This document provides guidelines supporting the implementation of information security controls in telecommunications organizations.
The adoption of this document will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant information security property.