We use some essential cookies to make this website work.
We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.
We also use cookies set by other sites to help us deliver content from their services.
You have accepted additional cookies. You can change your cookie settings at any time.
You have rejected additional cookies. You can change your cookie settings at any time.
Departments, agencies and public bodies
News stories, speeches, letters and notices
Detailed guidance, regulations and rules
Reports, analysis and official statistics
Consultations and strategy
Data, Freedom of Information releases and corporate reports
Data security control principles to use when processing and sharing personal data in your service.
The most recent version of the UK digital identity and attributes trust framework.
Cyber Explorers is a new online learning platform to teach cyber skills to thousands of school pupils across the UK.
Conformity assessment bodies must follow these processes and requirements when certifying services against the UK digital identity and attributes trust framework.
Follow this guidance to understand how to become a .gov.uk Approved Registrar
The Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes.
The Government's Code of Practice for Consumer Internet of Things (IoT) Security for manufacturers, with guidance for consumers on smart devices at home.
Find out who can certify digital identity services during the pilot process, and more about the approval and accreditation process.
A revised (alpha) version of the digital identity trust framework following feedback, plus an invitation to express an interest in testing the framework.
This publication explores the fundamentals, threats, operations and functions of cyber.
This service allows the Ministry of Defence (MOD) and industry partners to manage cyber risk across the defence supply chain.
Researchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.
Guidance for small businesses on how to put simple cyber security measures in place.
Register your interest in future Government-funded cyber security apprenticeships in critical national infrastructure (CNI) sectors.
This guidance, also known as Good Practice Guide (GPG) 45, helps you decide how to check, or ask others to check, the identity of those you interact with.
A guide for designated operators of essential services for healthcare in England explaining the practical impact of the NIS Regulations.
Guidance on how to report a security vulnerability on any Ministry of Defence service or system, such as the websites of the Royal Air Force, British Army and Royal Navy.
This guidance, also known as Good Practice Guide (GPG) 44, will help you choose an authenticator that will give you the level of protection that’s most suitable for users accessing your service.
Security and Resilience Principles for 6G from the governments of the Global Coalition on Telecoms (GCOT).
Information about which code you should open and how to do it securely.
Do not include personal or financial information like your National Insurance number or credit card details.
To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey (opens in a new tab and requires JavaScript).