Skip to Main Content
Police Digital Service National Standards
Authentication failed. Please enable browser cookies and try again.
Sign In
Email Address
Password
Caps Lock is on.
Log in
Sign up
Forgot Password
Standards search - National Standard Microsite
Standards
Search Everything
Standards search
APIs
Blueprints
Procurement
About
Updates
FAQs
Contact Us
Status
Draft (6)
Retired (102)
Live (171)
Clear All
Classification
Reference Data / Templates (13)
Principles (28)
Guidance (94)
Policy (24)
Standards (120)
Clear All
Grade: PMR
true (62)
false (217)
Clear All
Grade: LMR
true (37)
false (242)
Clear All
Internally Amended / Developed
false (212)
true (67)
Clear All
Categories
Security (168)
Incident, Crime and Records Management (25)
Data (21)
Devices (17)
Forensics (17)
Intelligence Systems (17)
Operational Policing (12)
Criminal Justice (12)
Analytics (11)
Mobile Applications (7)
Clear All
Tags
ncsp (73)
cyber (58)
standard (47)
risk (41)
operational policing (36)
sbd (25)
resilience (24)
assurance (23)
network (22)
compliance (21)
See more
licenced-standard (20)
cyber attack (19)
security (18)
investigation (16)
images and video (15)
accreditation (15)
intelligence (14)
cjs (13)
coordination (13)
application (12)
Clear All
Sign in
to add a new content
Newest
A-Z
List
Grid
No entries were found.
DDL search listings
IDENT1
This document should be used in reference to the appropriate legislation, such as the Protection of Freedoms Act 2012: DNA & Fingerprint Provisions IDENT1 is the UK’s nationals automated...
Standard
|
Published:
01/01/2019
|
Authoring body:
Home Office
Reference Data / Templates
ICT Asset Recovery Standard 7.0
Asset Disposal & Information Security Alliance (ADISA) is an organisation designed to improve risk management and data protection within business processes for IT asset retirement and disposal....
Standard
|
Published:
01/01/2020
|
Authoring body:
Asset Disposal & Information Security Alliance (ADISA)
Standards
Cyber Essentials guidance
Most cyber attacks are conducted by unskilled individuals and are very basic in nature and cyber security is an important aspect to guard any organisation from cyber attacks. There are five...
Standard
|
Published:
01/01/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Principles (Version 1.0)
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Guidance 2
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution. Modern smartphones, laptops and tablets provide users with great flexibility and...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data. Data sanitisation has to...
Standard
|
Published:
13/02/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
10 Steps to Cyber Security
This guidance is designed to help organisations protect themselves in cyberspace and best practises for cyberspace security. It relays the task of defending your networks, systems and...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Application Development
This guidance gives practical advice on the secure development, procurement and deployment of generic applications. There are three types of common security issues: Secure data handling ...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End user device (EUD) Security Guidance Windows 10 1809
This guidance covers the deployment of a range of end user device platforms for the secure configuration of Windows 10 1809. Risk owners and administrators should agree a configuration which...
Standard
|
Published:
01/01/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
End User Device (EUD) Security Guidance
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber security Centre (NCSC)
Principles
Defence Industry Security Notices
Industry Security Notices (ISNs) A Industry Security Notice (ISN) is an official document that tells people in industry about important instructions, guidance or other information relating...
Standard
|
Published:
01/01/2021
|
Authoring body:
Government Digital Services (GDS)
Guidance
ISO/IEC 27031:2011 IT Security Techniques — Guidelines for Information and Communication Technology Readiness for Business Continuity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2011
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27033-1:2015 IT Security Techniques — Network Security — Part 1: Overview and Concepts
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 20000-1:2018 IT Service Management — Part 1: Service Management System Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2018
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27018:2019 IT Security Techniques — Code of Practice for Protection of Personally Identifiable Information (PII) in Public Clouds acting as PII Processors
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27004:2016 IT Security Techniques — Information Security Management — Monitoring, Measurement, Analysis and Evaluation
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2016
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2012
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO 22301:2019 Security and Resilience — Business Continuity Management Systems — Requirements
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2019
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27013:2015 IT Security techniques — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1
ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
ISO/IEC 27034-2:2015 IT Security techniques - Application Security - Part 2: Organisation Normative Framework
This document provides a framework for application security. ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the...
Standard
|
Published:
01/01/2015
|
Authoring body:
International Organisation for Standardisation (ISO)
Standards
20 Entries
Per Page
4
Entries per Page
8
Entries per Page
20
Entries per Page
40
Entries per Page
60
Entries per Page
Showing 201 to 220 of 279 entries.
Page
1
...
Intermediate Pages Use TAB to navigate.
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
Page
10
Page
11
Page
12
Page
13
Page
14
Hidden