Skip to Main Content
Police Digital Service National Standards
Authentication failed. Please enable browser cookies and try again.
Sign In
Email Address
Password
Caps Lock is on.
Log in
Sign up
Forgot Password
Standards search - National Standard Microsite
Standards
Search Everything
Standards search
APIs
Blueprints
Procurement
About
Updates
FAQs
Contact Us
Status
Live (163)
Draft (6)
Retired (102)
Clear All
Classification
Principles (27)
Policy (23)
Reference Data / Templates (13)
Standards (114)
Guidance (94)
Clear All
Grade: PMR
true (54)
false (217)
Clear All
Grade: LMR
false (234)
true (37)
Clear All
Internally Amended / Developed
true (60)
false (211)
Clear All
Categories
Security (160)
Incident, Crime and Records Management (25)
Data (21)
Devices (17)
Forensics (17)
Intelligence Systems (17)
Operational Policing (12)
Criminal Justice (12)
Analytics (11)
Mobile Applications (7)
Clear All
Tags
ncsp (67)
cyber (53)
standard (47)
risk (41)
operational policing (36)
sbd (25)
assurance (23)
resilience (23)
network (22)
compliance (21)
See more
licenced-standard (20)
cyber attack (19)
security (18)
investigation (16)
images and video (15)
accreditation (15)
intelligence (14)
cjs (13)
coordination (13)
application (11)
Clear All
Sign in
to add a new content
Newest
A-Z
List
Grid
No entries were found.
DDL search listings
IDENT1
This document should be used in reference to the appropriate legislation, such as the Protection of Freedoms Act 2012: DNA & Fingerprint Provisions IDENT1 is the UK’s nationals automated...
Standard
|
Published:
01/01/2019
|
Authoring body:
Home Office
Reference Data / Templates
ICT Asset Recovery Standard 7.0
Asset Disposal & Information Security Alliance (ADISA) is an organisation designed to improve risk management and data protection within business processes for IT asset retirement and disposal....
Standard
|
Published:
01/01/2020
|
Authoring body:
Asset Disposal & Information Security Alliance (ADISA)
Standards
Cyber Essentials guidance
Most cyber attacks are conducted by unskilled individuals and are very basic in nature and cyber security is an important aspect to guard any organisation from cyber attacks. There are five...
Standard
|
Published:
01/01/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Principles (Version 1.0)
The End User Device (EUD) Security Principles sets out 12 core guidance principles that underpin the safety and security of using devices that serve the purpose of working remotely. The twelve...
Standard
|
Published:
01/01/2019
|
Authoring body:
National Cyber Security Centre (NCSC)
Principles
End User Device (EUD) Security Guidance 2
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution. Modern smartphones, laptops and tablets provide users with great flexibility and...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Secure Sanitisation of Storage Media (Version 1.0)
Data sanitisation is a key aspect to any organisations dealing with data storage media and who want to ensure that unauthorised parties do not gain access to their data. Data sanitisation has to...
Standard
|
Published:
13/02/2020
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
10 Steps to Cyber Security
This guidance is designed to help organisations protect themselves in cyberspace and best practises for cyberspace security. It relays the task of defending your networks, systems and...
Standard
|
Published:
11/05/2021
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
Application Development
This guidance gives practical advice on the secure development, procurement and deployment of generic applications. There are three types of common security issues: Secure data handling ...
Standard
|
Published:
01/01/2018
|
Authoring body:
National Cyber Security Centre (NCSC)
Guidance
8 Entries
Per Page
4
Entries per Page
8
Entries per Page
20
Entries per Page
40
Entries per Page
60
Entries per Page
Showing 193 to 200 of 271 entries.
Page
1
...
Intermediate Pages Use TAB to navigate.
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
Page
10
Page
11
Page
12
Page
13
Page
14
Page
15
Page
16
Page
17
Page
18
Page
19
Page
24
Page
25
Page
26
...
Intermediate Pages Use TAB to navigate.
Page
27
Page
28
Page
29
Page
30
Page
31
Page
32
Page
33
Page
34
Hidden