security-guidance.service.justice.gov.uk Open in urlscan Pro
2606:50c0:8002::153  Public Scan

Submitted URL: http://security-guidance.service.justice.gov.uk/
Effective URL: https://security-guidance.service.justice.gov.uk/
Submission: On February 08 via manual from GB — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://duckduckgo.com/

<form method="get" id="search" action="https://duckduckgo.com/">
  <input type="text" name="q" size="36" maxlength="255" value="">
  <input type="hidden" name="sites" value="security-guidance.service.justice.gov.uk">
  <input type="submit" value="Search...">
</form>

Text Content

This website uses cookies to ensure you get the best experience on our website.
Learn more
Got it!
Skip to main content
Ministry of Justice Security Guidance

Table of contents


 * Cyber and Technical Security Guidance
   * Summary
     * Popular links
     * Change log
     * Offline content
     * Security culture
     * Getting in touch
     * Background
   * Information structure
     * Information security policies
       * Management direction for information security
     * Mobile devices and teleworking
       * Mobile device policy
       * Teleworking
     * Human resource security
       * Prior to employment
       * During employment
       * Termination and change of employment
     * Asset management
       * Responsibility for assets
       * Information classification
       * Media handling
     * Access control
       * Business requirements of access control
       * User access management
       * User responsibilities
       * System and application access control
     * Cryptography
       * Cryptographic controls
     * Physical and environmental security
       * Secure areas
       * Equipment
     * Operations security
       * Operational procedures and responsibilities
       * Protection from malware
       * Backup
       * Logging and monitoring
       * Control of operational software
       * Technical vulnerability management
     * Communications security
       * Network security management
       * Information transfer
     * System acquisition, development and maintenance
       * Security requirements of information systems
       * Security in development and support processes
       * Test data
     * Supplier relationships
       * Information security in supplier relationships
       * Supplier service delivery management
     * Information security incident management
       * Management of information security incidents and lost devices
     * Information security aspects of business continuity management
       * Information security continuity
     * Compliance
       * Compliance with legal and contractual requirements
       * Information security reviews
     * Risk Assessment
       * Risk Management
       * Risk Assessment Process
   * Other Guidance
     * Glossary
     * Acronyms
     * Technical Guidance
   * Feedback


CYBER AND TECHNICAL SECURITY GUIDANCE


SUMMARY

This site documents some of the security decisions that the Ministry of Justice
(MoJ) has made for the products we operate, and our relationships with
suppliers.

The MoJ Technical Guidance covers technical decisions in the MoJ more widely.

Note: This guidance is dated: 7 February 2022.


POPULAR LINKS

Popular links for all users:

 * Security threat level and emergency procedures
 * Overseas travel and accessing MoJ IT systems from overseas
 * General app guidance
 * Minimum User Clearance Requirements Guide
 * Government classification scheme
 * Remote Working


CHANGE LOG

A ‘change log’ is available. It details the most recent changes to this
information.

The changes are also available as RSS or Atom feeds.


OFFLINE CONTENT

For convenience, offline versions of this guidance are available.

Audience PDF format EPUB format All users. Does not include lots of technical
detail. PDF EPUB Group Security. Contains Group Security policy and guidance.
PDF EPUB Technical users. Includes lots of technical detail. This document
contains all content, including for ‘All users’ and from Group Security.
Download this document if you want the complete set of published MoJ security
policy and guidance. PDF EPUB

The offline versions of this guidance are time-limited, and are not valid after
7 March 2022.


SECURITY CULTURE

In addition to the obvious security resources such as policies, controls, and
software and hardware tools, all organisations need employees, suppliers and
other colleagues to behave in a way that helps ensure good security at all
times. A simple example is where someone will act in a way that maintains good
security, even if they don’t know exactly what the formal process is. The extent
to which an organisation has good security in indicated by its security culture.

Security culture refers to the set of values, shared by everyone in an
organisation, that determines how people are expected to think about and
approach security. Getting security culture right helps develop a security
conscious workforce, and promotes the desired security behaviours expected from
everyone working in or for the organisation.

The MoJ is creating a portfolio of security culture resources to help supplement
the formal policy and guidance material. Initial security culture material is
available for preview here.


GETTING IN TOUCH

 * To report an incident.
 * For general assistance on MoJ security matters, email
   security@justice.gov.uk.
 * For Cyber Security assistance or consulting, email
   CyberConsultancy@digital.justice.gov.uk. More information about the Cyber
   Security Consultancy Team is available.
 * Suppliers to the MoJ should first communicate with their usual MoJ points of
   contact.


