UK cyber security community

Last updated

The United Kingdom has a diverse cyber security community, interconnected in a complex network.

Contents

Public sector bodies

Legislative

According to a parliamentary committee the UK government is not doing enough to protect the nation against cyber attack. [1]

National strategy

The UK Government periodically publishes a Cyber Security Strategy. [3]

Many of the stakeholders across all categories are engaged with that effort.

Capstone components

The overall responsibility for security within the UK rests with the National Security Council which is a cabinet committee chaired by the Prime Minister tasked with overseeing all issues related to national security, intelligence coordination, and defence strategy.

The internal protective security coordination role for UK government is led by the Government Chief Security Officer (GCSO) within the Cabinet Office, who since 2021 has been Vincent Devine. [4]

The central organisation supporting the GCSO is the Government Security Group (GSG), with a distributed Government Security Function / Government Security Profession across the departments and Arms Length Bodies (ALB), and three National Technical Authorities (NTA), all of which have a role in information and/or cyber security:

  • The National Technical Authority for Cyber Security (NTA-C) is the National Cyber Security Centre (NCSC) is the UK's authority on cyber security; its parent organisation is GCHQ. It absorbed and replaced CESG (the information security arm of GCHQ) as well as the Centre for Cyber Assessment (CCA), Computer Emergency Response Team UK (CERT UK) and the cyber-related responsibilities of the former Centre for the Protection of National Infrastructure (CPNI). NCSC provides advice and support for the public and private sector in how to avoid cyber threats. [5] CESG (originally Communications-Electronics Security Group) was a branch of GCHQ which worked to secure the communications and information systems of the government and critical parts of UK national infrastructure. The NPSA provided protective security advice to businesses and organisations across the national infrastructure.
  • The National Technical Authority for Protective Security (NTA-P) is the National Protective Security Authority (NPSA) is the successor organisation to CPNI, but retains some elements of information and cyber security that were not transferred to NCSC, including for Cyber Physical Systems (CPS), and for security containers, locks, and structures to protect assets
  • The National Technical Authority for Technical Security (NTA-T) is the UK National Technical Authority for Counter-Eavesdropping (UK NACE), which deals predominantly with countering technical surveillance

Civilian components

The role of Lead Government Department (LGD) for Cyber Security is currently fulfilled by the Department for Science, Innovation, and Technology (DSIT), having previously rested with:

All other government departments and ALBs will have staff in the government security function / government security profession, supporting both their internal staff, and their client communities.

Former bodies in this category include:

Defence components

The Ministry of Defence has primacy for information and cyber security within both its civilian and military staffs (approximately 250,000 personnel), and for the Defence Supply Base (DSB - approximately 30,000 companies).

It has two main security organisations:

  • The Directorate of Security and Resilience (DSR), predominantly focused on physical and personnel security
  • The Directorate of Cyber Defence and Risk (CyDR), predominantly focused on information and cyber security

These organisation work collaboratively to publish not only the internal rules, but also Defence Standards and Industry Security Notices (ISN) [7]

In April 2016, the MOD announced the creation of the Cyber Security Operations Centre (CSOC) with a budget of over £40 million. It is located at MoD Corsham. [8] [9]

MOD collaborates with the DSB over information and cyber security matters through a number of organisations, including:

  • Defence Cyber Protection Partnership (DCPP) [10]

Former bodies in this category include:

  • DIPCOG, the Defence Infosec Product Co-Operation Group

National Cyber Force (NCF)

The National Cyber Force consolidates offensive cyber capabilities from the Ministry of Defence and GCHQ.

Law Enforcement

The National Crime Agency (NCA) hosts the law enforcement cyber crime unit, incorporating the Child Exploitation and Online Protection Centre.

Former bodies in this category include:

Wider Public Sector

Within the WPS, there are a number of collaborative bodies, including:


Regulatory bodies

Two regulatory bodies have a specific cyber security related function:

Most other regulatory bodies will have staff covering information and cyber security function for both their internal staff, and their client communities.

