Cyber security standards for schools and colleges
Find out what standards your school or college should meet on cyber security and user accounts.
Cyber incidents and attacks have significant operational and financial impacts on schools and colleges. These incidents or attacks will often be an intentional and unauthorised attempt to access, change or damage data and digital technology. They could be made by a person, group, or organisation outside or inside the school or college and can lead to:Â
- safeguarding issues due to sensitive personal data being compromisedÂ
- impact on student outcomesÂ
- a significant data breachÂ
- significant and lasting disruption, including the risk of repeated future cyber incidents and attacks, including school or college closureÂ
- financial lossÂ
- reputational damageÂ
Our standards on filtering and monitoring will help schools and colleges to reduce risks related to a cyber incident by preventing access to potentially malicious sites or resources.Â
Throughout these standards we refer to:Â Â
- hardware, software and digital services that are connected to the internet or network as digital technologyÂ
- in-house or third-party support as IT supportÂ
Visit our standards page for more details on how to use the standards to help your school or college meet their digital technology needs.
What is the difference between these standards and Cyber Essentials?Â
These standards are for all schools and colleges to help build their cyber resilience. They address the core principles of cyber governance, processes and strategy. Â
that happens on an annual basis. It provides a level of assurance to organisations across all sectors 바카라 사이트“ not just the education sector 바카라 사이트“ on the technical elements of their cyber security. Â
Cyber Essentials is a requirement for colleges under their funding agreement. It is not a requirement for schools, but some may wish to complete it as part of their cyber security activities. These standards can help you work towards certification.
Why this standard is importantÂ
Those in schools and colleges need to know the risks associated with their hardware, software and data to properly mitigate and defend against any potential cyber incidents or attacks. Â
 Assessing cyber risks means you can:Â
- understand how to keep students, staff and the wider school or college community safe Â
- understand how prepared the school or college is in response to a cyber incident or attackÂ
- highlight weaknesses and put processes in place to help reduce riskÂ
- secure systems to make sure they are more resilient to cyber incidents and attacksÂ
- prepare a cyber response plan to be implemented quickly in the event of a serious incident to minimise any impact to the school or collegeÂ
Not identifying and assessing risk, or preparing a response, could lead to:Â
- safeguarding issues if students바카라 사이트™ safeguarding information is unavailable or if confidential data is accessed and misused Â
- lasting disruption to the operation of the school or college, including closureÂ
- significant impact on student outcomesÂ
- other schools or colleges on your broader organisational network 바카라 사이트“ such as those within a multi-academy trust 바카라 사이트“ being impacted by the same cyber incident or attackÂ
- a significant data breachÂ
- reputational damageÂ
- significant unexpected spend and lost staff time to recover systems and dataÂ
Who needs to be involvedÂ
The senior leadership team (SLT) digital lead will be accountable for, and prioritise and coordinate activity relating to this standard. IT support (who may be an internal support person or external provider) will action this standard. Â
The SLT digital lead will work with:Â
- IT support to review the outcomes of discussions with key staff and action them within the risk assessment Â
- any IT leads in your broader organisation (if applicable) to find out if anything needs to be actioned or approved by themÂ
- the data protection officer (DPO) who will give advice on any risk around data and processes to make sure personal and sensitive personal data in schools and colleges is secure
- facilities or estate management to identify any physical security risks that could create problems for core systems and data, such as a door that will not lock on a server roomÂ
- the headteacher or principal who will need to make decisions on actions suggested by the SLT digital lead and IT supportÂ
- the school, college or trust business professionals or the finance team who will help budget and plan for any changes needed, update the risk register, and buy in any additional services neededÂ
- the governing body or board of trustees for oversight and strategic risk management 바카라 사이트“ there are some Â
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
If your IT support is outsourced, then you will need to discuss with them how they are meeting the requirements of this standard. This should include how they will mitigate against any cyber incidents or attacks on their own network impacting on your school or college바카라 사이트™s network. As part of this, you may wish to consider asking them whether they are certified with Cyber Essentials or Cyber Essentials Plus.Â
How to meet this standardÂ
This standard should be a part of your overall digital technology strategy.Â
Read the digital leadership and governance standards for more information on how to create a digital technology strategy.Â
Review assetsÂ
The SLT digital lead and your IT support will:Â
- review digital technology assets and any related cyber security riskÂ
- check all digital technology is licensed, supported and updated 바카라 사이트“ read our standard on license digital technology and keep it up to dateÂ
Check data processing, access and permissionsÂ
The SLT digital lead will work with the DPO to:Â
- complete a record of processing activities (ROPA) for all new and current systems storing or processing personal and sensitive personal data 바카라 사이트“ you can use a Â
- assess staff access and permissions to systems and data, and check password policies 바카라 사이트“ read our standard on 바카라 사이트˜Control and secure user accounts and access privileges바카라 사이트™
