We use some essential cookies to make this website work.
We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.
We also use cookies set by other sites to help us deliver content from their services.
You have accepted additional cookies. You can change your cookie settings at any time.
You have rejected additional cookies. You can change your cookie settings at any time.
Departments, agencies and public bodies
News stories, speeches, letters and notices
Detailed guidance, regulations and rules
Reports, analysis and official statistics
Consultations and strategy
Data, Freedom of Information releases and corporate reports
Apply the government secure email policy.
Find out what a .gov.uk Approved Registrar does, how to choose one and information about pricing.
Configure email services securely using encryption and anti-spoofing.
Keep systems and data safe with the appropriate level of security.
Good Practice Guide (GPG) 44 helps you choose the authenticator that will give you the right level of protection for your service.
Researchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.
Follow this guidance to understand how to become a .gov.uk Approved Registrar
A domain name is an important asset and is not protected by default. Follow these recommendations to keep your domain secure.
Find out the benefits of getting and using a .gov.uk domain
Spreadsheets are a common way to share data. Use this information to help you avoid common errors, improve interoperability and create more accessible spreadsheets.
Make sure citizens’ rights are protected by integrating privacy as an essential part of your system.
Make sure that domains that do not send email cannot be used for spoofing.
Lessons learnt from the 'Secure by Design' approach adopted by MOD which ensures security is designed into any project delivering capabilities or services.
All digital services and technical infrastructure must be built to comply with the Government Cyber Security Standard
This guidance explains how you can apply common security standards in your organisation to secure email.
This good practice guide (GPG 46) relates to establishing the identities of organisations or individuals acting on behalf of those organisations.
When you need to prove and verify someone’s identity, you must get evidence about them. A vouch is one of the types of evidence you can collect.
This guidance outlines how to create and implement a cloud strategy, and when to consider a single, hybrid or multi-cloud solution.
This guidance explains why and how public sector organisations should move to modern network solutions and away from legacy networks with information on standards you need to follow and case studies.
Follow this guidance if you’re responsible for choosing, buying and managing Software as a Service (SaaS) tools in your organisation.
Don’t include personal or financial information like your National Insurance number or credit card details.
To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey (opens in a new tab and requires JavaScript).