tag:www.gov.uk,2005:/search/guidance-and-regulation Guidance and regulation 2025-06-17T15:05:38+01:00 HM Government tag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident-frequently-asked-questions 2025-06-17T15:05:38+01:00 Legal Aid Agency cyber security incident: frequently asked questions Frequently asked questions about the Legal Aid Agency cyber security incident. tag:www.gov.uk,2005:/guidance/legal-aid-agency-cyber-security-incident 2025-06-17T10:11:32+01:00 Legal Aid Agency cyber security incident A dedicated space with the latest updates, contingency measures and processes following a cyber attack on the Legal Aid Agency鈥檚 online digital services. tag:www.gov.uk,2005:/government/publications/industry-security-notices-isns 2025-06-12T11:00:30+01:00 Industry Security Notice (ISN) A list of Industry Security Notices (ISNs) for defence personnel to highlight security changes or information. tag:www.gov.uk,2005:/government/publications/cyber-essentials-scheme-overview 2025-05-07T11:00:01+01:00 Cyber Essentials scheme: overview Cyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats. tag:www.gov.uk,2005:/government/publications/software-security-code-of-practice 2025-05-07T00:00:00+01:00 Software Security Code of Practice This Code of Practice sets out expectations for the security and resilience of software. tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-2 2025-04-29T12:02:10+01:00 Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 2 皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. 皇冠体育app general requirements common to all Open Call competitions 鈥� tag:www.gov.uk,2005:/government/publications/competition-defence-and-security-accelerator-dasa-open-call-for-innovation-cy2025-cycle-1 2025-04-29T12:01:31+01:00 Competition: Defence and Security Accelerator (DASA) Open Call for Innovation - CY2025 - Cycle 1 皇冠体育app Defence and Security Accelerator (DASA) uses the Open Call for Innovation to find ideas that address challenges across both Defence and Security landscapes. tag:www.gov.uk,2005:/government/publications/defence-and-security-accelerator-dasa-open-call-for-innovation 2025-04-29T12:00:35+01:00 Defence and Security Accelerator (DASA) Open Call for Innovation 皇冠体育app Open Call is looking for innovative ideas to improve the defence and security of the UK. Your idea could be a concept, product or service, at various levels of maturity. tag:www.gov.uk,2005:/government/publications/secure-by-design-problem-book 2025-04-24T09:52:38+01:00 Secure by Design Problem Book Lessons learnt from the 'Secure by Design' approach adopted by MOD which ensures security is designed into any project delivering capabilities or services. tag:www.gov.uk,2005:/guidance/list-of-approved-conformity-assessment-bodies 2025-04-15T10:13:10+01:00 List of approved conformity assessment bodies A list of approved conformity assessment bodies for the UK digital identity and attributes trust framework certification scheme. tag:www.gov.uk,2005:/government/publications/cyber-governance-code-of-practice 2025-04-08T00:00:00+01:00 Cyber Governance Code of Practice This Code of Practice and wider governance package shows boards and directors how to manage digital risks and protect their businesses and organisations from cyber attacks. tag:www.gov.uk,2005:/guidance/report-a-vulnerability-on-a-home-office-system 2025-02-24T09:49:17+00:00 Report a vulnerability on a Home Office system Explains how to report a security vulnerability on any Home Office service or system. tag:www.gov.uk,2005:/government/publications/financial-sanctions-cyber-attacks 2025-02-11T13:01:00+00:00 Financial sanctions, Cyber UK financial sanctions are in place for persons, entities or bodies involved in certain cyber activity.This page contains the current list of designated targets. tag:www.gov.uk,2005:/government/publications/ai-cyber-security-code-of-practice 2025-01-31T00:00:00+00:00 AI Cyber Security Code of Practice 皇冠体育app code of practice and implementation guide sets out measures to address cyber security risks to artificial intelligence (AI) systems. tag:www.gov.uk,2005:/government/publications/uk-japan-digital-partnership 2025-01-23T10:56:57+00:00 UK-Japan Digital Partnership A framework for deeper UK-Japan collaboration across digital infrastructure and technologies, data, digital regulation and digital transformation. tag:www.gov.uk,2005:/guidance/how-to-create-and-share-attributes 2024-11-25T09:00:00+00:00 How to create and share attributes A guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework. tag:www.gov.uk,2005:/guidance/delegated-authority-guidance 2024-11-25T09:00:00+00:00 Delegated authority guidance Guidance for organisations certified against the UK digital identity and attributes trust framework who offer delegated authority as part of their service. tag:www.gov.uk,2005:/guidance/how-to-score-attributes 2024-11-25T00:00:00+00:00 How to score attributes Guidance for organisations certified against the UK digital identity and attributes trust framework as an 'attribute service provider'. tag:www.gov.uk,2005:/government/publications/uk-digital-identity-and-attributes-trust-framework-04 2024-11-25T00:00:00+00:00 UK digital identity and attributes trust framework (0.4) A pre-release of the updated, pre-legislative version of the UK digital identity and attributes trust framework. tag:www.gov.uk,2005:/guidance/understanding-attributes 2024-11-25T00:00:00+00:00 Understanding attributes A guide for organisations interested in being an 'attribute service provider' certified against the UK digital identity and attributes trust framework.