- check that your email is set up to be secure and that it reduces the risk of third parties being able to send imitation emails 바카라 사이트“ for more information, read our standard within this topic titled, 바카라 사이트˜Secure digital technology and data with anti-malware and a firewall바카라 사이트™
Understand your networkÂ
The SLT digital lead will oversee this work, but IT support will:Â
- keep documentation on your network up to date 바카라 사이트“ this should include network diagrams, changes that are made, settings and IP addressing informationÂ
- discuss the level of logging required for your school or college바카라 사이트™s network and systems which can help to identify the source of any cyber incident or attack and any network issues 바카라 사이트“ to learn more about network logging, visit the National Cyber Security Centre (NCSC) Â
Understand current riskÂ
The SLT digital lead will be responsible for collecting the relevant information from all those listed in the 바카라 사이트˜Who needs to be involved바카라 사이트™ section of this standard. Together they will:Â
- understand what the greatest cyber risks are and establish the likelihood of these happening, along with the impact they may have on your school or collegeÂ
- capture how many cyber incidents or attacks have already occurred and what they are so that you can understand common themes and know where you need to improve 바카라 사이트“ you can Â
- identify any student or staff behaviour that may be seen as a risk and could expose the school or college to a cyber incident or attack 바카라 사이트“ for example, downloading an application without the approval of IT supportÂ
Create a risk management process and cyber response planÂ
The SLT digital lead will work with the business professionals or the finance team, estate management and IT support to:Â
- create a simple reporting structure for cyber risks to be captured, escalated and actioned 바카라 사이트“ cyber risks should be captured in the risk register and placed into a regularly tested business continuity planÂ
- maintain documentation and your business continuity plan in at least one or more (diverse) locations 바카라 사이트“ for example, in the cloud or as a hard copyÂ
- flag any risks or issues identified to the governors or trustees as part of the school or college바카라 사이트™s risk management processÂ
- put a cyber response plan in place 바카라 사이트“ as well as this being a part of your business continuity plan, it is also a condition of cover if you have risk protection arrangement (RPA) coverÂ
We recommend getting insurance cover to help minimise costs in the event of a cyber incident or attack. You could consider the Department for Education바카라 사이트™s (DfE) RPA cover as an alternative to commercial insurance.Â
To help action this standard, you can also visit:Â
- our digital leadership and governance standards for information on a business continuity planÂ
- the DfE website for guidance on risk management for academy trustsÂ
- to self-assess your cyber resilience and understand where you are in your cyber maturity journeyÂ
- the Education Data Hub for Â
When to meet this standardÂ
You should complete any risk assessments as soon as possible and repeat them every year or in the event of:Â
- significant technology or process changesÂ
- an incident or attack impacting the school or collegeÂ
These risk assessments should then be revisited every term by those listed in the 바카라 사이트˜who needs to be involved바카라 사이트™ section of this standard to see if anything has significantly changed. This will help highlight vulnerabilities and what actions you need to take to minimise them.Â
If you have outsourced IT support and they are not currently meeting this standard, then you will need to review how this can be done in future as part of your ongoing service reviews, and no later than your next renewal date. Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Digital leadership and governance:Â
- Assign a senior leadership team (SLT) member to be responsible for digital technology
- Keep registers relating to hardware and systems up to dateÂ
- Include digital technology within disaster recovery and business continuity plansÂ
Cloud solution:Â
Servers and storage:Â
Why this standard is importantÂ
Well-informed users are the best line of defence against cyber criminals. Many cyber incidents and attacks target common processes and human behaviours when using digital technology. Â
Raising awareness, and training students and staff on cyber security will:Â
- reduce the risk of cyber incidents and attacksÂ
- help to keep students and staff safeÂ
- help to create a culture where students and staff feel comfortable identifying and reporting riskÂ
- help students and staff understand what acceptable use of digital technology looks like and the importance of cyber security 바카라 사이트“ this can help inform behaviour policiesÂ
- make sure that cyber incidents, attacks and risks are reported quickly to stop them spreadingÂ
If students and staff do not understand the risks, this could lead to:Â
- safeguarding issues, particularly when data is breached Â
- cyber incidents and attacks that are costly and disruptiveÂ
Having an acceptable use policy and training in place will help to provide the foundations for a good cyber awareness plan.Â
Who needs to be involvedÂ
The headteacher or principal will be accountable for making sure this standard is met. They will work with the senior leadership team (SLT) digital lead, who will coordinate the delivery of an acceptable use policy and training for their school or college.Â
The SLT digital lead will need to work with:Â
- IT support to create and maintain the acceptable use policy and identify areas of training need from support callsÂ
- any IT leads in your broader organisation (if applicable), such as a multi-academy trust or a local authority school to find out if anything needs to be actioned or approved by themÂ
- the data protection officer (DPO), who will make sure that risks to data are identified and acted on, and will advise on any data protection training neededÂ
- the designated safeguarding lead, who will make sure that any training and policies support the safety of students and staffÂ
- the governing body or board of trustees to approve the acceptable use policy Â
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
The SLT digital lead will work with IT support to make sure:Â
- an acceptable use policy is created and updated to meet their school or college바카라 사이트™s needsÂ
