UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ISO/IEC 27011

Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations TECHNICAL CORRIGENDUM 1

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 September 2018
Status: active
Page Count: 5
ICS Code (Presentation layer): 35.100.60

Document History

November 13, 2023
Information security, cybersecurity and privacy protection — Information security controls based on ISO/ IEC 27002 for telecommunications organizations
The scope of this Recommendation | International Standard is to provide guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of...
ISO/IEC 27011
September 1, 2018
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations TECHNICAL CORRIGENDUM 1
A description is not available for this item.
December 1, 2016
Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of...
December 15, 2008
Information technology - Security techniques - Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security management in telecommunications organizations. The adoption...
Advertisement