tag:www.gov.uk,2005:/search/guidance-and-regulation Guidance and regulation 2025-05-07T11:00:01+01:00 HM Government tag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview 2025-05-07T11:00:01+01:00 Cyber Essentials scheme: overview Cyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats. tag:www.gov.uk,2005:/government/publications/software-security-code-of-practice 2025-05-07T09:45:00+01:00 Software Security Code of Practice This Code of Practice sets out expectations for the security and resilience of software. tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-2 2025-04-29T12:02:10+01:00 Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 2 皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. 皇冠体育app general requirements common to all Open Call competitions 鈥� tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-1 2025-04-29T12:01:31+01:00 Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 1 皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. tag:www.gov.uk,2005:/government/publications/defence-and-security-accelerator-dasa-open-call-for-innovation 2025-04-29T12:00:35+01:00 Defence and Security Accelerator (DASA) Open Call for Innovation 皇冠体育app Open Call is looking for innovative ideas to improve the defence and security of the UK. Your idea could be a concept, product or service, at various levels of maturity. tag:www.gov.uk,2005:/government/publications/secure-by-design-problem-book 2025-04-24T09:52:38+01:00 Secure by Design Problem Book Lessons learnt from the 'Secure by Design' approach adopted by MOD which ensures security is designed into any project delivering capabilities or services. tag:www.gov.uk,2005:/guidance/list-of-approved-conformity-assessment-bodies 2025-04-15T10:13:10+01:00 List of approved conformity assessment bodies A list of approved conformity assessment bodies for the UK digital identity and attributes trust framework certification scheme. tag:www.gov.uk,2005:/government/publications/cyber-governance-code-of-practice 2025-04-08T00:00:00+01:00 Cyber Governance Code of Practice This Code of Practice and wider governance package shows boards and directors how to manage digital risks and protect their businesses and organisations from cyber attacks. tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns 2025-04-02T09:51:53+01:00 Industry Security Notice (ISN) A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information. tag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-home-office-system 2025-02-24T09:49:17+00:00 Report a vulnerability on a Home Office system Explains how to report a security vulnerability on any Home Office service or system. tag:www.gov.uk,2005:/government/publications/financial-sanctions-cyber-attacks 2025-02-11T13:01:00+00:00 Financial sanctions, Cyber UK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets. tag:www.gov.uk,2005:/government/publications/ai-cyber-security-code-of-practice 2025-01-31T00:00:00+00:00 AI Cyber Security Code of Practice 皇冠体育app code of practice and implementation guide sets out measures to address cyber security risks to artificial intelligence (AI) systems. tag:www.gov.uk,2005:/government/publications/uk-japan-digital-partnership 2025-01-23T10:56:57+00:00 UK-Japan Digital Partnership A framework for deeper UK-Japan collaboration across digital infrastructure and technologies, data, digital regulation and digital transformation. tag:www.gov.uk,2005:/guidance/how-to-create-and-share-attributes 2024-11-25T09:00:00+00:00 How to create and share attributes A guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework. tag:www.gov.uk,2005:/guidance/delegated-authority-guidance 2024-11-25T09:00:00+00:00 Delegated authority guidance Guidance for organisations certified against the UK digital identity and attributes trust framework who offer delegated authority as part of their service. tag:www.gov.uk,2005:/guidance/how-to-score-attributes 2024-11-25T00:00:00+00:00 How to score attributes Guidance for organisations certified against the UK digital identity and attributes trust framework as an 'attribute service provider'. tag:www.gov.uk,2005:/government/publications/uk-digital-identity-and-attributes-trust-framework-04 2024-11-25T00:00:00+00:00 UK digital identity and attributes trust framework (0.4) A pre-release of the updated, pre-legislative version of the UK digital identity and attributes trust framework. tag:www.gov.uk,2005:/guidance/understanding-attributes 2024-11-25T00:00:00+00:00 Understanding attributes A guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework. tag:www.gov.uk,2005:/government/publications/identity-proofing-and-verification-of-an-individual 2024-11-14T12:20:59+00:00 How to prove and verify someone's identity Good Practice Guide (GPG) 45 helps you decide how to check someone's identity. tag:www.gov.uk,2005:/guidance/digital-identity 2024-11-01T13:56:52+00:00 Enabling the use of digital identities in the UK We鈥檙e working to help people securely prove who they are without having to present physical documents.