- regular and up to date training and awareness activities on cyber security are carried out Â
You should also consider how to raise the level of cyber awareness within families if digital technology is taken home or student work is completed online at home.Â
Create an acceptable use policyÂ
An acceptable use policy describes what a person on the network can or cannot do when using digital technology. Â
Anyone who has access to the school or college network or data will need to be made aware of, and sign up to, the acceptable use policy. This will include guests and supply teachers who want to use the school or college network and wifi.Â
The SLT digital lead will work with IT support, the designated safeguarding lead and the DPO to create and update the acceptable use policy.Â
If you use a student contract, then this should include relevant sections of the acceptable use policy to make it clear how digital technology should be used within your educational setting. This will need to be carried out at the beginning of every academic year.Â
You can find examples of acceptable use policies on the Education Data Hub website:Â
- Â
- Â
- Â
Train students and staffÂ
Training students and staff in cyber security is a vital step in maintaining safety and security. Cyber training should be given at least annually, or more regularly if there is a known cyber risk to those who use school or college digital technology.Â
The SLT digital lead will need to coordinate training with IT support, the DPO and the designated safeguarding lead. This training is for:Â
- studentsÂ
- staffÂ
- at least one current governor or trusteeÂ
- anyone else with a login (for example supply teachers or agency workers) who may need more focussed training using your own resources 바카라 사이트“ this should happen as soon as it바카라 사이트™s feasible Â
Training should be age-appropriate and suited to your school or college바카라 사이트™s risks, but should generally include training on:Â
- methods hackers use for tricking people into disclosing personal information, including Â
- password securityÂ
- online safetyÂ
- social engineering, including not using websites that host unsuitable material, and could also contain malware and virusesÂ
- the physical security of devices, for example not leaving a laptop unlocked and unattendedÂ
- the risks of using removable storage media, such as USBsÂ
- multi-factor authenticationÂ
- how to report a cyber incident or attack 바카라 사이트“ read the standard on reporting a cyber risk within this standard topic
- how to report a personal data breachÂ
- data protection for all staff, with staff who are exposed to higher risk data having more frequent training, such as administrative staff, management or agency workers with a loginÂ
If you have risk protection arrangement, you must evidence that the relevant users have undertaken the free training. This needs to be taken annually. Â
If you are looking for further support, the NCSC have .Â
When to meet this standardÂ
You should already have an acceptable use policy in place. If not, it should be updated towards the end of the academic year and shared with students, staff, and any cover or temporary staff at the beginning of the new academic year.Â
If you have not carried out cyber training in your school or college within the last 12 months, then you should plan to implement this as soon as possible.Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Digital leadership and governance:Â
Laptops, desktops and tablets:Â
Creating and maintaining the security around your digital technology and data is a critical line of defence against a cyber incident or attack. Once a virus or hacker is in your system, they will look for a way to exploit other vulnerabilities.Â
To complete this standard, the senior leadership team (SLT) digital lead and IT support will first need to read and action the standard on how devices should be safe and secure.
Why this standard is importantÂ
Following this standard will help to make sure that:Â
- students, staff and their data are as safe and secure as they can be Â
- the risk of disruption to school or college operations is reducedÂ
- there is no unauthorised access to systems or dataÂ
- vulnerabilities are more difficult to findÂ
Not meeting this standard could lead to:Â
- lost learning or possible school or college closureÂ
- not being able to access child protection dataÂ
- students and staff being exposed to inappropriate contentÂ
- a large financial costÂ
- a significant data breachÂ
- the spread of viruses or malware throughout your networkÂ
- security weaknesses, which make cyber incidents or attacks easier against your networkÂ
Who needs to be involvedÂ
The SLT digital lead will be accountable for this standard but IT support will be responsible for actioning it.Â
IT support will need to work with:Â
- the designated safeguarding lead for advice on safeguarding requirements on systems and securityÂ
- any IT leads in your broader organisation (if applicable), such as a multi-academy trust or a local authority school to find out if anything needs to be actioned or approved by themÂ
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
The SLT digital lead will need to plan how the technical requirements section within this standard will be met with IT support.Â
IT support will need to:Â
- use a properly configured boundary firewall Â
- make sure devices are safe and secure 바카라 사이트“ to learn more about this, visit the laptop, desktop and tablet standardsÂ
- (this must include anti-virus) on all devices, this should be centrally managed, actively monitored and kept up to date 바카라 사이트“ this should include installation on cloud-based servers that you are managing
- monitor digital technology for any potential cyber security incidents or attacks 바카라 사이트“ the National Cyber Security Centre (NCSC) has a Â
- check the security of all applications downloaded or installed onto a network, this should include any cloud-based servicesÂ
- configure the network to minimise the spread of malware to critical systemsÂ
If you are unsure about any data or applications, contact your IT support and they will be able to check the security of them.  Â
Technical requirementsÂ
This section is for your IT support who may be an internal support team or an external provider. They will set up your network and digital technology to meet these minimum requirements.Â
