tag:www.gov.uk,2005:/search/guidance-and-regulationGuidance and regulation2025-05-07T11:00:01+01:00HM Governmenttag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview2025-05-07T11:00:01+01:00Cyber Essentials scheme: overviewCyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats.tag:www.gov.uk,2005:/government/publications/software-security-code-of-practice2025-05-07T09:45:00+01:00Software Security Code of PracticeThis Code of Practice sets out expectations for the security and resilience of software.tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-22025-04-29T12:02:10+01:00Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 2皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. 皇冠体育app general requirements common to all Open Call competitions 鈥�tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-12025-04-29T12:01:31+01:00Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 1皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes.tag:www.gov.uk,2005:/government/publications/defence-and-security-accelerator-dasa-open-call-for-innovation2025-04-29T12:00:35+01:00Defence and Security Accelerator (DASA) Open Call for Innovation皇冠体育app Open Call is looking for innovative ideas to improve the defence and security of the UK. Your idea could be a concept, product or service, at various levels of maturity.tag:www.gov.uk,2005:/government/publications/secure-by-design-problem-book2025-04-24T09:52:38+01:00Secure by Design Problem BookLessons learnt from the 'Secure by Design' approach adopted by MOD which ensures security is designed into any project delivering capabilities or services.tag:www.gov.uk,2005:/guidance/list-of-approved-conformity-assessment-bodies2025-04-15T10:13:10+01:00List of approved conformity assessment bodiesA list of approved conformity assessment bodies for the UK digital identity and attributes trust framework certification scheme.tag:www.gov.uk,2005:/government/publications/cyber-governance-code-of-practice2025-04-08T00:00:00+01:00Cyber Governance Code of PracticeThis Code of Practice and wider governance package shows boards and directors how to manage digital risks and protect their businesses and organisations from cyber attacks.tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns2025-04-02T09:51:53+01:00Industry Security Notice (ISN)A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information.tag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-home-office-system2025-02-24T09:49:17+00:00Report a vulnerability on a Home Office systemExplains how to report a security vulnerability on any Home Office service or system.tag:www.gov.uk,2005:/government/publications/financial-sanctions-cyber-attacks2025-02-11T13:01:00+00:00Financial sanctions, CyberUK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets.tag:www.gov.uk,2005:/government/publications/ai-cyber-security-code-of-practice2025-01-31T00:00:00+00:00AI Cyber Security Code of Practice皇冠体育app code of practice and implementation guide sets out measures to address cyber security risks to artificial intelligence (AI) systems. tag:www.gov.uk,2005:/government/publications/uk-japan-digital-partnership2025-01-23T10:56:57+00:00UK-Japan Digital PartnershipA framework for deeper UK-Japan collaboration across digital infrastructure and technologies, data, digital regulation and digital transformation.tag:www.gov.uk,2005:/guidance/how-to-create-and-share-attributes2024-11-25T09:00:00+00:00How to create and share attributesA guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework.tag:www.gov.uk,2005:/guidance/delegated-authority-guidance2024-11-25T09:00:00+00:00Delegated authority guidanceGuidance for organisations certified against the UK digital identity and attributes trust framework who offer delegated authority as part of their service.tag:www.gov.uk,2005:/guidance/how-to-score-attributes2024-11-25T00:00:00+00:00How to score attributesGuidance for organisations certified against the UK digital identity and attributes trust framework as an 'attribute service provider'.tag:www.gov.uk,2005:/government/publications/uk-digital-identity-and-attributes-trust-framework-042024-11-25T00:00:00+00:00UK digital identity and attributes trust framework (0.4)A pre-release of the updated, pre-legislative version of the UK digital identity and attributes trust framework.tag:www.gov.uk,2005:/guidance/understanding-attributes2024-11-25T00:00:00+00:00Understanding attributesA guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework.tag:www.gov.uk,2005:/government/publications/identity-proofing-and-verification-of-an-individual2024-11-14T12:20:59+00:00How to prove and verify someone's identityGood Practice Guide (GPG) 45 helps you decide how to check someone's identity.tag:www.gov.uk,2005:/guidance/digital-identity2024-11-01T13:56:52+00:00Enabling the use of digital identities in the UKWe鈥檙e working to help people securely prove who they are without having to present physical documents.