Professional bodies

Industry groups

UK Cyber Clusters
Bristol and Bath Cyber
Bournemouth Cyber Cluster
Cambridge Cluster
East Midlands
London
Malvern Cluster
Norfolk Cyber Cluster
North East Cyber Cluster
North Wales
North West Cluster
N Somerset Cluster
Oxford
Scottish Cyber Cluster
Solent Cyber Cluster
South Wales
South West Cyber Cluster (Exeter)
Sussex Cluster
Thames Valley Cluster
West Midlands Cluster
Yorkshire Cluster

Cross-sector bodies

Current bodies that cover multiple sectors include:

Former bodies in this category include:

See also

Related Research Articles

<span class="mw-page-title-main">GCHQ</span> British signals intelligence agency

Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primarily based at "The Doughnut" in the suburbs of Cheltenham, GCHQ is the responsibility of the country's Secretary of State for Foreign and Commonwealth Affairs, but it is not a part of the Foreign Office and its director ranks as a Permanent Secretary.

The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification. It is currently in version 3.1 revision 5.

Information security standards are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Federal Office for Information Security</span> German federal agency

The Federal Office for Information Security is the German upper-level federal agency in charge of managing computer and communication security for the German government. Its areas of expertise and responsibility include the security of computer applications, critical infrastructure protection, Internet security, cryptography, counter eavesdropping, certification of security products and the accreditation of security test laboratories. It is located in Bonn and as of 2024 has about 1,700 employees. Its current president, since 1 July 2023, is former business executive Claudia Plattner, who took over the presidency from Arne Schönbohm.

<span class="mw-page-title-main">National Protective Security Authority</span>

The National Protective Security Authority (NPSA) is the national technical authority in the United Kingdom for physical and personnel protective security, maintaining expertise in counter terrorism as well as state threats.

The CESG Claims Tested Mark, formerly CSIA Claims Tested Mark, is a UK Government Standard for computer security.

HMG Information Assurance Standard No.1, usually abbreviated to IS1, was a security standard applied to government computer systems in the UK.

<span class="mw-page-title-main">CESG Listed Adviser Scheme</span>

The CESG Listed Adviser Scheme was a programme run by CESG, to provide a pool of information assurance consultants to government departments and other public-sector bodies in the UK.

The Security Policy Framework is a set of high-level policies on security, mainly affecting the UK government and its suppliers.

<span class="mw-page-title-main">Robert Hannigan</span> British cybersecurity specialist

Robert Peter Hannigan CMG is a cybersecurity specialist who has been Warden of Wadham College, Oxford, since 2021. He was a senior British civil servant who previously served as the director of the signals intelligence and cryptography agency the Government Communications Headquarters (GCHQ) and established the UK's National Cyber Security Centre. His sudden resignation as director was announced on 23 January 2017, and he stepped down at the end of April 2017 to pursue a career in private sector cyber security, academia and as a security commentator. In 2021 he became Warden of Wadham College, Oxford.

The Chartered Institute of Information Security (CIISec), formerly the Institute of Information Security Professionals (IISP), is an independent, not-for-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole.

<span class="mw-page-title-main">IASME</span>

IASME Governance is an Information Assurance standard that is designed to be simple and affordable to help improve the cyber security of Small and medium-sized enterprises (SMEs).

<span class="mw-page-title-main">Nexor</span>

Nexor Limited is a privately held company based in Nottingham, providing products and services to safeguard government, defence and critical national infrastructure computer systems. It was originally known as X-Tel Services Limited.

The Government Security Classifications Policy (GSCP) is a system for classifying sensitive government data in the United Kingdom.

The Trustworthy Software Foundation (TSFdn) is a UK not-for-profit organisation, with stated aim of improving software.

<span class="mw-page-title-main">Ian Bryant (academic)</span> British computer scientist

Ian Bryant is a British academic. He is primarily involved in promoting Trustworthy Software and Systems, and in Standardisation.