FirewallÂ
Many schools and colleges will be provided with a firewall as part of their broadband connection. If this applies to you, then you will need to discuss these technical requirements with your broadband provider.Â
If your broadband provider does not include a firewall, then IT support will need to source one and set it up securely.Â
To meet this standard, IT support must:Â
- protect digital technology with a correctly configured boundary firewall or software firewall, this should include Â
- keep boundary firewall firmware up to date, and on supported versions 바카라 사이트“ this should be checked termlyÂ
- make sure all external connections to the network run through the firewallÂ
- change the default administrator password and restrict remote access on the firewall to only those who need to access it for maintenance purposes Â
- protect access to the firewall바카라 사이트™s administrative interface with multi-factor authentication, where available, and prevent access from the internet, except to those who need to maintain the firewallÂ
- actively monitor firewall traffic and switch on firewall alerts to help detect suspicious activity 바카라 사이트“ firewall logs can help you with both of these tasksÂ
- block inbound unauthenticated connections by defaultÂ
- document and review why inbound traffic has been permitted through the firewall 바카라 사이트“ this should be done on a termly basis at a minimum and should be signed off by the SLT digital leadÂ
- keep firewall rules to an absolute minimum, with each rule being documented and subject to a risk assessmentÂ
- enable a software firewall for digital technology that is used outside of the school or college, such as at home or on public wifiÂ
- consider a virtual private network (VPN) to encrypt data sent and received by a deviceÂ
Anti-malware softwareÂ
Anti-malware software needs to be kept up to date with the latest updates. This should be reviewed termly to check that it is meeting your school or college바카라 사이트™s needs. This software must:Â
- scan web pages as they are being used Â
- have a centralised monitoring console to allow IT support to intervene should anti-malware software fail or not updateÂ
- scan files and applications upon access, when downloaded or opened locally or from a network folderÂ
- scan attachments on incoming and outgoing emails for malwareÂ
- send malware alerts to IT support who will then investigate the issue 바카라 사이트“ this could result in removing the malware or isolating the deviceÂ
- prevent access to potentially malicious websitesÂ
The NCSC provide further guidance on .Â
To help prevent malware infecting digital technology from an external device, IT support should prohibit the use of USB storage devices by default, unless for a specific need 바카라 사이트“ for example, if the examination board require this.Â
If USB storage devices are permitted in specific use cases, the anti-malware software should scan the USB drive before it is made available to the student or staff member.Â
Security checksÂ
IT support should:Â
- check downloads for malware before an individual can store or install them on their device 바카라 사이트“ this should be in line with your school or college strategy
- check and approve all current and future applications to make sure they do not pose a security riskÂ
- maintain a current list of approved applications on your contracts registerÂ
- remove unnecessary software according to your organisational needÂ
- only install applications that can be verified as coming from a known supplierÂ
- document how digital technology is set up, which security features have been enabled or disabled, and whether they have conflicting security featuresÂ
- to make sure the highest form of protection is enabled and that users are unable to change browser settings to install browser extensions or bypass security featuresÂ
- and that it reduces the risk of third parties being able to send imitation emailsÂ
The NCSC has Â
When to meet the standardÂ
This standard should already be in place for the security of your network. Â
Completing the standard in this topic titled 바카라 사이트˜Conduct a cyber risk assessment annually and revisit every term to review if anything has changed바카라 사이트™ will help to inform this process.Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Servers and storage:Â
- Servers and related storage platforms must be secure and follow data protection legislationÂ
- All server and related storage platforms should be kept and used in an appropriate physical environmentÂ
Cloud solution:Â
Wireless network:Â
Network switching:Â
Digital leadership and governance:Â
- Keep registers relating to hardware and systems up to dateÂ
- Include digital technology within disaster recovery and business continuity plansÂ
Laptops, desktops and tablets:Â
Broadband:Â
Why this standard is importantÂ
Protecting user accounts and related data is a critical line of defence against cyber incidents and attacks.Â
Following this standard will make sure that:Â
- personal data and digital technology are as safe and secure as they can beÂ
- students, staff and third parties only have access to the things they needÂ
Not meeting this standard could lead to:Â
- schools and colleges being exposed to external and internal threats
- a significant data breachÂ
- students and staff being exposed to inappropriate contentÂ
- a disruptive and costly ransomware attack, which is a type of malware which prevents access to your data or device unless a ransom payment is madeÂ
- not being covered by your insurer for cyber attacks and incidentsÂ
Who needs to be involvedÂ
The senior leadership team (SLT) digital lead will be accountable for this standard but IT support will be responsible for actioning it.Â
IT support will work with:Â
- any digital technology suppliers to make sure they are also compliant with this standardÂ
- the data protection officer (DPO) who will, if needed, undertake a data protection impact assessment (DPIA) and provide advice on data protection legislation complianceÂ
- human resources and your business professionals or the finance team to set up a process for movers, joiners and leaversÂ
