I trust that you had a relaxed and safe Festive season.
As I prepare for my deep dive into Information Security Audit and Risk Management, I have taken your advice and am reading ALL relevant Standards so as to ensure I can respond with confidence in respect to their importance on my journey.
I found the following Statement in the “Introduction section of ISO 27005:2018”
This document is based on the asset, threat and vulnerability risk identification method that is no longer required by ISO/IEC 27001.
There are some other approaches that can be used
Please be so kind as to provide your insight to the relevance to an ISO 27001 Risk and ISMS Implementation.
Look forward to your valued response.
If I understood correctly, you want insight into the relevance of ISO 27005 to currently ISO 27001 based ISMS’s.
Considering that, although the asset, threat, and vulnerability risk identification method are no longer mandatory for ISO 27001, it still continues to be one of the most used approaches, due to its simplicity, so you should keep the ISO 27005 standard in your read list. For other approaches for risk assessment, you should consider also reading ISO 31010, which covers other Risk assessment techniques.