Define guidelines supporting the implementation of information security controls in telecommunications organizations. Adoption will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant security property.