BACKGROUND

Government Functional Standard - GovS 007: Security replaces the HMG Security
Policy Framework (SPF). The policies which sit within that framework remain in
effect, but are now in support of this standard.



Sections 6.3 Cyber security and 6.4 Technical security of the standard state:

 * > The purpose of cyber security is to ensure the security of data and
   > information. To operate effectively, the UK government needs to maintain
   > the confidentiality, integrity and availability of its information, systems
   > and infrastructure, and the services it provides.

 * > The purpose of technical security measures is to holistically protect
   > sensitive information and technology from close access acquisition or
   > exploitation by hostile actors, as well as any other form of technical
   > manipulation. Technical security also relates to the protection of security
   > systems from compromise and/or external interference.


INFORMATION STRUCTURE

The MoJ has developed our cyber and technical security taxonomy as follows:

Level 1 Level 2 Information security policies Management direction for
information security Mobile devices and teleworking Mobile device policy  
Teleworking Human resource security Prior to employment   During employment
Asset management Responsibility for assets   Information classification   Media
handling Access control Business requirements of access control   User access
management   User responsibilities   System and application access control
Cryptography Cryptographic controls Physical and environmental security Secure
areas   Equipment Operations security Operational procedures and
responsibilities   Protection from malware   Backup   Logging and monitoring  
Control of operational software   Technical vulnerability management
Communications security Network security management   Information transfer
System acquisition, development and maintenance Security requirements of
information systems   Security in development and support processes   Test data
Supplier relationships Information security in supplier relationships   Supplier
service delivery management Information security incident management Management
of information security incidents and lost devices Information security aspects
of business continuity management Information security continuity Compliance
Compliance with legal and contractual requirements   Information security
reviews Risk Assessment Risk Assessment Process

The documents have been developed and defined within this taxonomy, and are
listed in the next section, together with their suggested target audiences.


INFORMATION SECURITY POLICIES

MANAGEMENT DIRECTION FOR INFORMATION SECURITY

Avoiding too much security All users IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER
All users IT Security All Users Policy All users (Policy) IT Security Policy
(Overview) All users (Policy) IT Security Technical Users Policy Technical
Architect, DevOps, IT Service Manager, Software Developer (Policy) Line Manager
approval All users Shared Responsibility Models Technical Architect, DevOps, IT
Service Manager, Software Developer Technical Controls Policy Technical
Architect, DevOps, IT Service Manager, Software Developer


MOBILE DEVICES AND TELEWORKING

MOBILE DEVICE POLICY

Mobile Device and Remote Working Policy All users (Policy) Remote Working All
users

TELEWORKING

Accessing MoJ IT systems from overseas All users General advice on taking
equipment overseas All users Personal Devices All users


HUMAN RESOURCE SECURITY

PRIOR TO EMPLOYMENT

Minimum User Clearance Levels Guide All users National Security Vetting contact
All users National Security Vetting questions All users National Security
Vetting for External Candidates FAQ All users Pre-employment screening All users
Pre-Employment Screening and Vetting of External Candidates - FAQs All users
Security clearance appeals policy All users Security clearance appeals
procedures All users Security vetting assessment of need All users

DURING EMPLOYMENT

Ongoing Personnel Security All users Personnel risk assessment All users
Reporting personal circumstance changes All users Training and Education All
users Voluntary drug testing policy All users Voluntary drug testing policy
procedures All users

TERMINATION AND CHANGE OF EMPLOYMENT

End or change of employment All users Leavers with NSC and NSVCs All users


ASSET MANAGEMENT

RESPONSIBILITY FOR ASSETS

Acceptable use All users Acceptable use policy All users (Policy) Guidance on IT
Accounts and Assets for Long Term Leave All users Protect Yourself Online All
users Web browsing security All users

INFORMATION CLASSIFICATION

Data Handling and Information Sharing Guide Technical Architect, DevOps, IT
Service Manager, Software Developer Government Classification Scheme All users
Information Classification and Handling Guide All users Information
Classification and Handling Policy All users (Policy) Secrets management
Technical Architect, DevOps, IT Service Manager, Software Developer

MEDIA HANDLING

Removable media All users Secure disposal of IT equipment All users Secure
disposal of IT - physical and on-premise All users Working securely with paper
documents and files All users


