Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
NCSC's Cyber Assessment Framework (CAF) 4.0 is a UK framework designed to help organizations providing essential services assess and improve their cyber resilience through a structured, outcome-focused approach.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
The organisation manages known vulnerabilities in network and information systems to prevent adverse impact on its essential function(s).








The organisation has developed and continues to improve a set of cyber security and resilience policies, processes and procedures that manage and mitigate the risk of adverse impact to network and information systems supporting its essential function(s).
























The organisation has protected the transit of data important to the operation of network and information systems supporting its essential function(s). This includes the transfer of data to third parties.




















The organisation designs security into network and information systems that support the operation of its essential function(s). The organisation minimises their attack surface and ensures that the operation of its essential function(s) should not be impacted by the exploitation of any single vulnerability.
















The organisation securely configures network and information systems that support the operation of its essential function(s).












The people who support the operation of network and information systems supporting the organisation's essential function(s) are appropriately trained in cyber security.




















The organisation holds accessible and secured current backups of data and information needed to recover operation of its essential function(s) following an adverse impact to network and information systems.
























The organisation is prepared to restore the operation of its essential function(s) following adverse impact to network and information systems.
















Before reuse and / or disposal the organisation appropriately sanitises devices, equipment and removable media holding data important to the operation of network and information systems supporting its essential function(s).












The organisation robustly verifies, authenticates and authorises access to network and information systems supporting its essential function(s).
















The organisation designs network and information systems supporting its essential function(s) to be resilient to cyber security incidents. Systems are appropriately segregated and resource limitations are mitigated.




















The organisation holds log data securely and grants appropriate user and system access only to accounts with a business need. Log data is held for a suitable retention period, after which it is deleted.
















The organisation proactively seeks to detect, within networks and information systems, adverse activity affecting, or with the potential to affect, the operation of essential functions even when the activity evades standard security prevent / detect solutions (or when standard solutions are not deployable).












Monitoring and detection personnel skills and roles, including those outsourced, reflect governance and reporting requirements, expected threats and the complexities of the network or system data they need to use. Monitoring and detection personnel have sufficient knowledge of network and information systems and the essential function(s) they need to protect.












The organisation has senior-level accountability for the security of network and information systems, and delegates decision-making authority appropriately and effectively. Risks to network and information systems related to the operation of the organization's essential function(s) are considered in the context of other organisational risks.












The organisation has effective organisational security management led at board level and articulated clearly in corresponding policies.




Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