- any IT leads in your broader organisation (if applicable), such as a multi-academy trust or a local authority school to find out if anything needs to be actioned or approved by themÂ
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
The SLT digital lead will need to plan how the technical requirements section within this standard will be met with IT support and how they will:Â
- agree who should have access to what Â
- set up password policiesÂ
- , such as multi-factor authentication (MFA), where neededÂ
IT support should make sure that users only have the network and data access they need, and that their account is secure.Â
To help action this standard, you can also visit:Â
- the National Cyber Security Centre (NCSC) website for more guidance on Â
- the Information Commissioners Office (ICO) website to Â
Technical requirementsÂ
This section is for your IT support who may be an internal support team or an external provider. They will set up users so that they only have the access they need by following these minimum requirements.Â
If you have external IT support that will carry out the activities within this standard, make sure that your contract with them is compliant with General Data Protection Regulation (GDPR).Â
PasswordsÂ
Users must be authenticated with unique credentials before they access devices or services. This can include using passwords.Â
IT support will need to:Â
- enforce password strength at the system level 바카라 사이트“ the Â
- immediately change any passwords that have been compromised or are suspected of compromiseÂ
- protect all passwords 바카라 사이트“ for example, by allowing no more than 10 guesses in 5 minutes, or locking devices after no more than 10 unsuccessful attemptsÂ
On networking devices and servers, IT support should:Â
- use a password or PIN of at least 6 characters to physically access network switches and boot-up settings 바카라 사이트“ the password or PIN must only be used to access this deviceÂ
- agree a process with the SLT on securing access to key system passwords and PINs in the event of an emergency, or if IT support are unavailableÂ
For younger children, users with special educational needs or disabilities, or for those with English as an additional language, consider using:Â
- other means of logging on, other than passwords 바카라 사이트“ for example, using a PIN codeÂ
- a separate account accessed by the teacher using the student바카라 사이트™s login so that the student can still be identified 바카라 사이트“ this should follow the filtering and monitoring standardsÂ
Visit the NCSC website to .Â
Multi-factor authentication (MFA)Â
MFA secures your account by asking the user to provide 2 or more pieces of evidence to verify their identity. This could include a password and a login through another device.Â
MFA may not be accessible for those with special educational needs and disabilities. In these circumstances you will need to discuss alternatives or extra support when logging in.Â
Senior leaders, and staff (including internal and external IT support staff) working with confidential, financial, and personal and sensitive personal data must use MFA.Â
If appropriate for your school or college, you may also wish to explore:Â
- MFA for all cloud or online services Â
- MFA for all staff accountsÂ
- MFA for students where the verification does not need to be completed on a mobile phone in keeping with the Department for Education바카라 사이트™s (DfE) Â
MFA should include at least 2 of the following:Â
- a passwordÂ
- a text message which will send a code to a mobile device, this is for staff onlyÂ
- an automated phone call to a given phone number that reads out a code (as an alternative to a text message)Â
- a secure portable device, such as a mobile phone or tablet for staffÂ
- a security key or device, used to authenticate logins 바카라 사이트“ the school or college may need to pay for this if staff do not have access to a secure mobile phoneÂ
- a known or trusted account, where a second party authenticates another바카라 사이트™s credentialsÂ
- a biometric test, for example face identification 바카라 사이트“ this may need careful consideration as it might require a biometric policy depending on how the data is storedÂ
Where MFA is not available, a more complex password should be used following the recommended guidance around password security in this standard.Â
The NCSC has some further guidance on:Â
- Â
- Â
If staff access a number of systems, you should consider using a single sign on solution, which allows you to sign on once and access all applications.Â
Account managementÂ
IT support need to control user accounts and access privileges by:Â
- disabling accounts as soon as someone leavesÂ
- creating and managing a process with human resources and your business professionals or the finance team to deal with joiners, leavers, and those moving rolesÂ
IT support should consider using tools that link to the management information system (MIS) to automatically create or delete user accounts which will make this process easier to manage.Â
IT support will also:Â
- make sure that accounts are set up so that students and staff only have access to the data and systems they needÂ
- make sure that MFA is applied to any accounts and cloud-based applications for staff working away from the school or college, or remotely accessing the network Â
- make sure that remote access is disabled when not required, and enabled only by a member of authorised school or college staffÂ
- make sure that enhanced security, such as MFA, is always used where staff are handling confidential, personal or sensitive personal data 바카라 사이트“ your data protection officer can advise which systems and data need thisÂ
- review accounts with your business professionals or the finance team every term to identify changes that might have been missed 바카라 사이트“ this should include changing access levels and rights, and suspending or deleting accounts which are no longer in useÂ
- make sure that global or administrative accounts are not used for routine business and that instead, dedicated accounts (not used for day-to-day email and work) have enhanced privileges 바카라 사이트“ this helps limit any damage and track issues in the event of an incident or attackÂ
- agree a process for handling administrative accounts so that a member of SLT or a trustee approves any changes to access levels or privileges before IT support can action the changeÂ
