Cyber Security News and Insights

Category: CAF

CAF 4.0 has arrived, bringing major updates to the UK’s Cyber Assessment Framework. Compared to version 3.2, it introduces new contributing outcomes, over 100 new Indicators of Good Practice, and significant restructuring, especially in Objective C (cybersecurity monitoring and threat hunting). While many changes are minor or clarifications, around 60 require closer review, meaning organisations transitioning from CAF 3.2 will need to reassess key areas. Our blog breaks down where to focus your efforts when updating your assessment process.
Thanks to the CyberFirst Bursary program, I secured a summer placement at 2T Security. On my first day, the team outlined what I’d be learning and doing during the placement, and I’ll admit—I felt a bit overwhelmed and nervous about taking it all in.
In this article, we discuss the approach to creating GovAssure profiles. We didn’t want to assume that government could use the existing CAF baseline profile based on a different threat profile to the private sector. Read more about how we ensured that the chosen profile reflected the threats faced by government.
A brief guide to using the Cyber Assessment Framework (CAF) in practice. If you’ve read our earlier blogs about the Cyber Assessment Framework (CAF), you'll know that it isn’t intended to be a checklist - find out more about outcome level dependencies and chord diagrams...
If you want to know more about the Cyber Assessment Framework you've come to the right place. In this article, we'll explain the what, why, who, where and when of the CAF!
Throughout the development and implementation of GovAssure, 2T Security has closely collaborated with the Government Security Group and the National Cyber Security Centre. Read about our expertise in CAF.
News Categories:
Archives