Search - National Standard Microsite
National Standards can be classified based on whether they are conceptual, rule based or value based:
- Principles - The defining characteristic of a principle document is that it is conceptual. It describes a target state or end goal without specifying how it will be achieved.
- Guidance/Policies/Standards - The defining characteristic of guidance, policies and standards are that they are rule based. The document specifies the rules to be applied to achieve a particular state.
- Technical Reference Templates - The defining characteristic of a template is that it is value based. It specifies exactly the values that must be used.
National Standards graded 4Pol are standards which meet the below criteria and should be considered first, before any other standard in that category, as they fit the National Policing Digital Strategy allowing forces and suppliers to converge on a single set of standards.
4Pol Criteria:
- Support minimum legal requirements where they exist
- Align with the National Policing Digital Strategy to ensure strategic alignment and design
- Align with the TechUK Justice & Emergency Services Interoperability Charter to deliver better data sharing, exchanging and exploitation
- Direct relevance and applicability to policing
- Represent best practice
- Able to be measured and achieved within the unique landscape of policing
National Standards graded MLR stem directly from legislative requirements, such as the General Data Protection Regulation (GDPR) standards. These are National Standards which represent the minimum requirements to ensure that data and technology in use is operated in a lawfully compliant manner. These should be considered the baseline in applicable categories.
National Standards are divided into broad categories based on their focus. To recognise there is no clear dividing line, some National Standards may possess two categories, but the selected category reflects the primary focus of the National Standard:
- Analytics - Digital systems capable of creating actionable information from structured or unstructured data
- Asset Management - The way in which IT assets are acquired, used and disposed of
- Incident, Crime and Records Management Systems
- Digital systems used to manage policing and corporate records
- Cloud - Remote, off-premises computer system resources which host a range of functions across a potentially wide range of distributed sites
- Data - Information held in a structured or unstructured digital format
- Devices - Physical devices capable of viewing, changing, creating, distributing or storing digital information
- Digital Media - Media stored in an electronic format from any source
- Enterprise Resource Planning - Enterprise resource planning (ERP) is the management of integrated business processes via a software solution
- Forensics - The use of investigative technology and methodology to gather intelligence and admissible evidence
- Intelligence Systems - Digital system used to view, change, create, distribute or store sensitive digital information
- Justice - Systems, technologies and methodologies used within the Criminal Justice System
- Mobility - Software specifically designed to run on a mobile device such as a phone, tablet or watch
- Office Productivity & Collaboration Systems - Software specifically designed to address specific business needs such as communication, collaboration, document creation and content management
- Operational Policing - Specialist operational policing functions
- Security - The technology and methodology used in the protection of digital assets and services
Tags are assigned to National Standards to help users find grouped / related documentation
NCSP Secure By Design (SbD) Guideline V1.1
This document provides detailed guidance to support the National Community Security Policy (NCSP) system development (Secure by Design SbD) standard. Secure by Design as a methodology has been selected to ensure that a repeatable, structured, and consistent approach to the secure delivery of solutions across policing is achieved, as well as ensuring that risks are managed within risk appetite.
System Development – Secure by Design (SbD) Standard
This standard outlines the functions within the Secure By Design (SbD) process, aligned to project stages, to ensure a consistent approach to cyber security is achieved throughout a system’s development. The purpose of this standard is to define an approach to ensure that all products / solutions are assured in a repeatable, structured and consistent way. This will enable security controls to be designed into solutions at an early stage, ensuring the secure delivery of solutions across policing, whilst identifying and managing risk to within risk appetite.
This standard adheres to the National Policing Community Security Policy Framework and is a suitable reference for community members, notably those who build and implement IT systems on behalf of national policing.
NCSP Systems Management v1.1
This standard defines the requirements which, when applied, will assist with the secure management of systems and networks.
This standard adheres to the National Policing Community Security Policy Framework and is a suitable reference for community members, notably those who build and implement IT systems on behalf of national policing.
This standard adheres to the National Policing Community Security Policy Framework and is a suitable reference for community members, notably those who build and implement IT systems on behalf of national policing.
Overseas IT Access Guideline
This guidance describes best practice risk management controls for accessing Policing ICT resources whilst abroad. It also describes the circumstances when forces can make a local decision or when referral to NSIRO is required when use abroad is required.
Information Compliance using Microsoft Purview
This guideline is a baseline for Policing in use of Microsoft Purview from a Information Compliance; oversight and measurement perspective
NCSP Bluetooth Guidance Document v1.7
This guideline provides audiences with background information concerning Bluetooth technology and guidance on how it can be suitably and securely deployed within the Law Enforcement environment.
It’s purpose is to provide relevant information, enabling users of Bluetooth technology to achieve operational capability whilst minimising the risks of data security compromise.
NCSP Guideline: INFORMATION TRANSFER
Information transfer is the process of moving information from one location to another. Policies and processes are required to protection information during this process.
Any activity involving the movement of information from one place to another carries inherent risk whereby the confidentiality, integrity or availability of that information may be compromised. Appropriate and proportionate steps must be taken to ensure the security requirements of the information being transferred are protected against deliberate or inadvertent, authorised or unauthorised attack, damage or loss.
ANNEX A – Legacy NPIRMT Protection of OFFICIAL Police Data in Transit – Risks & contextual risk mitigation tables
NCSP Vulnerability Management v2.0
This standard supports the policy set out in the National Community Security Policy, providing requirements for those designing, building and running IT services, managing threats and vulnerabilities within PDS and policing systems.
NCSP Network Security v1.2
This standard supports the policy set out in the National Community Security Policy, providing requirements for those designing, building and running network services on behalf of national policing. This standard details a minimum set of security requirements and controls that must be met to ensure security and segregation of network services.
NCSP Technical Security Management Standard v1.1
This Standard specifies the minimum requirements regarding technical security management. It describes the requirements to enable members of the community of trust to build and operate an effective technical security infrastructure, applying security architecture principles and integrating technical security solutions, such as malware protection, intrusion detection and cryptography
Showing 1 to 10 of 189 entries.