- make sure SLT have access to a dedicated administrative account 바카라 사이트“ this will only be needed in an emergency where IT support is unavailableÂ
The NCSC has detailed .Â
When to meet this standardÂ
You should already be meeting this standard. This will make sure that your data and digital technology is best protected against cyber threats. Â
If you are not already meeting this standard, then you should implement this as soon as possible through a structured, well managed rollout plan.Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Cloud solutions:Â
- Cloud solutions should use ID and access management toolsÂ
- Cloud solutions must follow data protection legislationÂ
Servers and storage:Â
Laptops, desktops and tablets:Â
Network switching:Â
Wireless network:Â
Broadband:Â
Why this standard is importantÂ
All digital technology must be licensed. Digital technology includes software programmes, operating systems and applications running on devices and servers, or online cloud services. Â
These must be licensed so that you can:Â
- receive updates and upgrades which enhance your use of digital technologyÂ
- receive bug-fixes and enhancementsÂ
- get support if you need it where this is provided through your license agreementÂ
Not licensing or updating digital technology could lead to:Â Â
- devices being vulnerable to viruses, malware and hackers 바카라 사이트“ some unlicensed and unauthorised software may contain malware, especially if downloaded from untrusted sourcesÂ
- reputational damage for your school or college Â
- sudden unexpected costs from having to replace digital technology Â
- operating systems that have reached end-of-life or are not providing critical security updatesÂ
- software or applications not being able to run, which could lead to disrupting teaching and learningÂ
- a breach of your licensing agreement, which could lead to fines or action from the supplierÂ
Who needs to be involvedÂ
The senior leadership team (SLT) digital lead will be accountable for this standard, with IT support responsible for actioning it. Â
The governing body or board of trustees should check that the digital technology is fully licensed as part of their normal compliance review.Â
Your internal or external IT support will work with:Â
- business professionals or the finance team who will give information on when licenses are due to expire from the contracts registerÂ
- the data protection officer (DPO) who will provide advice on data protection legislation and undertake a data protection impact assessment (DPIA), where relevant 바카라 사이트“ if there is a licensing issue that could threaten the data, the DPO will need to escalate this to the SLT digital lead and IT supportÂ
- third-party cloud suppliers to check that they are also meeting these standards by performing supplier assessments 바카라 사이트“ this needs to be carried out when procuring new contractsÂ
- any IT leads in your broader organisation (if applicable), such as a multi-academy trust or a local authority school to find out if anything needs to be actioned or approved by themÂ
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
The SLT digital lead will plan how the technical requirements section within this standard will be met with IT support.Â
IT support will need to check all digital technology is licensed, supported and set up to meet the technical requirements in the next section. The end of support dates for each device바카라 사이트™s operating system should be recorded in the asset register and your mobile device management system, if you have one.Â
At the end of every term, IT support and the business professionals or the finance team should review the contracts register and inform the SLT when digital technology:Â
- has become unsupported Â
- is due to become unsupportedÂ
An alternative to licensing software is to use a cloud service. These are usually subscription based, and the responsibility is on the supplier to license and update the software. You should ask your DPO to undertake a DPIA if you choose to do this where it is storing or processing personal or sensitive personal data. Visit the Department for Education (DfE) website for more information on data protection policies and procedures.Â
If you are using open-source software or operating systems, you must abide by their licensing terms.Â
Occasionally, DfE may issue instructions on security updates. The SLT digital lead will need to inform IT support. IT support should then apply these updates within 5 working days of notification.Â
Technical requirementsÂ
This section is for your IT support who may be an internal support team or an external provider. They will set up your digital technology to meet these requirements.Â
LicensingÂ
All software needs to be licensed and eligible for security updates. You should remove unlicensed software or take steps to license it. Â
IT support will need to check that:Â
- operating systems and firmware on digital technology are kept up to dateÂ
- updates are issued in a timely manner that does not impact on teaching and learningÂ
- license expiry dates are recorded in the contracts register by the business professionals or the finance team, and that any unlicensed software is removed from devicesÂ
- your business professionals or the finance team have been informed about licence end dates so that they can budget for any renewal costsÂ
- digital technology end-of-support dates are captured in the asset registerÂ
Security updatesÂ
IT support must complete security updates (known as patching) to operating systems, applications and firmware, including configuration changes, within 14 days of the release of the patch where the vulnerability is:Â
- described as high risk or worseÂ
- has a Common Vulnerability Scoring System (CVSSv3) score of 7 or above 바카라 사이트“ you should also triage and prioritise updates for other scores when it is possible to do soÂ
The CVSSv3 is the security industry standard for measuring the danger of a vulnerability. The score is a number from 1 to 10 where 10 means it is the most easily exploitable. There is a more .Â
IT support will also need to:Â
- make sure security updates are applied on time 바카라 사이트“ you may wish to consider using a supported third-party patch management tool to automate this processÂ
