皇冠体育app

Skip to main content
Cyber security

Guidance and regulation

Skip to results
112 results sorted by Most viewed
  • This publication explores the fundamentals, threats, operations and functions of cyber.

  • Cyber Security Model information about the proportionate security controls to be implemented and evidence to be submitted as part of all MOD contracts.

  • Guidance for small businesses on how to put simple cyber security measures in place.

  • 皇冠体育app Government's Code of Practice for Consumer Internet of Things (IoT) Security for manufacturers, with guidance for consumers on smart devices at home.

  • Guidance on how to report a security vulnerability on any Ministry of Defence service or system, such as the websites of the Royal Air Force, British Army and Royal Navy.

  • Advice and guidance to help parents and carers to keep children safe online.

  • UK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets.

  • A guide for designated operators of essential services for healthcare in England explaining the practical impact of the NIS Regulations.

  • Find out the benefits of getting and using a .gov.uk domain

  • 皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. 皇冠体育app general requirements common to all Open Call competitions 鈥�

  • Follow this guidance to understand how to become a .gov.uk Approved Registrar

  • Cyber Explorers is a new online learning platform to teach cyber skills to thousands of school pupils across the UK.

  • Requirements for organisations wanting to provide or consume digital identity products and services.

  • Resources to help local authorities secure their connected places ("smart cities") against cyber threats. This is the updated beta release.

  • Joint Doctrine Note 1/18 describes the framework that Defence will use to synchronise and coordinate cyber and electromagnetic activities at the operational level.

  • Information about which code you should open and how to do it securely.

  • This note explains how to use the Cyber Essentials scheme, which aims to reduce cyber security risk in government supply chains.

  • A framework for deeper UK-Japan collaboration across digital infrastructure and technologies, data, digital regulation and digital transformation.

  • This guidance gives information to Competent Authorities established under the Network and Information Systems Regulations of 2018 (NIS Regulations).

    First published during the 2016 to 2019 May Conservative government

  • 皇冠体育app supplier assurance questionnaire (SAQ) allows suppliers to demonstrate compliance with the controls required by a contract and its Cyber Risk Profile.