• Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 27011 : 2009(R2014)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT GUIDELINES FOR TELECOMMUNICATIONS ORGANIZATIONS BASED ON ISO/IEC 27002

Superseded date

15-02-2020

Published date

12-01-2013

Sorry this product is not available in your region.

Provides guidelines supporting the implementation of information security management in telecommunications organizations.

Committee
CS1
DocumentType
Standard
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 27011:2016 Identical

ISO/IEC 18028-1:2006 Information technology Security techniques IT network security Part 1: Network security management
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 18028-4:2005 Information technology Security techniques IT network security Part 4: Securing remote access
ISO/IEC 18043:2006 Information technology Security techniques Selection, deployment and operations of intrusion detection systems
ISO/IEC 18028-2:2006 Information technology Security techniques IT network security Part 2: Network security architecture
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/IEC TR 18044:2004 Information technology Security techniques Information security incident management
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
ISO/IEC 18028-5:2006 Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks
ISO/IEC 18028-3:2005 Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.