Government security consists of four areas
Explore each area by clicking on the tiles below.
Cyber
Protecting information systems, the data on them and the services they provide, from unauthorised access, harm or misuse:
Personnel
Mitigating the risk of our trusted people exploiting their legitimate access to an organisation’s assets for unauthorised purposes:
Physical
Protecting physical assets, including people, services, infrastructure, systems, places, equipment and networks:
Technical
Holistically protecting sensitive information and technology from close access acquisition by hostile threat actors, as well as from any other form of technical manipulation.
Next Event
Annual Government Cyber Security Conference
January 29, 2025
The Government Cyber Security Conference 2025, will take place on Wednesday, 29 January 2025 at the Design Museum, London. We hope you are able to join us on the day.
Latest News & Events (See all)
Contracting Securely: new Modular Security Schedules
October 9, 2024
Government Chief Security Officer, Vincent Devine sets out the importance of the new Modular Security Schedules published on security.gov.uk.
CyberFirst Girls Competition
October 10, 2024
Spread the word about this exciting competition for girls aged 12 and 13, run by GCHQ’s National Cyber Security Centre.
Annual Government Cyber Security Conference
January 29, 2025
The Government Cyber Security Conference 2025, will take place on Wednesday, 29 January 2025 at the Design Museum, London. We hope you are able to join us on the day.
Newly added content
Copy of - Guide to adopting Secure by Design - Transition
November 5, 2024
Once you have put the fundamental processes in place, you can begin applying the Secure by Design approach to active…
Tackling Security Risk in Government Supply Chains
November 1, 2024
This guidance details how procurement, commercial and security practitioners operating in government should manage security risks in the commercial environment.
Secure by Design Organisation Status
October 31, 2024
This is restricted content. (Sign in required)