We use some essential cookies to make this website work.
We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.
We also use cookies set by other sites to help us deliver content from their services.
You have accepted additional cookies. You can change your cookie settings at any time.
You have rejected additional cookies. You can change your cookie settings at any time.
Departments, agencies and public bodies
News stories, speeches, letters and notices
Detailed guidance, regulations and rules
Reports, analysis and official statistics
Consultations and strategy
Data, Freedom of Information releases and corporate reports
Keep systems and data safe with the appropriate level of security.
Researchers should use this guidance to understand the security measures you need to follow and how to apply them when working with defence research.
1. Introduction The UK Ministry of Defence (MOD) invests a significant…
This quick reference guide is part of the defence research security guide…
This checklist is part of the defence research security guide for…
Spreadsheets are a common way to share data. Use this information to help you avoid common errors, improve interoperability and create more accessible spreadsheets.
A domain name is an important asset and is not protected by default. Follow these recommendations to keep your domain secure.
This guide (GPG 53) sets out the role of transaction monitoring in helping to counter electronic attacks against online public services.
A simple guide to understanding and describing the trustworthiness of autonomous systems and associated artificial intelligence (AI) algorithms.
Don’t include personal or financial information like your National Insurance number or credit card details.
To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey (opens in a new tab and requires JavaScript).