- isolate devices where high risk patches are unavailable 바카라 사이트“ this could mean removing the device from the network or separating it from higher risk systems and dataÂ
The NCSC has further .Â
When to meet this standardÂ
You should already be meeting this standard with existing digital technology within the school or college. When buying new digital technology (including cloud-based services), you will need to check that it meets this standard.Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Digital leadership and governance:Â
- Keep registers relating to hardware and systems up to dateÂ
- Include digital technology within disaster recovery and business continuity plansÂ
Laptops, desktops and tablets:Â
Cloud solution:Â
- Cloud solutions must follow data protection legislationÂ
- Use cloud solutions as an alternative to locally hosted systems, including serversÂ
Servers and storage:Â
Broadband:Â
Network switching:Â
Wireless network:Â Â
A backup is an additional copy of data, held in a different physical location (which could include being on the cloud), in case the original data is lost or damaged. If all copies were held in the same physical location, they would all be at risk from natural disasters, criminal damage or a malware attack.Â
The physical location for your backup will need careful consideration to make sure that, in the event of a disaster situation, it is not impacted by the same incident or attack.Â
which could include a cloud backup service. Members of the risk protection arrangement (RPA) should refer to their terms for making a claim, as backing up to this level is currently a condition of cover.Â
The Education Data Hub has .Â
Why this standard is importantÂ
Schools and colleges are now more reliant on digital technology and data being stored in different locations (such as cloud services). Not all of these will be backed up to meet the needs of the school or college (for example, cloud services will only backup your data for a limited time period), so you need to have a backup plan to meet your diverse needs.Â
This standard will help your school or college to:Â
- recover important data and systems to continue teaching and resume normal business operations in the event of a cyber incident or attackÂ
- manage recovery of damaged or lost filesÂ
- be compliant with data protection legislationÂ
Not meeting this standard could lead to:Â
- operational impacts on the school or college due to systems and data being unavailableÂ
- the loss of student work which may impact on the school or college바카라 사이트™s resultsÂ
- critical systems that support safeguarding not being available or potentially storing out of date dataÂ
- lost, misused or damaged dataÂ
- a breach of data protection legislationÂ
- unexpected costs from bringing in specialists to help recover your systems and dataÂ
Who needs to be involved Â
The senior leadership team (SLT) digital lead will own the backup plan and work with IT support to make sure backups are being done correctly. Â
IT support will action the backup plan and will communicate this with any IT leads in your broader organisation (if applicable), such as a multi-academy trust or a local authority school, to find out if anything needs to be actioned or approved by them.Â
The SLT need to prioritise which data areas would need to be recovered first in the event of a cyber incident or attack.Â
The SLT digital lead and IT support will identify risks and priorities by speaking to:Â
- the business professionals or the finance teamÂ
- the designated safeguarding leadÂ
- the data protection officerÂ
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
Your backup plan should feed into your business continuity plan and disaster recovery plan. The backup plan should be:Â
- kept up to dateÂ
- tested termly to make sure it works, or more often if there is a significant service change 바카라 사이트“ speak to your IT support for further advice on how to do thisÂ
- reviewed on an annual basis, or when there is a major change to the systems or dataÂ
Read our standards on digital leadership and governance for more details on business continuity plans.Â
Analyse where you are nowÂ
It is useful to understand what your current backup plan looks like so that you can assess if it needs improvement.Â
The SLT digital lead should ask IT support:Â
- what data is currently being backed up, how often, how old it is and how it is being backed up, including data stored on all your cloud services 바카라 사이트“ this information should be stored in your information asset register and you can record it using the
- what information is not being backed up
- how often they test data that has been restored to check the backups are successfulÂ
- how long a restoration will take and when the last test restoration was completedÂ
- how many copies are being kept and where they are locatedÂ
- how your backups may be affected in the event of an incident or attackÂ
If you do not have internal IT support, ask your service provider to explain what they are doing to help you achieve this standard.Â
Plan and action how to backup and restore data in the futureÂ
The SLT digital lead will work with your business professionals or the finance team, designated safeguarding lead, data protection officer and IT support to identify:Â
- what data you backup, including what critical data and systems are needed to function as a school or college in a disaster situationÂ
- how long you can go without specific systems and data and how up to date they need to be to find out the priority of recovery Â
- a process for students and staff to delete or archive data on an annual basis 바카라 사이트“ this will speed up recovery times by getting rid of data you no longer need Â
- how long you will keep data for 바카라 사이트“ this should align with statutory duties and retention policies so that you only backup what you needÂ
- how you will deal with any statutory requirements, such as a freedom of information request or a data subject access requestÂ
- how and where you will backup your dataÂ
IT support should:Â
- have at least 3 backup copies of important data, on at least 2 separate devices 바카라 사이트“ at least one of these copies must be off-site (on large sites, these copies should be far enough away to avoid dangers from fire, flood, theft and similar risks)Â Â
