Skip to main content

What do you think of this service? Your feedback will help us to improve it.

Author: Local Digital

Useful links and resources

Useful resources to help you understand the principles behind the CAF for local government and how to improve your cyber resilience.

Managing security risk (objective A)

Make sure you have appropriate structures, policies and processes in place to manage security risks.

Governance (A1)

Resources on principle A1 – Governance:

Risk management (A2)

Resources on principle A2 – Risk management:

Asset management (A3)

Resources on principle A3 – Asset management:

Supply chain (A4)

Resources on principle A4 – Supply chain:

Minimising the impact of cyber security incidents (objective D)

Minimise the adverse impact of a cyber incident on your essential functions.

Response and recovery planning (D1)

Resources on principle D1 – Response and recovery planning:

Lessons learned (D2)

Learn about incident management and understanding the root cause of a risk.

Resources on principle D2 – Lessons learned:

Protecting against cyber attack (objective B)

Make sure you have proportional security measures in place to protect your network and information systems from cyber attacks.

Service protection policies and processes (B1)

Resources on principle B1 – Service protection policies and processes:

Identity and access control (B2)

Resources on principle B2 – Identity and access control:

Resources on identity and access management, password strategies and common approaches to designing IT systems and the risks associated with each system:

Resources on verifying a user’s identity, issuing credentials, authentication and access management:

Data security (B3)

Resources on principle B3 – Data security:

Resources on when to conduct a risk assessment:

Resources on protecting data:

Resources on device and data security:

System security (B4)

Resources on principle B4 – System security:

Useful NCSC security tools:

  • Protective Domain Name Service (NCSC.gov.uk) – prevents access to domains known to be malicious
  • Web Check (NCSC.gov.uk) – scans an organisation’s URLs to identify website vulnerabilities
  • Mail Check (NCSC.gov.uk) – provides protection against email spoofing and secures data in transit
  • Vulnerability disclosure toolkit (NCSC.gov.uk) – assists in the development of a vulnerability disclosure process

Resilient networks and systems (B5)

Resources on principle B5 – Resilient networks and systems:

Resources to make sure the essential functions performed by your organisation are resilient to cyber attack, and that business continuity and disaster planning plans are in place:

Staff awareness and training (B6)

Resources on principle B6 – Staff awareness and training:

Related courses and services:

Detecting cyber security events (objective C)

Make sure security defences remain effective and you can detect cyber security events affecting, or with the potential to affect, your essential functions.

Security monitoring (C1)

Resources on principle C1 – Security monitoring:

Resources on building good logging practices to understand, trace and react to system and security events:

Resources on threat intelligence:

Proactive security event discovery (C2)

Resources on principle C2 – security event discovery:

More resources

Contact the CAF for local government team

Email us to ask a question or share feedback.

Sign up to UK Government Security

Subscribe to our newsletters to receive notifications when changes to strategy, policy, standards, and guidance are published on the website.

Sign up now