Rec. ITU-T X.1052 (10/2020) Information security management processes for telecommunication organizations
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
     6.1 Objective
     6.2 Processes
7 Conduct risk assessment for information security
     7.1 Purpose
     7.2 Outcomes
     7.3 Guideline
8 Establish security management policy
     8.1 Purpose
     8.2 Outcomes
     8.3 Guideline
9 Define information security controls
     9.1 Purpose
     9.2 Outcomes
     9.3 Guideline
10 Implement information security controls
     10.1 Purpose
     10.2 Outcomes
     10.3 Guideline
11 Operation and maintenance for the information security controls
     11.1 Purpose
     11.2 Outcomes
     11.3 Guideline
12 Monitoring and auditing on the information security controls
     12.1 Purpose
     12.2 Outcomes
     12.3 Guideline
13 Improve information security processes and controls
     13.1 Purpose
     13.2 Outcomes
     13.3 Guideline
Bibliography