ACCESS CONTROL

BUSINESS REQUIREMENTS OF ACCESS CONTROL

Access Control Guide Technical Architect, DevOps, IT Service Manager, Software
Developer Access Control Policy Technical Architect, DevOps, IT Service Manager,
Software Developer Enterprise Access Control Policy Technical Architect, DevOps,
IT Service Manager, Software Developer Privileged Account Management Guide
Technical Architect, DevOps, IT Service Manager, Software Developer

USER ACCESS MANAGEMENT

Authentication Technical Architect, DevOps, IT Service Manager, Software
Developer Management access Technical Architect, DevOps, IT Service Manager,
Software Developer Managing User Access Guide Technical Architect, DevOps, IT
Service Manager, Software Developer Multi-Factor Authentication Technical
Architect, DevOps, IT Service Manager, Software Developer Privileged User
Backups, Removable Media and Incident Management Guide Technical Architect,
DevOps, IT Service Manager, Software Developer Privileged User Configuration,
Patching and Change Management Guide Technical Architect, DevOps, IT Service
Manager, Software Developer Privileged User Guide Technical Architect, DevOps,
IT Service Manager, Software Developer Privileged User Logging and Protective
Monitoring Guide Technical Architect, DevOps, IT Service Manager, Software
Developer

USER RESPONSIBILITIES

Protecting Social Media Accounts All users

SYSTEM AND APPLICATION ACCESS CONTROL

Account management Technical Architect, DevOps, IT Service Manager, Software
Developer Authorisation Technical Architect, DevOps, IT Service Manager,
Software Developer Multi-user accounts and Public-Facing Service Accounts Guide
Technical Architect, DevOps, IT Service Manager, Software Developer Password
Creation and Authentication Guide Technical Architect, DevOps, IT Service
Manager, Software Developer Password Management Guide Technical Architect,
DevOps, IT Service Manager, Software Developer Password Managers All users
Passwords All users Password Storage and Management Guide Technical Architect,
DevOps, IT Service Manager, Software Developer Policies for Google Apps
administrators Technical Architect, DevOps, IT Service Manager, Software
Developer Policies for MacBook Administrators Technical Architect, DevOps, IT
Service Manager, Software Developer System User and Application Administrators
Technical Architect, DevOps, IT Service Manager, Software Developer Using
LastPass Enterprise All users


CRYPTOGRAPHY

CRYPTOGRAPHIC CONTROLS

Automated certificate renewal Technical Architect, DevOps, IT Service Manager,
Software Developer Cryptography Technical Architect, DevOps, IT Service Manager,
Software Developer HMG Cryptography Business Continuity Management Standard
Technical Architect, DevOps, IT Service Manager, Software Developer Public Key
Infrastructure Policy Technical Architect, DevOps, IT Service Manager, Software
Developer Use of HMG Cryptography Policy Technical Architect, DevOps, IT Service
Manager, Software Developer


PHYSICAL AND ENVIRONMENTAL SECURITY

SECURE AREAS

CCTV policy All users Entry and exit search policy All users Personal mail and
parcel delivery policy and procedure All users Physical security policy All
users Public protest and demonstrations policy All users Security in the office
All users Security threat level and emergency procedures All users Visitor
access policy All users

EQUIPMENT

Clear Screen and Desk Policy All users Equipment Reassignment Guide All users
Laptops All users Locking and shutdown All users Policies for MacBook Users All
users System Lockdown and Hardening Standard Technical Architect, DevOps, IT
Service Manager, Software Developer


OPERATIONS SECURITY

OPERATIONAL PROCEDURES AND RESPONSIBILITIES

Active Cyber Defence: Mail Check Technical Architect, DevOps, IT Service
Manager, Software Developer Active Cyber Defence: Public Sector DNS Technical
Architect, DevOps, IT Service Manager, Software Developer Active Cyber Defence:
Web Check Technical Architect, DevOps, IT Service Manager, Software Developer
Offshoring Guide Technical Architect, DevOps, IT Service Manager, Software
Developer

PROTECTION FROM MALWARE

Malware Protection Guide (Overview) Technical Architect, DevOps, IT Service
Manager, Software Developer Malware Protection Guide: Defensive Layer 1
Technical Architect, DevOps, IT Service Manager, Software Developer Malware
Protection Guide: Defensive Layer 2 Technical Architect, DevOps, IT Service
Manager, Software Developer Malware Protection Guide: Defensive Layer 3
Technical Architect, DevOps, IT Service Manager, Software Developer Ransomware
All users

BACKUP

System backup guidance Technical Architect, DevOps, IT Service Manager, Software
Developer System backup policy Technical Architect, DevOps, IT Service Manager,
Software Developer System backup standard Technical Architect, DevOps, IT
Service Manager, Software Developer

