Skip to main content

What do you think of this service? Your feedback will help us to improve it.

Author: Government Digital Service (DSIT)

Last updated: 2025-07-11

Secure by Design Example Controls Taxonomy

There are a range of industry standard frameworks you can use to mitigate digital service risks.

This page shows the objectives, principles, contributing outcomes and indicators of good practice (IGPs) from the National Cyber Security Centre’s (NCSC)’s Cyber Assessment Framework (CAF) version 3.2.

Listed under each CAF contributing outcome are cyber security and privacy controls from the following frameworks:

Download the information on this page as a spreadsheet

Your organisation's security experts can adapt this template to suit the scope, characteristics and regulatory requirements of your digital service.

CAF objective A: Managing security risk

CAF principle A1: Governance

CAF principle A2: Risk management

CAF principle A3: Asset management

CAF principle A4: Supply chain

CAF objective B: Protecting against cyber attacks

CAF principle B1: Service protection policies and processes

CAF principle B2: Identity and access control

CAF principle B3: Data security

CAF principle B4: System security

CAF principle B5: Resilient networks and systems

CAF principle B6: Staff awareness and training

CAF objective C: Detecting cyber security events

CAF principle C1: Security monitoring

CAF principle C2: Proactive security event discovery

CAF objective D: Minimising the impact of cyber security incidents

CAF principle D1: Response and recovery planning

CAF principle D2: Lessons learned

Sign up to UK Government Security

Subscribe to our newsletters to receive notifications when changes to strategy, policy, standards, and guidance are published on the website.

Sign up now