Information technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
|
This Recommendation | International Standard:
a) establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security controls in telecommunications organizations based on ISO/IEC 27002;
b) provides an implementation baseline of information security controls within telecommunications organizations to ensure the confidentiality, integrity and availability of telecommunications facilities, services and information handled, processed or stored by the facilities and services.
As a result of implementing this Recommendation | International Standard, telecommunications organizations, both within and between jurisdictions, will:
a) be able to assure the confidentiality, integrity and availability of the global telecommunications facilities, services and the information handled, processed or stored within the global facilities and services;
b) have adopted secure collaborative processes and controls ensuring the lowering of risks in the delivery of telecommunications services;
c) be able to deliver information security in an effective and efficient manner;
d) have adopted a consistent holistic approach to information security;
e) be able to improve the security culture of organisations, raise staff awareness and increase public trust.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/12845 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1050-X.1079: Security management |
Approval date: |
2016-04-29 |
Identical standard: | ISO/IEC 27011:2016 (Common) |
Provisional name: | X.ism |
Approval process: | AAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[7 related work items in progress]
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 13 (09/2018)
|
ITU-T X.1051 – Supplement on information security management users' guide for Recommendation ITU-T X.1051
|
In force
|
here
|
here
|
here
|
X Suppl. 34 (01/2019)
|
ITU-T X.1051 – Supplement on code of practice for information security controls for telecommunication organizations
|
In force
|
here
|
here
|
here
|
X Suppl. 36 (09/2021)
|
ITU-T X.1051 – Supplement on critical security controls for information and network security management by telecommunication organizations
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|