Cyber Assessment Framework (CAF) assesses how satisfactorily an organisation manages cyber threats to core functions. The outcomes of cyber attacks vary widely, both in terms of the nature of the computer systems attacked and the goals of the attackers. Generally, very strong levels of cyber privacy and flexibility are required in cases where the potential effects of cyber disasters are highly significant or even catastrophic. The NCSC has compiled the CAF for the institutions administrating the essential services and pursuits that are to the collective advantage of all of us.
As stated in the National Cyber Strategy, the CAF is being introduced as part of a new programme aimed at improving government cyber security. Outside of government, the organisations likely to find the CAF collection most useful fall into three broad categories:
CAF was designed to meet the following requirements:
The CAF is structured around four overall security objectives and 14 cyber security principles:
Appropriate organisational structures, policies and processes are in place to understand, assess, and systemically manage security risks.
Principles:
Proportionate security measures are in place to protect core government functions and critical systems from cyber attacks.
Principles:
Capabilities to ensure security defences remain effective and to detect cyber security events affecting, or with the potential to affect core government functions.
Principles:
Appropriate organisational structures, policies and processes are in place to understand, assess and systemically manage security risks.
Principles:
The objectives should be viewed as interdependent, where the CAF should contribute to performing continual security improvement activity through the detection of incidents and events contributing to lessons learned and the continual refinement of existing security measures.
The Indicators of Good Practice (IGP) are a set of statements developed by NCSC that describe what a good practice looks like in a particular area of cyber security. The IGP covers a range of cyber security practices across different categories, including governance, risk management, access control, network security, and incident management.
The IGP statements are meant to serve as a guide for companies to better understand what constitutes secure practices and how to implement them.
Each outcome is associated with a set of IGPs which are broken down into the following three categories with an explanation of how they should be interpreted, and recommended that these are worked through from top to bottom:
Copyright © 2023 Via Resource. All Rights Reserved.