Skip to main content
Cyber security

Guidance and regulation

Skip to results
107 results sorted by Most viewed
  • We’re working to help people securely prove who they are without having to present physical documents.

  • Cyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats.

  • Good Practice Guide (GPG) 45 helps you decide how to check someone's identity.

  • A list of digital identity and attribute services certified against the UK digital identity and attributes trust framework and supplementary scheme rules

  • A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information.

  • Guidance on how digital identity providers can become certified to complete digital identity checks for the 'Right to Work', 'Right to Rent' and DBS schemes.

    First published during the 2019 to 2022 Johnson Conservative government

  • The Open Call is looking for innovative ideas to improve the defence and security of the UK. Your idea could be a concept, product or service, at various levels of maturity.

  • Find out where to report a cyber incident in the UK, Isle of Man or Channel Islands.

  • A pre-release of the updated, pre-legislative version of the UK digital identity and attributes trust framework.

  • A revised (alpha) version of the digital identity trust framework following feedback, plus an invitation to express an interest in testing the framework.

  • Register your interest in future Government-funded cyber security apprenticeships in critical national infrastructure (CNI) sectors.

  • This guidance sets out how to join the register of digital identity and attribute services.

  • An updated version of the digital identity and attributes trust framework, following testing and feedback.

  • A list of approved conformity assessment bodies for the UK digital identity and attributes trust framework certification scheme.

  • Guidance for organisations certified against the UK digital identity and attributes trust framework who offer delegated authority as part of their service.

  • Cyber Security Model information about the proportionate security controls to be implemented and evidence to be submitted as part of all MOD contracts.

  • A guide for industry about the Defence Cyber Protection Partnership (DCPP) Cyber Security Model (CSM) and the risk acceptance process.

  • This publication explores the fundamentals, threats, operations and functions of cyber.

  • UK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets.

  • Joint Doctrine Note 1/18 describes the framework that Defence will use to synchronise and coordinate cyber and electromagnetic activities at the operational level.