to add a new content
Resource
National Police Information Security Risk Management Framework

This framework is to ensure that all security risks are identified, assessed, and managed in accordance with best practice in order to facilitate improved governance. It is mandatory for all information systems that hold Police information or which deliver an operational service to policing to undergo a risk assessment, as stipulated in the National Policing Community Security Policy. The Security Risk Management Framework mutually supports the Police Cyber Assurance Framework (PCAF). The framework supports the requirements of the National Community Security Policy (NCSP.)

Published 01/05/2023
Authoring body: The Police Digital Service
Guidance
Resource
National Police Information Security Risk Management Guidance

The National Policing Information Security Risk Management Framework provides the foundations of risk management across policing in line with the Police Cyber Assurance Framework (PCAF). This guidance supports the risk management framework by detailing the actions required to firstly assess a risk, and then to manage it via the national risk register. This guide must be read in conjunction with the National Security Risk Management Framework.

Published 01/05/2023
Authoring body: The Police Digital Service
Standards
Resource
National Police Information Security Risk Management Risk Balance Case Template

The National Policing Information Security Risk Management Framework provides the foundations of risk management across policing in line with the Police Cyber Assurance Framework (PCAF). 

This template must be completed in conjunction with the National Security Risk Management Framework and Guidance.

The Risk Decision Document should be a single document that outlines any national risk, and the recommended measures for mitigating it. The template is organised into sections, each containing specific guidance points on content to be included.

Published 01/05/2023
Authoring body: The Police Digital Service
Reference Data / Templates
Resource
Safe deployment of TikTok

This guidance provides an overview of approaches to deploy TikTok safely

Published 01/06/2023
Authoring body: The Police Digital Service
Guidance
Resource
Robotic Process Automation Cyber Security Guidance

This guidance describes best practice cyber risk management controls for using Robotic Process Automation (RPA) 
for the purpose of automating manual administrative overheads for National Policing Forces and 
applications. This document only provides guidelines to automating manual processes and is not intended for machine 
learning (ML) or artificial intelligence (AI) derived solutions. Please refer to separate guidelines and standards 
for Digital Process Automation (DPA), AI and ML related activities.

Published 01/07/2023
Authoring body: The Police Digital Service
Guidance
Resource
Bluetooth Guidance V1.0

This guidance provides policing and law enforcement organisations with relevant information regarding risks associated with deploying Bluetooth technology within the workplace, and to enhance the risk-based decisions required in the use of such technology. This guidance adheres to the National Policing Community Security Policy Framework and is a suitable reference for community members, notably those who build and implement IT systems on behalf of national policing.

Published 01/04/2023
Authoring body: The Police Digital Service (PDS)
Guidance
Resource
NCSP Bluetooth Guidance v1.6

This guidance provides policing and law enforcement organisations with relevant information regarding risks associated with deploying Bluetooth technology within the workplace, and to enhance the risk-based decisions required in the use of such technology.

Published 01/04/2024
Authoring body: Police Digital Service
Guidance
Resource
Password Standard v1 approved by NCPSB JAN 23

This standard supports the National Community System Policy System Access requirements with respect to defining requirements for the use and selection of a password / passphrase-based method of authentication. It should be read in conjunction with the System Access standard. Passwords represent only one method of authentication (something that you know) and should be combined with other methods such as something you have (token) or something you are (biometric). It is not always possible especially with legacy applications or services to utilise multi-factor authentication, and this is where this standard can help to ensure that risks are effectively managed. A strong passphrase / password will help to ensure lawful business access to applications, mobile devices, systems and networks when combined with an agreed access control policy and supported by an Identity and Access Management (IAM) system. Undertaking a business impact assessment (BIA) is important to determine specific information security requirements to support proportionate risk management. This Standard is aligned with the NCSC’s password guidance.

Published 26/01/2023
Authoring body: Police Digital Service
Standards
Resource
Secure By Design

This guideline provides guidance on the principles and application of the System Development Standard (Secure By Design) methodology.

Published 08/02/2024
Authoring body: PDS
Guidance
Resource
Penetration testing and ITHC Guideline

This guidance describes approaches to delivering comprehensive Testing (using a range of attack types), penetration tests, to support security and risk compliance monitoring

Published 01/02/2024
Authoring body: PDS
Guidance