tag:www.gov.uk,2005:/search/guidance-and-regulationGuidance and regulation2025-07-14T15:23:28+01:00HM Governmenttag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident2025-07-14T15:23:28+01:00Legal Aid Agency cyber security incidentA dedicated space with the latest updates, contingency measures and processes following a cyber attack on the Legal Aid Agency’s online digital services.tag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident-frequently-asked-questions2025-07-09T15:12:53+01:00Legal Aid Agency cyber security incident: frequently asked questions Frequently asked questions about the Legal Aid Agency cyber security incident.tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-32025-07-01T12:05:58+01:00Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 3The Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes.tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-22025-07-01T12:03:02+01:00Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 2The Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. The general requirements common to all Open Call competitions …tag:www.gov.uk,2005:/guidance/certification-scheme-for-the-uk-digital-identity-and-attributes-trust-framework2025-06-26T10:00:06+01:00Certification scheme for the UK digital identity and attributes trust frameworkConformity Assessment Bodies must follow these processes and requirements when certifying services against the UK digital identity and attributes trust framework.tag:www.gov.uk,2005:/guidance/supplementary-code-for-disclosure-and-barring-service-digital-identity-checks-042025-06-26T10:00:04+01:00Supplementary code for Disclosure and Barring Service digital identity checks (0.4)This publication sets out rules for digital verification services supporting Registered Bodies and Responsible Organisations to conduct identity verification as part of Disclosure and Barring Service checks.tag:www.gov.uk,2005:/guidance/supplementary-code-for-digital-right-to-work-checks-042025-06-26T10:00:04+01:00Supplementary code for digital right to work checks (0.4)This publication sets out rules for digital verification services supporting employers who choose to conduct digital right to work checks.tag:www.gov.uk,2005:/guidance/supplementary-code-for-digital-right-to-rent-checks-042025-06-26T10:00:04+01:00Supplementary code for digital right to rent checks (0.4)This publication sets out rules for digital verification services supporting landlords who choose to conduct digital right to rent checks.tag:www.gov.uk,2005:/government/publications/uk-digital-identity-and-attributes-trust-framework-042025-06-26T10:00:04+01:00UK digital identity and attributes trust framework (0.4)The most recent pre-legislative version of the UK digital identity and attributes trust framework.tag:www.gov.uk,2005:/guidance/principles-for-securing-personal-data-in-government-services2025-06-25T13:45:16+01:00Principles for securing personal data in government servicesData security control principles to use when processing and sharing personal data in your service.tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns2025-06-12T11:00:30+01:00Industry Security Notice (ISN)A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information.tag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview2025-05-07T11:00:01+01:00Cyber Essentials scheme: overviewCyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats.tag:www.gov.uk,2005:/government/publications/software-security-code-of-practice2025-05-07T00:00:00+01:00Software Security Code of PracticeThis Code of Practice sets out expectations for the security and resilience of software.tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-12025-04-29T12:01:31+01:00Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 1The Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes.tag:www.gov.uk,2005:/government/publications/defence-and-security-accelerator-dasa-open-call-for-innovation2025-04-29T12:00:35+01:00Defence and Security Accelerator (DASA) Open Call for InnovationThe Open Call is looking for innovative ideas to improve the defence and security of the UK. Your idea could be a concept, product or service, at various levels of maturity.tag:www.gov.uk,2005:/government/publications/secure-by-design-problem-book2025-04-24T09:52:38+01:00Secure by Design Problem BookLessons learnt from the 'Secure by Design' approach adopted by MOD which ensures security is designed into any project delivering capabilities or services.tag:www.gov.uk,2005:/guidance/list-of-approved-conformity-assessment-bodies2025-04-15T10:13:10+01:00List of approved conformity assessment bodiesA list of approved conformity assessment bodies for the UK digital identity and attributes trust framework certification scheme.tag:www.gov.uk,2005:/government/publications/cyber-governance-code-of-practice2025-04-08T00:00:00+01:00Cyber Governance Code of PracticeThis Code of Practice and wider governance package shows boards and directors how to manage digital risks and protect their businesses and organisations from cyber attacks.tag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-home-office-system2025-02-24T09:49:17+00:00Report a vulnerability on a Home Office systemExplains how to report a security vulnerability on any Home Office service or system.tag:www.gov.uk,2005:/government/publications/financial-sanctions-cyber-attacks2025-02-11T13:01:00+00:00Financial sanctions, CyberUK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets.