PRICES include / exclude VAT
Homepage>BS Standards>03 SOCIOLOGY. SERVICES. COMPANY ORGANIZATION AND MANAGEMENT. ADMINISTRATION. TRANSPORT>03.100 Company organization and management>03.100.70 Management systems>BS EN ISO/IEC 27011:2020 Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Sponsored link
immediate downloadReleased: 2020-06-11
BS EN ISO/IEC 27011:2020 Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations

BS EN ISO/IEC 27011:2020

Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations

Format
Availability
Price and currency
English Secure PDF
Immediate download
292.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
29.28 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
87.84 EUR
English Hardcopy
In stock
292.80 EUR
Standard number:BS EN ISO/IEC 27011:2020
Pages:42
Released:2020-06-11
ISBN:978 0 539 06989 1
Status:Standard
DESCRIPTION

BS EN ISO/IEC 27011:2020


This standard BS EN ISO/IEC 27011:2020 Information technology. Security techniques. Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations is classified in these ICS categories:
  • 03.100.70 Management systems
  • 35.040 Character sets and information coding
  • 35.030 IT Security

The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security controls in telecommunications organizations.

The adoption of this Recommendation | International Standard will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant security property.