This supplement provides system and network security implementation guidelines.These guidelines can be utilized to realize a network security program. The guidelines are applicable to management, control, and user activities to secure assets belonging to infrastructure elements, network services and applications. These guidelines are independent of the underlying technology and focus on telecommunications networks security.