ISO IEC 27033-3-2010 PDF
Name in English:
St ISO IEC 27033-3-2010
Name in Russian:
Ст ISO IEC 27033-3-2010
Original standard ISO IEC 27033-3-2010 in PDF full version. Additional info + preview on request
Full title and description
Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues (ISO/IEC 27033-3:2010). Guidance on security threats, design techniques and control issues mapped to common reference networking scenarios to support selection and documentation of technical security architecture and controls.
Abstract
ISO/IEC 27033-3:2010 describes threats, design techniques and control issues for a set of reference network scenarios. For each scenario it provides detailed guidance on relevant security threats and the technical design techniques and controls to mitigate the associated risks. The standard is intended to be used alongside ISO/IEC 27033-2 and other parts of the 27033 series when reviewing, selecting and documenting preferred network security architectures and controls.
General information
- Status: Published (International Standard; edition 1).
- Publication date: December 2010 (ISO publication December 3, 2010; edition 1, 2010-12).
- Publisher: ISO/IEC (JTC 1/SC 27 joint publication).
- ICS / categories: 35.030 (IT security).
- Edition / version: Edition 1 (2010).
- Number of pages: 30 (ISO published PDF length).
Scope
The standard provides technical guidance for evaluating threats and selecting network security design techniques and controls for common networking scenarios. It is aimed at helping organisations review technical security architecture/design options and document their chosen network security architecture and related controls, drawing on other parts of the 27033 series where detailed technical treatments exist.
Key topics and requirements
- Reference networking scenarios (examples of typical enterprise, remote-access, inter-site and demilitarised zone deployments).
- Threat analysis for each scenario, including common attack vectors relevant to network topology and services.
- Security design techniques (segmentation, defence-in-depth, secure management, strong authentication, encryption, firewall and gateway placement).
- Control issues and selection guidance for technical controls appropriate to each scenario.
- How to map scenario-specific guidance to ISO/IEC 27033‑2 and to parts 4–6 to avoid duplication.
- Advice for documenting chosen architecture and controls to support risk treatment decisions and operational implementation.
Typical use and users
Used by network architects, security engineers, system designers, IT managers, security consultants and auditors to inform secure network architecture, design decisions and control selection. Also useful to technical teams implementing network controls and to organisations formalising network security designs within an information security management system.
Related standards
Other parts of the ISO/IEC 27033 network security series (Part 1: overview and concepts; Part 2: design and implementation guidelines; Part 4–6: technology-specific guidance), plus related ISO/IEC 27000-series standards such as ISO/IEC 27001 (ISMS requirements), ISO/IEC 27002 (security controls guidance), ISO/IEC 27005 (risk management) and related guidance like ISO/IEC 27017/27018 where cloud and privacy-related communications controls are relevant.
Keywords
network security, network architecture, security design, threats, controls, reference scenarios, segmentation, VPN, DMZ, ISO/IEC 27033
FAQ
Q: What is this standard?
A: ISO/IEC 27033-3:2010 is Part 3 of the ISO/IEC 27033 series providing guidance on reference networking scenarios and the threats, design techniques and control issues associated with those scenarios.
Q: What does it cover?
A: It covers scenario‑based threat descriptions, technical design techniques and control issues to help select and document appropriate network security architectures and controls for typical network deployments.
Q: Who typically uses it?
A: Network architects, security engineers, IT managers, consultants and auditors use it when designing, reviewing or documenting secure network architectures and choosing technical controls.
Q: Is it current or superseded?
A: The document was published in December 2010 (edition 1). It was reviewed and confirmed by ISO in subsequent systematic reviews and, as of March 2, 2026, the 2010 edition remains the published ISO edition; organisations should check their national standards body or ISO store for any national adoptions or amendments when confirming applicability.
Q: Is it part of a series?
A: Yes — it is Part 3 of the ISO/IEC 27033 series (network security). The series includes Part 1 (overview), Part 2 (guidelines for design and implementation) and technology/topic-specific parts (4, 5, 6, etc.).
Q: What are the key keywords?
A: Network security, network architecture, reference scenarios, threats, design techniques, controls, segmentation, VPN, DMZ, ISO/IEC 27033.