What is the ISO/IEC 27008 Guideline About?

Security policy and preparedness has become an integral part of the FCC requirements on Service Providers. These cybersecurity requirements are being tied to the grant process that so many service providers count on to keep their networks current to both technology and bandwidth needs of their end users. The FCC has been bringing these issues into the picture for some time now. The good news is that part of the BEAD process includes spending allowances on Cyber Plans.

There are several requirements associated with this, and the following is part of the picture. This is both for me and the reader to understand the key components of these specifications/publications in a swift way without over summarizing, nor diving too deep. I encourage the reader to get the actual documents, links for which are provided.

This document is available here: https://www.iso.org/standard/67397.html and costs around $246!


ISO/IEC 27008, “Information technology — Security techniques — Guidelines for the assessment of information security controls,” serves as a complementary document to the ISO/IEC 27000 family of standards, specifically designed to assist auditors and organizations in evaluating the effectiveness of information security controls. This document is particularly valuable for those looking to ensure that their information security management system (ISMS), as outlined by ISO/IEC 27001, is not only properly implemented but also effective in managing and mitigating risks to information security.


ISO/IEC 27008 provides guidance on assessing the implementation and effectiveness of information security controls, regardless of whether those controls are derived from ISO/IEC 27002, customized by the organization, or mandated by external requirements. The standard aims to enhance the confidence of stakeholders in the assurance and effectiveness of an organization’s information security posture.

Objective and Scope

The primary objective of ISO/IEC 27008 is to facilitate a systematic approach for the assessment of information security controls, ensuring they are appropriately implemented and effective in their operation. It targets auditors and organizations looking to conduct such assessments, offering a structured methodology that can be applied to various types of information security controls, including technical, physical, and administrative measures.

The scope of this standard encompasses all aspects of information security control assessment, including planning and conducting the assessment, as well as reporting on the assessment findings. It applies to auditors internal to the organization, external auditors, and others involved in the review or assessment process of information security controls.

Core Principles

ISO/IEC 27008 is built on several core principles that guide the assessment of information security controls:

  • Risk-Based Approach: The assessment should be driven by the organization’s risk assessment outcomes, focusing on controls that are critical to managing identified risks.
  • Objectivity: Assessors should maintain objectivity throughout the assessment process to ensure that findings and conclusions are unbiased and based on evidence.
  • Competence: Assessors must possess the necessary knowledge, skills, and experience to effectively evaluate the implementation and effectiveness of information security controls.
  • Systematic Process: The assessment process should be methodical and repeatable, ensuring consistency and reliability of the assessment outcomes.

Requirements and Guidelines

ISO/IEC 27008 delineates specific requirements and guidelines across several key areas of control assessment:

  1. Assessment Planning: Developing a comprehensive plan that defines the assessment scope, objectives, criteria, methods, and resources. The plan should also consider the risks associated with the assessment process itself.
  2. Assessment Execution: Conducting the assessment in accordance with the established plan, which involves collecting evidence, observing control operations, and interviewing personnel. Techniques such as testing, inspection, and document review are emphasized.
  3. Evaluation of Findings: Analyzing the collected evidence to determine whether the information security controls are properly implemented and effective in mitigating risks. This involves comparing the evidence against the assessment criteria to identify any discrepancies or weaknesses.
  4. Reporting: Documenting the assessment findings, conclusions, and recommendations in a clear and concise report. The report should provide actionable insights for improving the organization’s information security posture.
  5. Follow-Up: Advising on the follow-up actions based on the assessment findings, including the implementation of corrective measures and re-assessment, if necessary.

Implementation and Compliance

Organizations seeking to implement ISO/IEC 27008 should integrate its guidelines into their existing information security and risk management processes. This involves:

  • Developing or enhancing the competencies of internal and external auditors in information security control assessment.
  • Establishing procedures for planning, conducting, evaluating, and reporting on control assessments.
  • Using the assessment findings to drive continuous improvement in the organization’s ISMS.

Compliance with ISO/IEC 27008 is not certified in isolation but is considered part of the broader ISO/IEC 27001 audit and certification process. Demonstrating effective control assessment practices can significantly contribute to the overall assurance and credibility of the organization’s information security management efforts.


ISO/IEC 27008 offers a robust framework for assessing the effectiveness of information security controls, providing organizations and auditors with the guidance necessary to ensure that controls are not only in place but also effective in mitigating information security risks. By adopting the principles and guidelines outlined in this standard, organizations can enhance their information security posture, build stakeholder confidence, and ensure compliance with regulatory and contractual obligations related to information security.

Leave a Comment

Contact Us Here

Please verify.
Validation complete :)
Validation failed :(
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top