TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
Government

NCSC updates Cyber Assessment Framework

by Mark Rowe

The UK official National Cyber Security Centre (NCSC) has launched an updated version of the Cyber Assessment Framework. The last version was published in April 2024. According to the NCSC, the adoption of CAF has continued to spread. It’s now used by nearly all UK cyber regulators and GovAssure, the cyber security assurance scheme for assessing the UK’s critical national infrastructure (CNI). At the same time, the NCSC adds, the cyber threat to the UK’s CNI has continued to increase.

New sections cover how to go about building a deeper understanding of attacker methods and motivations to inform better cyber risk decisions; and for ensuring software used in essential services is developed and maintained securely. The new version has updates to the section on security monitoring and threat hunting to improve the detection of cyber threats; and offers more coverage of AI-related cyber risks. For a blog post about the updates visit the NCSC website: https://www.ncsc.gov.uk/blog-post/caf-v4-0-released-in-response-to-growing-threat.

Comments

James Neilson, SVP International at OPSWAT, says: “The NCSC’s updated CAF for UK CNI is a welcome step. Security teams within critical infrastructure sectors are often expected to manage unfamiliar systems, and few individuals possess deep expertise in both IT and OT, creating knowledge gaps in threat assessment and defence development.

“The updated CAF reflects a trend we’ve observed of cybercriminals increasingly using multi-layered threats designed to evade analysis and detection. An attacker’s aim is to evade and confuse, not overwhelm the network, meaning that threats are missed by legacy antivirus solutions and EDR stacks.

“We strongly recommend that critical infrastructure organisations review the NCSC’s updated CAF. However, they should also prioritise securing the data that moves in and out of their OT networks, an area often neglected by CNI organisations. IT systems, internet connectivity, and transient devices remain major attack surfaces for ICS/OT infrastructure. By controlling data flows and scanning files in transit, organisations can detect and neutralise hidden malicious payloads before they infiltrate critical systems.”

Related News