LOGGING AND MONITORING

Accounting Technical Architect, DevOps, IT Service Manager, Software Developer
Commercial off-the-shelf applications Technical Architect, DevOps, IT Service
Manager, Software Developer Custom Applications Technical Architect, DevOps, IT
Service Manager, Software Developer Logging and monitoring Technical Architect,
DevOps, IT Service Manager, Software Developer Online identifiers in security
logging and monitoring Technical Architect, DevOps, IT Service Manager, Software
Developer Protective Monitoring Technical Architect, DevOps, IT Service Manager,
Software Developer Security Log Collection Technical Architect, DevOps, IT
Service Manager, Software Developer Security Log Collection: Enterprise IT -
Infrastructure Technical Architect, DevOps, IT Service Manager, Software
Developer Security Log Collection: Enterprise IT - Mobile Devices Technical
Architect, DevOps, IT Service Manager, Software Developer Security Log
Collection: Hosting Platforms Technical Architect, DevOps, IT Service Manager,
Software Developer Security Log Collection: Log entry metadata Technical
Architect, DevOps, IT Service Manager, Software Developer Security Log
Collection: Maturity Tiers Technical Architect, DevOps, IT Service Manager,
Software Developer

CONTROL OF OPERATIONAL SOFTWARE

Guidance for using Open Internet Tools All users

TECHNICAL VULNERABILITY MANAGEMENT

Patch management guide Technical Architect, DevOps, IT Service Manager, Software
Developer Vulnerability Disclosure Technical Architect, DevOps, IT Service
Manager, Software Developer Vulnerability Disclosure: Implementing security.txt
Technical Architect, DevOps, IT Service Manager, Software Developer
Vulnerability scanning and patch management guide Technical Architect, DevOps,
IT Service Manager, Software Developer Vulnerability scanning guide Technical
Architect, DevOps, IT Service Manager, Software Developer


COMMUNICATIONS SECURITY

NETWORK SECURITY MANAGEMENT

Code of Connection Standard Technical Architect, DevOps, IT Service Manager,
Software Developer Defensive domain registrations Technical Architect, DevOps,
IT Service Manager, Software Developer Domain names and Domain Name System (DNS)
security policy Technical Architect, DevOps, IT Service Manager, Software
Developer Internet v. PSN Technical Architect, DevOps, IT Service Manager,
Software Developer IP DNS Diagram Handling Technical Architect, DevOps, IT
Service Manager, Software Developer Multiple Back-to-back Consecutive Firewalls
Technical Architect, DevOps, IT Service Manager, Software Developer Networks are
just bearers Technical Architect, DevOps, IT Service Manager, Software Developer

INFORMATION TRANSFER

Bluetooth All users Criminal Justice Secure Mail (CJSM) Technical Architect,
DevOps, IT Service Manager, Software Developer Data Sovereignty Technical
Architect, DevOps, IT Service Manager, Software Developer Email All users Email
Authentication Guide Technical Architect, DevOps, IT Service Manager, Software
Developer Email Blocklist Policy Technical Architect, DevOps, IT Service
Manager, Software Developer Email Blocklist Process Technical Architect, DevOps,
IT Service Manager, Software Developer Email Security Guide Technical Architect,
DevOps, IT Service Manager, Software Developer General Apps Guidance All users
Secure Data Transfer Guide All users Secure Email Transfer Guide Technical
Architect, DevOps, IT Service Manager, Software Developer Sending information
securely All users Spam and Phishing Guide Technical Architect, DevOps, IT
Service Manager, Software Developer Web browsing security policy profiles All
users (Policy) Wifi security policy All users (Policy)


SYSTEM ACQUISITION, DEVELOPMENT AND MAINTENANCE

SECURITY REQUIREMENTS OF INFORMATION SYSTEMS

Technical Security Controls Guide Technical Architect, DevOps, IT Service
Manager, Software Developer Technical Security Controls Guide: Defensive Layer 1
Technical Architect, DevOps, IT Service Manager, Software Developer Technical
Security Controls Guide: Defensive Layer 2 Technical Architect, DevOps, IT
Service Manager, Software Developer

SECURITY IN DEVELOPMENT AND SUPPORT PROCESSES

Maintained by Default Technical Architect, DevOps, IT Service Manager, Software
Developer Secure by Default Technical Architect, DevOps, IT Service Manager,
Software Developer Source Code Publishing Technical Architect, DevOps, IT
Service Manager, Software Developer System Test Standard Technical Architect,
DevOps, IT Service Manager, Software Developer

