Government security consists of four areas
Explore each area by clicking on the tiles below.

Cyber
Protecting information systems, the data on them and the services they provide, from unauthorised access, harm or misuse:

Personnel
Mitigating the risk of our trusted people exploiting their legitimate access to an organisation’s assets for unauthorised purposes:

Physical
Protecting physical assets, including people, services, infrastructure, systems, places, equipment and networks:

Technical
Holistically protecting sensitive information and technology from close access acquisition by hostile threat actors, as well as from any other form of technical manipulation.
Latest News (See all)

Annual Security Conference 1 May 2025: Celebrating skills, talent and collaboration
May 9, 2025
This is restricted content. (Sign in required)


Share With Care
November 11, 2024
A initiative to improve information security behaviours across government.
Newly added content
Overview of the self-assessment
June 19, 2025
What the self-assessment stage of the CAF for local government involves and how to download the workbooks.
How to complete a self-assessment workbook
June 19, 2025
What to consider when completing your CAF for local government self-assessment – from who to involve, to sharing with your…
Questions about Secure by Design
June 18, 2025
Common questions and useful information for Secure by Design champions, working groups and senior stakeholders within organisations.