The Government of the United Kingdom maintains several intelligence agencies that deal with secret intelligence. These agencies are responsible for collecting, analysing and exploiting foreign and domestic intelligence, providing military intelligence, and performing espionage and counter-espionage. Their intelligence assessments contribute to the conduct of the foreign relations of the United Kingdom, maintaining the national security of the United Kingdom, military planning, public safety, and law enforcement in the United Kingdom. The four main agencies are the Secret Intelligence Service, the Security Service (MI5), the Government Communications Headquarters (GCHQ) and Defence Intelligence (DI). The agencies are organised under three government departments, the Foreign Office, the Home Office and the Ministry of Defence.

Cyber Essentials is a United Kingdom certification scheme designed to show an organisation has a minimum level of protection in cyber security through annual assessments to maintain certification.

<span class="mw-page-title-main">National Cyber Security Centre (Ireland)</span>

The National Cyber Security Centre (NCSC) is a government computer security organisation in Ireland, an operational arm of the Department of the Environment, Climate and Communications. The NCSC was developed in 2013 and formally established by the Irish government in July 2015. It is responsible for Ireland's cyber security, with a primary focus on securing government networks, protecting critical national infrastructure, and assisting businesses and citizens in protecting their own systems. The NCSC incorporates the Computer Security Incident Response Team (CSIRT-IE).

The National Cyber Security Centre (NCSC) is an organisation of the United Kingdom Government that provides advice and support for the public and private sector in how to avoid computer security threats. It is the UK's National technical authority for cyber threats and Information Assurance. Based in Victoria, London, it became operational in October 2016, and its parent organisation is GCHQ.

References

  1. UK 'wholly' unprepared to stop devastating cyber-attack, MPs warn The Guardian
  2. "EURIM".
  3. "UK Cyber Security Strategy". HMG.
  4. "GCSO". HMG.
  5. HM Government (1 November 2016). "National Cyber Security Strategy 2016-2021" (PDF). gov.uk. Retrieved 2 November 2016.
  6. "OCSIA". Archived from the original on 2013-01-23. Retrieved 2013-01-14.
  7. "ISN". HMG. 14 December 2023.
  8. "Defence Secretary announces £40m Cyber Security Operations Centre". Ministry of Defence. 1 April 2016. Archived from the original on 25 April 2019. Retrieved 2 April 2016.
  9. Hammick, Murray (30 October 2018). "The Budget and Defence". The Military Times. London. Archived from the original on 22 October 2019. Retrieved 7 May 2020.
  10. "DCPP". HMG. 23 November 2023.
  11. "Cyber Technical Advisory Group" . Retrieved 2023-12-24.
  12. "ICO - About". 20 November 2023. Retrieved 2023-12-24.
  13. "ACFTI UK".
  14. "BCS Security".
  15. Kaye, David. (2008). Managing risk and resilience in the supply chain. London [England]: BSI Business Information. ISBN   978-1-62198-414-6. OCLC   849744629.
  16. "Home". crest-approved.org.
  17. "ADS".
  18. "CDF".
  19. "Home". tigerscheme.org.
  20. "BSI - NSB". www.bsigroup.com. Retrieved 2023-12-24.
  21. "Trustworthy Software Foundation" . Retrieved 2023-12-24.
  22. Protecting and promoting the UK in a digital world: 2 years on – Government Press Release, retrieved 12 December 2013
  23. "UKCSC" . Retrieved 2023-12-24.
  24. "WARP".
  25. "IAAC". Archived from the original on 2018-04-10. Retrieved 2013-01-14.
  26. "IAAC - Neville-Jones".
  27. "IAAC Sponsors". Archived from the original on 2017-06-07. Retrieved 2016-05-17.
  28. "Establishment of the IACG". National Archives. Archived from the original on 2008-03-05.
  29. "IACG Overview".
  30. "IA Community Map" (PDF). Archived from the original (PDF) on 2013-07-31. Retrieved 2013-01-14.
  31. EC2ND 2006 - Proceedings of the Second European Conference on Computer Network Defence, 2006
  32. "NDI UK". Archived from the original on 2016-10-21. Retrieved 2013-08-21.