TEST DATA

Using Live Data for Testing purposes Technical Architect, DevOps, IT Service
Manager, Software Developer


SUPPLIER RELATIONSHIPS

INFORMATION SECURITY IN SUPPLIER RELATIONSHIPS

Suppliers to MoJ: Assessing Suppliers Technical Architect, DevOps, IT Service
Manager, Software Developer Suppliers to MoJ: Contracts Technical Architect,
DevOps, IT Service Manager, Software Developer Suppliers to MoJ: Security Aspect
Letters Technical Architect, DevOps, IT Service Manager, Software Developer
Suppliers to MoJ: Supplier Corporate IT Technical Architect, DevOps, IT Service
Manager, Software Developer

SUPPLIER SERVICE DELIVERY MANAGEMENT

Azure Account Baseline Templates Technical Architect, DevOps, IT Service
Manager, Software Developer Baseline for Amazon Web Services accounts Technical
Architect, DevOps, IT Service Manager, Software Developer Baseline for Azure
Subscriptions Technical Architect, DevOps, IT Service Manager, Software
Developer


INFORMATION SECURITY INCIDENT MANAGEMENT

MANAGEMENT OF INFORMATION SECURITY INCIDENTS AND LOST DEVICES

Forensic Principles Technical Architect, DevOps, IT Service Manager, Software
Developer Forensic Readiness Guide Technical Architect, DevOps, IT Service
Manager, Software Developer Forensic Readiness Policy Technical Architect,
DevOps, IT Service Manager, Software Developer Incident Management Plan and
Process Guide Technical Architect, DevOps, IT Service Manager, Software
Developer IT Incident Management Policy Technical Architect, DevOps, IT Service
Manager, Software Developer Lost devices or other IT security incidents All
users Reporting an incident All users


INFORMATION SECURITY ASPECTS OF BUSINESS CONTINUITY MANAGEMENT

INFORMATION SECURITY CONTINUITY

IT Disaster Recovery Plan and Process Guide Technical Architect, DevOps, IT
Service Manager, Software Developer IT Disaster Recovery Policy Technical
Architect, DevOps, IT Service Manager, Software Developer


COMPLIANCE

COMPLIANCE WITH LEGAL AND CONTRACTUAL REQUIREMENTS

Data Destruction Technical Architect, DevOps, IT Service Manager, Software
Developer Data Destruction: Contract Clauses - Definitions Technical Architect,
DevOps, IT Service Manager, Software Developer Data Destruction: Contract
Clauses - Long Format Technical Architect, DevOps, IT Service Manager, Software
Developer Data Destruction: Contract Clauses - Long Format (Appendix) Technical
Architect, DevOps, IT Service Manager, Software Developer Data Destruction:
Contract Clauses - Short Format Technical Architect, DevOps, IT Service Manager,
Software Developer Data Destruction: Instruction and Confirmation Letter
Technical Architect, DevOps, IT Service Manager, Software Developer Data
Security and Privacy All users Data Security & Privacy Lifecycle Expectations
Technical Architect, DevOps, IT Service Manager, Software Developer Data
Security & Privacy Triage Standards Technical Architect, DevOps, IT Service
Manager, Software Developer

INFORMATION SECURITY REVIEWS

Standards Assurance Tables Technical Architect, DevOps, IT Service Manager,
Software Developer


RISK ASSESSMENT

RISK MANAGEMENT

Infrastructure and system accreditation Technical Architect, DevOps, IT Service
Manager, Software Developer IT Health Checks Technical Architect, DevOps, IT
Service Manager, Software Developer IT Health Check - Test cancellations and
delays Technical Architect, DevOps, IT Service Manager, Software Developer

RISK ASSESSMENT PROCESS

Risk reviews All users


OTHER GUIDANCE

The Government Functional Standard - GovS 007: Security provides the base
material for all security guidance in the MoJ.


GLOSSARY

A glossary of some terms used in this guidance is available here.


ACRONYMS

A more extensive list of acronyms is available here.


TECHNICAL GUIDANCE

The MoJ Technical Guidance should be read together with this security-focused
guidance.


FEEDBACK

> If you have any questions or comments about this guidance, such as suggestions
> for improvements, please contact: itpolicycontent@digital.justice.gov.uk.

Open Government Licence

All content is available under the Open Government Licence v3.0, except where
otherwise stated

© Crown copyright