UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 27011

Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 December 2016
Status: active
Page Count: 40
ICS Code (Information coding): 35.040
scope:

The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security controls in telecommunications organizations.

The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant security property.

Document History

September 1, 2018
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations TECHNICAL CORRIGENDUM 1
A description is not available for this item.
ISO/IEC 27011
December 1, 2016
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of...
December 15, 2008
Information technology - Security techniques - Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security management in telecommunications organizations. The adoption...

References

Advertisement