Information security management system – Requirements for telecommunications (ISMS-T) |
|
For telecommunications organizations, information and the supporting processes, telecommunications facilities, networks and lines are important business assets. In order for telecommunications organizations to appropriately manage these business assets and to correctly and successfully continue their business activities, information security management is extremely necessary. This Recommendation provides the requirements on information security management for telecommunications organizations.This Recommendation specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented information security management system (ISMS) within the context of the telecommunication's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual telecommunications or parts thereof. |
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 13 (09/2018)
|
ITU-T X.1051 – Supplement on information security management users' guide for Recommendation ITU-T X.1051
|
In force
|
here
|
here
|
here
|
X Suppl. 34 (01/2019)
|
ITU-T X.1051 – Supplement on code of practice for information security controls for telecommunication organizations
|
In force
|
here
|
here
|
here
|
X Suppl. 36 (09/2021)
|
ITU-T X.1051 – Supplement on critical security controls for information and network security management by telecommunication organizations
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|