27033;
  • Objective: “to define and describe the concepts associated with, and provide management guidance on, network security. This includes the provision of an overview of network security and related definitions, and guidance on how to identify and analyze network security risks and then define network security requirements. It also introduces how to achieve good quality technical security architectures, and the risk, design and control aspects associated with typical network scenarios and network ‘technology’ areas (which are dealt with in detail in subsequent parts of ISO/IEC 27033). In effect it also provides an overview of the ISO/IEC 27033 series and a ‘road map’ to all other parts”;
  • Provides a glossary of information security terms specific to networking;
  • Provides guidance on a structured process to identify and analyze network security risks and hence define network security control requirements, including those mandated by relevant information security policies;
  • Provides an overview of the controls supporting network technical security architectures and related technical controls, as well as non-technical controls plus other technical controls that are not solely related to network security (thus linking to ISO/IEC 27001, ISO/IEC 27002 and ISO/IEC 27005 plus other ISO27k standards as they are released);
  • Explains good practices in respect of network technical security architectures, and the risk, design and control aspects associated with typical network scenarios and network technology areas (expanded in subsequent parts of ISO/IEC 27033 - see below);
  • Briefly addresses the issues associated with implementing and operating network security controls, and the ongoing monitoring and reviewing of their implementation;
  • Extends the security management guidelines provided in ISO/IEC TR 13335 and ISO/IEC 27002 etc. by detailing the specific operations and mechanisms needed to implement network security controls in a wider range of network environments, providing a bridge between general information security management issues and the specifics of implementing largely technical network security controls (e.g. firewalls, IDS/IPS, message integrity controls etc.);
  • Mentions requirements such as non-repudiation and reliability in addition to the classical CIA triad (confidentiality, integrity and availability);
  • Somehow manages to provide a reasonably technical overview of network security with barely any reference to the OSI network stack!;
  • 76 pages long;
  • Status: part 1 was published in 2009.  It is currently being revised.  The revision is at DIS stage and may be published at the end of 2014 or in 2015.June 21 update

ISO/IEC 27033-2:2012 Guidelines for the design and implementation of network security

  • Revised and replaced ISO/IEC 18028 part 2;
  • Scope: planning, designing, implementing and documenting network security;
  • Objective: “to define how organizations should achieve quality network technical security architectures, designs and implementations that will ensure network security appropriate to their business environments, using a consistent approach to the planning, design and implementation of network security, as relevant aided by the use of models/frameworks. (In this context, a model/framework is used to outline a representation or description showing the structure and high level workings of a type of technical security architecture/design)” [quoted from the FCD of 27033-1];
  • Defines a network security architecture for providing end-to-end network security. The architecture can be applied to various kinds of networks where end-to-end security is a concern and independently of the network's underlying technology;
  • Serves as a foundation for detailed recommendations on end-to-end network security;
  • Covers risks, design, techniques and control issues;
  • Refers forward to later parts of ISO/IEC 27033 for more specific guidance.
  • Status: part 2 was published in 2012.

ISO/IEC 27033-3:2010 Reference networking scenarios -- threats, design techniques and control issues

  • Objective is “to define the specific risks, design techniques and control issues associated with typical network scenarios” [quoted from the FCD of 27033-1];
  • Discusses threats, specifically, rather than all the elements of risk;
  • Refers to other parts of ISO/IEC 27033 for more specific guidance;
  • Status: part 3 was published in 2010.

ISO/IEC 27033-4:2014: Securing communications between networks using security gateways

  • Revision of ISO/IEC 18028 part 3 and possibly ISO/IEC 18028 part 4;
  • Provides an overview of security gateways through a description of different architectures;
  • Guideline on securing communications between networks through gateways, firewalls, application firewalls, Intrusion Protection System [sic] etc. in accordance with a policy,  including identifying and analysing network security threats, defining security control requirements, and designing, implementing, operating, monitoring and reviewing the controls;
  • Outlines how security gateways analyse and control network traffic through:
    • Packet filtering;
    • Stateful packet inspection;
    • Application proxy (application firewalls);
    • Network address translation NAT;
    • Content analysis and filtering;
  • Guides the selection and configuration of security gateways, choosing the right type of architecture for a security gateway which best meets the security requirements of an organization;
  • Refers to various kinds of firewall as examples of security gateways.  [Firewall is a commonplace term of art that is curiously absent from ISO/IEC 27000, ISO/IEC 27002 and is not defined explicitly in this standard either];
  • Status: part 4 was published in 2014.

ISO/IEC 27033-5:2013: Securing communications across networks using Virtual Private Networks (VPNs)

  • Purpose: to provide “guidelines for the selection, implementation and monitoring of the technical controls necessary to provide network security using Virtual Private Network (VPN) connections to interconnect networks and connect remote users to networks”;
  • Extends the IT security management guidelines of ISO/IEC TR 13335 by detailing the specific operations and mechanisms needed to implement network security safeguards and controls in a wider range of network environments, providing a bridge between general IT security management issues and network security technical implementations;
  • Provides guidance for securing remote access over public networks;
  • Gives a high-level, incomplete assessment of the threats to VPNs (i.e. it mentions the threats of intrusion and denial of service but not unauthorized monitoring/interception, traffic analysis, data corruption, insertion of bogus traffic, various attacks on VPN end points, malware, masquerading/identity theft, insider threats etc., although these are mentioned or at least hinted-at later under security requirements);
  • Introduces different types of remote access including protocols, authentication issues  and support when setting up remote access securely;
  • Intended to help network administrators and technicians who plan to make use of this kind of connection or who already have it in use and need advice on how to set it up securely and operate it securely;
  • Status: part 5 was published in 2013.

ISO/IEC 27033-6: Securing wireless IP network access (DRAFT)

  • Objective: “to define the specific risks, design techniques and control issues for securing wireless and radio networks” [quoted from the FCD of 27033-1];
  • This is a generic wireless network security standard offering basic advice;
  • WD3 lists a number of “threats” which are, in fact, attack modes or risks;
  • WD3 repeatedly refers to “access network”, a curious term that is not defined.  It seems to mean “network” but without a definition, I cannot tell for sure;
  • WD3 indicates that encryption is a confidentiality and integrity control, whereas normally other cryptographic controls and protocols provide the integrity function, not encryption as such;
  • Status: at CD stage.  The completed standard should surface by the end of 2015.

ISO/IEC 27033-7+: Guidelines for securing [insert other network security aspects here] -- Risks, design techniques and control issues (possible additional parts)

Subject to New Work Item proposals being approved by SC 27, there may eventually be more parts to ISO/IEC 27033, covering “risks, design techniques and control issues” on aspects such as:

  • LANs;
  • WANs;
  • Broadband networks;
  • Voice networks;
  • Web host architectures;
  • Internet email architectures (both outgoing and incoming!); and
  • Routed access to third party organizations.

It’s also possible that some of these will be adequately covered by the first 6 parts so the extra parts may not be needed.  

Status: early days.

Copyright © 2014 IsecT Ltd.