We use some essential cookies to make this website work.
We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.
We also use cookies set by other sites to help us deliver content from their services.
You have accepted additional cookies. You can change your cookie settings at any time.
You have rejected additional cookies. You can change your cookie settings at any time.
Departments, agencies and public bodies
News stories, speeches, letters and notices
Detailed guidance, regulations and rules
Reports, analysis and official statistics
Consultations and strategy
Data, Freedom of Information releases and corporate reports
Data security control principles to use when processing and sharing personal data in your service.
A revised (alpha) version of the digital identity trust framework following feedback, plus an invitation to express an interest in testing the framework.
The Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes.
Cyber Explorers is a new online learning platform to teach cyber skills to thousands of school pupils across the UK.
Register your interest in future Government-funded cyber security apprenticeships in critical national infrastructure (CNI) sectors.
This guidance, also known as Good Practice Guide (GPG) 45, helps you decide how to check, or ask others to check, the identity of those you interact with.
Find out who can certify digital identity services during the pilot process, and more about the approval and accreditation process.
Advice and guidance to help parents and carers to keep children safe online.
Follow this guidance to understand how to become a .gov.uk Approved Registrar
Conformity assessment bodies must follow these processes and requirements when certifying services against the UK digital identity and attributes trust framework.
Find out the benefits of getting and using a .gov.uk domain
This publication explores the fundamentals, threats, operations and functions of cyber.
Researchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.
A specification to help DVS and relying parties organise and exchange information in a consistent way to enable interoperability
This note explains how to use the Cyber Essentials scheme, which aims to reduce cyber security risk in government supply chains.
An updated version of the digital identity and attributes trust framework, following testing and feedback.
Security and Resilience Principles for 6G from the governments of the Global Coalition on Telecoms (GCOT).
Find out how to securely create and manage subdomains in the public sector.
This publication sets out rules for digital verification services supporting landlords who choose to conduct digital right to rent checks.
The supplier assurance questionnaire (SAQ) allows suppliers to demonstrate compliance with the controls required by a contract and its Cyber Risk Profile.
Don’t include personal or financial information like your National Insurance number or credit card details.
To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey (opens in a new tab and requires JavaScript).