top of page

ISO/IEC TS 27115

ISO/IEC TS 27115Cybersecurity evaluation of complex systems Introduction and framework overview

(DRAFT)

Abstract

ISO/IEC TS 27115 "provides the foundations and concepts for the cybersecurity evaluation of complex systems.


Two frameworks are defined:

  • The first is used to specify the cybersecurity of a complex system, including system of systems.

  • The second is used to evaluate the corresponding cybersecurity solutions.

The frameworks use basic architecture concepts:

  • to enable description of reference or solution cybersecurity architectures;

  • to support model-based, comprehensive and scalable security solutions and their evaluation; and

  • to allow for the definition of architecture-based cybersecurity profiles (ACP) and hierarchies of profiles.”


[Source: ISO.org info page]

Introduction

The standard attempts to explain how to (a) develop a security architecture (or design) for a complex system, and (b) evaluate a complex system against the architecture, using concepts and terms borrowed from the Common Criteria such as Target of Evaluation and security profile.

Scope

The formal definition of "complex system" as "a system or system of systems" is self-referential and unhelpful.  The introduction refers somewhat obtusely to complex system as:

  • The complexity of security and legislation for privacy, cybersecurity or AI (hinting, perhaps, at 'the complex system' being a computer system of some sort plus  its associated security arrangements and compliance framework); 

  • 'Scaling up towards' ecosystems, or socio-technical systems (your guess is as good as mine on that one!);

  • Systems of systems ... which apparently means subsystems or discrete systems that interact to provide services, within an environment.

Structure

Main sections:

  • 5 - Overview

  • 6 - Security architecture description - "concepts and elements supporting the framework for constructing a security architecture description"  

  • 7 - Security architecture evaluation - evaluating systems against criteria declared in their security profiles 

  • 8 - Architecture-based security profiles 

  • 9 - Composed security profiles (compilation of security profiles from individual systems comprising system-of-systems) 

  • Annex A - Architecture foundations

  • Annex B - Guidance for elaborating a security architecture

  • Annex C - Guidance for evaluating a security architecture

  • Annex D - Security example for a network infrastructure

Status

The standard development project commenced in 2023.  


It is now at Working Draft stage. 


It is due to be published in 2026 or 2027.

Commentary

This is all Greek to me, patently not my area of expertise.  It is theoretical or adademic rather than pragmatic.  It doesn't help that the Working Draft has hardly any usable references, most being replaced by "Error: Reference source not found", while what I presume are internal references within the text to particular figures (e.g. "Figure 11) or tables are completely missing (e.g. "The security process can be iterative, as shown on step H in ,"). So no clues there either.  

This page last updated:

9 December 2025

© 2025 IsecT Limited 

 

  • Link
  • LinkedIn
bottom of page