Information technology - Security techniques - Governance of information security |
|
Recommendation ITU-T X.1054 | International Standard ISO/IEC 27014 provides guidance on the governance of information security.
Information security has become a key issue for organizations. Not only are there increasing regulatory requirements, but also the failure of an organization's information security measures can have a direct impact on an organization's reputation.
Therefore, the governing body, as part of its governance responsibilities, is increasingly required to oversee information security to ensure that the objectives of the organization are achieved.
In addition, governance of information security provides a powerful link between an organization's governing body, executive management and those responsible for implementing and operating an information security management system.
It provides the mandate essential for driving information security initiatives throughout the organization.
Furthermore, an effective governance of information security ensures that the governing body receives relevant reporting – framed in a business context – about information security-related activities. This enables pertinent and timely decisions about information security issues in support of the strategic objectives of the organization.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/11594 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1050-X.1079: Security management |
Approval date: |
2012-09-07 |
Identical standard: | ISO/IEC 27014:2013 (Common) |
Provisional name: | X.isgf |
Approval process: | TAP |
Status: |
Superseded |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 27 (09/2016)
|
ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|