Skip to Main Content
National Standard Microsite Logo

Police Digital Service National Standards

    Authentication failed. Please enable browser cookies and try again.
    Sign In
    Caps Lock is on.
    • Sign up
    • Forgot Password

    Search Everything - National Standard Microsite

    • Standards
    • Search Everything
    • Standards search
    • APIs
    • Blueprints
    • Procurement
    • About
    • Updates
    • FAQs
    • Contact Us
    Categories
    Clear All
    Tags
    Clear All
      Newest A-Z
      List Grid

      No results were found.

      Search listings
      ALGOCARE - Algorithm assessment tool
      ALGO-CARE has been created for policing to use as a decision-making framework for the deployment of algorithmic assessment tools in the policing context. This helps translate key public law...
      Standard  | 
      Published: 01/09/2018
       | 
      Authoring body: Oswald Grace Urwin & Barnes
      Principles
      Police Assured Landing Zone (PALZ) Amazon Web Services (AWS) Blueprint
      The AWS Police Assured Landing Zone (PALZ), is a set of configuration, code, security model and design decision rationale artefacts created specifically for policing workloads.  The goal is to...
      Standard  | 
      Published: 01/06/2021
       | 
      Authoring body: Amazon / Police Digital Service (PDS)
      Reference Data / Templates
      Frontline Digital Mobility - Laptop shells
      A laptop shell is simply a laptop with no internal computing power, this is provided by connecting a smartphone to the laptop, which is then 'driven' by the keyboard, mouse and screen of the laptop...
      Standard  | 
      Published: 01/02/2020
       | 
      Authoring body: Digital Policing Portfolio (DPP)
      Guidance
      Frontline Digital Mobility - Portable Power Banks
      Portable power banks are a tried and tested peripheral. Advances continue to be made to make them faster, better and smaller. Yet there are many types of power banks available in the market place...
      Standard  | 
      Published: 01/02/2020
       | 
      Authoring body: Digital Policing Portfolio (DPP)
      Guidance
      Frontline Digital Mobility - Portable Hotspots
      Portable hotspots are a tried and tested peripheral. Advances continue to make them faster, better and smaller. There are many types of portable hotspots available in the market place with many...
      Standard  | 
      Published: 01/02/2020
       | 
      Authoring body: Digital Policing Portfolio (DPP)
      Guidance
      Frontline Digital Mobility - Peripheral Keyboards
      There are many types of keyboards available in the market place with many variances in terms of specification, features and of course price. This guidance explores these variances and makes...
      Standard  | 
      Published: 01/02/2020
       | 
      Authoring body: Digital Policing Portfolio (DPP)
      Guidance
      Frontline Digital Mobility - Connection Types
      This guidance will explore the main connection types used by frontline officers and staff, whilst making recommendations about security and appropriate use. This guideline focuses on...
      Standard  | 
      Published: 01/02/2020
       | 
      Authoring body: Digital Policing Portfolio (DPP)
      Guidance
      Cyber Security: Supply chain security
      Step 10 from the 10 steps to Cyber Security covers how and why it is sensible to collaborate with your suppliers and partners Most organisations rely upon suppliers to deliver products, systems,...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Incident management
      Step 9 from the 10 steps to Cyber Security covers how to plan your response to cyber incidents in advance. Incidents can have a huge impact on an organisation in terms of cost, productivity...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Logging and monitoring
      Step 8 from the 10 steps to Cyber Security covers how to design your systems to be able to detect and investigate incidents. Collecting logs is essential to understand how your systems are...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Data security
      Step 7 from the 10 steps to Cyber Security covers the need to protect data where it is vulnerable. Data needs to be protected from unauthorised access, modification, or deletion. This...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Identity and access management
      Step 6 from the 10 steps to Cyber Security covers how to control who and what can access your systems and data via identity and access management (IAM) Access to data, systems and services...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Vulnerability management
      Step 5 from the 10 steps to Cyber Security covers how to keep your systems protected throughout their lifecycle. The majority of cyber security incidents are the result of attackers...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Architecture and configuration
      Step 4 from the 10 steps to Cyber Security covers how to design, build and maintain systems securely. The technology and cyber security landscape is constantly evolving. To address this,...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Asset management
      Step 3 from the 10 steps to Cyber Security covers asset management, ensuring you know what data and systems you manage, and what business need they support. Asset management encompasses the...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Engagement and training
      Step 2 from the 10 steps to Cyber Security covers the engagement and training of members from your organisation. People should be at the heart of any cyber security strategy. Good security...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      Cyber Security: Risk management
      Step 1 from the 10 steps to Cyber Security covers the approach to risk management. Taking risks is a natural part of doing business. Risk management informs decisions so that the right balance of...
      Standard  | 
      Published: 11/05/2021
       | 
      Authoring body: National Cyber Security Centre (NCSC)
      Guidance
      BS 10008 Evidential Weight and Legal Admissibility of Electronic Information
      This document outlines best practice for the implementation and operation of electronic information management systems, including the storage and transfer of information. It is designed to help you...
      Standard  | 
      Published: 01/01/2020
       | 
      Authoring body: British Standards Institute (BSI)
      Standards
      ISO 17020:2012 Requirements for the operation of various types of bodies performing inspection (Crime Scene Investigation)
      ISO 17020:2012 specifies requirements for the competence of bodies (including police forces) performing inspection and for the impartiality and consistency of their inspection activities, this...
      Standard  | 
      Published: 01/04/2012
       | 
      Authoring body: International Standards Organisation (ISO)
      Standards
      • 4 Entries per Page
      • 8 Entries per Page
      • 20 Entries per Page
      • 40 Entries per Page
      • 60 Entries per Page

      Showing 141 to 160 of 284 entries.

      • Page 1
        • Page 2
        • Page 3
        • Page 4
        • Page 5
        • Page 6
      • Page 7
      • Page 8
      • Page 9
        • Page 10
        • Page 11
        • Page 12
        • Page 13
        • Page 14
      • Page 15

      Knowledge Hub

      • Sign up to the Knowledge Hub

      Quick links

      • National Policing Digital Strategy

      Partners

      • Police Digital Service
      • Government Digital Service
      • TechUK

      Contact us

      • National Standards Team