Skip to Main Content
Police Digital Service National Standards
Authentication failed. Please enable browser cookies and try again.
Sign In
Email Address
Password
Caps Lock is on.
Log in
Sign up
Forgot Password
Search Everything - National Standard Microsite
Standards
Search Everything
Standards search
APIs
Blueprints
Procurement
About
Updates
FAQs
Contact Us
Categories
Security (170)
Incident, Crime and Records Management (25)
Data (24)
Devices (17)
Forensics (17)
Intelligence Systems (17)
Operational Policing (12)
Criminal Justice (12)
Analytics (11)
Mobile Applications (8)
Clear All
Tags
ncsp (69)
cyber (55)
standard (47)
risk (42)
operational policing (36)
sbd (28)
resilience (25)
assurance (23)
network (22)
compliance (21)
Clear All
Newest
A-Z
List
Grid
No results were found.
Search listings
ALGOCARE - Algorithm assessment tool
ALGO-CARE has been created for policing to use as a decision-making framework for the deployment of algorithmic assessment tools in the policing context. This helps translate key public law...
Standard
|
Published:
01/09/2018
|
Authoring body:
Oswald Grace Urwin & Barnes
Principles
Police Assured Landing Zone (PALZ) Amazon Web Services (AWS) Blueprint
The AWS Police Assured Landing Zone (PALZ), is a set of configuration, code, security model and design decision rationale artefacts created specifically for policing workloads. The goal is to...
Standard
|
Published:
01/06/2021
|
Authoring body:
Amazon / Police Digital Service (PDS)
Reference Data / Templates
Frontline Digital Mobility - Laptop shells
A laptop shell is simply a laptop with no internal computing power, this is provided by connecting a smartphone to the laptop, which is then 'driven' by the keyboard, mouse and screen of the laptop...
Standard
|
Published:
01/02/2020
|
Authoring body:
Digital Policing Portfolio (DPP)
Guidance
Frontline Digital Mobility - Portable Power Banks
Portable power banks are a tried and tested peripheral. Advances continue to be made to make them faster, better and smaller. Yet there are many types of power banks available in the market place...
Standard
|
Published:
01/02/2020
|
Authoring body:
Digital Policing Portfolio (DPP)
Guidance
Frontline Digital Mobility - Portable Hotspots
Portable hotspots are a tried and tested peripheral. Advances continue to make them faster, better and smaller. There are many types of portable hotspots available in the market place with many...
Standard
|
Published:
01/02/2020
|
Authoring body:
Digital Policing Portfolio (DPP)
Guidance
Frontline Digital Mobility - Peripheral Keyboards
There are many types of keyboards available in the market place with many variances in terms of specification, features and of course price. This guidance explores these variances and makes...
Standard
|
Published:
01/02/2020
|
Authoring body:
Digital Policing Portfolio (DPP)
Guidance
Frontline Digital Mobility - Connection Types
This guidance will explore the main connection types used by frontline officers and staff, whilst making recommendations about security and appropriate use. This guideline focuses on...
Standard
|
Published:
01/02/2020
|
Authoring body:
Digital Policing Portfolio (DPP)
Guidance
Cyber Security: Supply chain security
Step 10 from the 10 steps to Cyber Security covers how and why it is sensible to collaborate with your suppliers and partners Most organisations rely upon suppliers to deliver products, systems,...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Incident management
Step 9 from the 10 steps to Cyber Security covers how to plan your response to cyber incidents in advance. Incidents can have a huge impact on an organisation in terms of cost, productivity...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Logging and monitoring
Step 8 from the 10 steps to Cyber Security covers how to design your systems to be able to detect and investigate incidents. Collecting logs is essential to understand how your systems are...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Data security
Step 7 from the 10 steps to Cyber Security covers the need to protect data where it is vulnerable. Data needs to be protected from unauthorised access, modification, or deletion. This...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Identity and access management
Step 6 from the 10 steps to Cyber Security covers how to control who and what can access your systems and data via identity and access management (IAM) Access to data, systems and services...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Vulnerability management
Step 5 from the 10 steps to Cyber Security covers how to keep your systems protected throughout their lifecycle. The majority of cyber security incidents are the result of attackers...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Architecture and configuration
Step 4 from the 10 steps to Cyber Security covers how to design, build and maintain systems securely. The technology and cyber security landscape is constantly evolving. To address this,...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Asset management
Step 3 from the 10 steps to Cyber Security covers asset management, ensuring you know what data and systems you manage, and what business need they support. Asset management encompasses the...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Engagement and training
Step 2 from the 10 steps to Cyber Security covers the engagement and training of members from your organisation. People should be at the heart of any cyber security strategy. Good security...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Cyber Security: Risk management
Step 1 from the 10 steps to Cyber Security covers the approach to risk management. Taking risks is a natural part of doing business. Risk management informs decisions so that the right balance of...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
BS 10008 Evidential Weight and Legal Admissibility of Electronic Information
This document outlines best practice for the implementation and operation of electronic information management systems, including the storage and transfer of information. It is designed to help you...
Standard
|
Published:
01/01/2020
|
Authoring body:
British Standards Institute (BSI)
Standards
ISO 17020:2012 Requirements for the operation of various types of bodies performing inspection (Crime Scene Investigation)
ISO 17020:2012 specifies requirements for the competence of bodies (including police forces) performing inspection and for the impartiality and consistency of their inspection activities, this...
Standard
|
Published:
01/04/2012
|
Authoring body:
International Standards Organisation (ISO)
Standards
20 Entries
Per Page
4
Entries per Page
8
Entries per Page
20
Entries per Page
40
Entries per Page
60
Entries per Page
Showing 141 to 160 of 284 entries.
Page
1
...
Intermediate Pages Use TAB to navigate.
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
...
Intermediate Pages Use TAB to navigate.
Page
10
Page
11
Page
12
Page
13
Page
14
Page
15
Hidden