- make sure that backups are immutable, this means that they cannot be changed once they have been created 바카라 사이트“ this helps prevent data loss and reduces the risk of malware or ransomware being introduced into your systems when restoring dataÂ
- choose backup methods you will use based on your school or college바카라 사이트™s budget and the identified needs in your backup planÂ
- test and log your backups termly or if there is a significant change, this should include the ability to recover and restore from backups 바카라 사이트“ the NCSC has an Â
- have a policy on how frequently restorations should take place to test the backup and how this will be reported on to evidence successÂ
- make sure, wherever possible, that restoring data is not device specific and can be recovered to a wide range of hardwareÂ
You should not take any physical backups offsite unless they are encrypted and stored in a secure location. Regardless of whether they are encrypted, backups should never be taken to anyone바카라 사이트™s home. Â
When to meet this standardÂ
You must backup your data now. If you have not yet done so, you should develop a backup plan as soon as possible to allow you to respond quicker in a disaster situation.Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Digital leadership and governance:Â Â
- Include digital technology within disaster recovery and business continuity plansÂ
- Keep registers relating to hardware and systems up to dateÂ
Cloud solution:Â
Servers and storage:Â
Why this standard is importantÂ
A cyber incident or attack will often be an intentional and unauthorised attempt to access, change or damage data and digital technology. They could be made by a person, group, or organisation outside or inside the school or college.Â
Everyone is responsible for and should report a cyber incident or attack to their IT support and senior leadership (SLT) digital lead.Â
Following this standard means that:Â
- an investigation can begin immediately which will help inform what actions a school or college need to take to deal with an incident or attackÂ
- the damage to data and digital technology can be limitedÂ
- issues can be identified and resolved quicklyÂ
- appropriate people, such as the police or IT support, can be brought in to respond to the incident or attackÂ
Failure to report and act quickly could lead to:Â
- an increase in severity and spread of a cyber incident or attackÂ
- damage to data and systems Â
- a data breach which may need to be reported to the Information Commissioner바카라 사이트™s Office (ICO)Â
- other schools or colleges on your broader organisational network being impacted by the same cyber incident or attackÂ
- time spent wiping devices and servers to return to a previous safe stateÂ
Who needs to be involvedÂ
Cyber incidents or attacks can be reported by anyone to their IT support and SLT digital lead who will work closely with the data protection officer (DPO) to identify any data protection issues.Â
Any formal reporting to external bodies (such as Action Fraud) will need to be done by someone appointed by the SLT digital lead and involve the:Â
- SLT and headteacher or principal, who will approve a formal report and outline any impact on school or college activityÂ
- IT support team, who will investigate and resolve the issueÂ
- DPO, who will establish whether a data breach has occurredÂ
- designated safeguarding lead, who will review whether there are any safeguarding issues and related actionsÂ
- governors and trustees, who will need to be informed on the risk and the actions the school or college are taking to resolve itÂ
If you do not have the technical expertise in-house, you will need to get advice from an external support provider or consider training for your internal IT staff to make sure they have the skills needed.Â
How to meet this standardÂ
All students and staff have a responsibility to report cyber risk or a potential incident or attack to IT support and the SLT digital lead. Â
The SLT digital lead will need to make sure that all students and staff understand how to report a potential incident or attack and that they feel safe and comfortable to do so.Â
To help action this standard, you can also visit:Â
- the Department for Education (DfE) website for information on managing a data breach Â
- the National Cyber Security Centre (NCSC) website for Â
Report a cyber incident or attack internallyÂ
As soon as IT support and the SLT digital lead have been alerted by a student or member of staff to a potential incident or attack they will need to:Â
- action their cyber incident response plan which is a part of their business continuity and disaster recovery plansÂ
- contain the risk and make sure systems are safe and secureÂ
- notify those in the 바카라 사이트˜who needs to be involved바카라 사이트™ section of this standard and in line with their business continuity planÂ
- capture information on the riskÂ
- investigate the risk and decide on the next course of actionÂ
- report the potential incident or attack to the governing body or trusteesÂ
Any incidents, attacks or near misses should be recorded in an internal incident report or system.Â
Report a cyber incident or attack to external bodiesÂ
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.Â
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:Â
- Action Fraud on 0300 123 2040, or the Â
- the DfE sector cyber team at Sector.Incidentreporting@education.gov.ukÂ
You may also need to report to:Â
- if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damageÂ
- within 72 hours, where a high risk data breach has or may have occurredÂ
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)Â
- Â
You must act in accordance with:Â
- Action Fraud guidance for Â
- Academy Trust Handbook Part 6, if you are part of an academy trustÂ
- ICO requirements for Â
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.Â
When to meet this standardÂ
You should already be meeting this standard. If you do not have these procedures in place, then you should implement them as soon as possible. Â
Related standardsÂ
The following digital standards should also be considered when completing this standard.  Â
Digital leadership and governance:Â Â
- Assign a senior leadership team (SLT) member to be responsible for digital technology
- Include digital technology within disaster recovery and business continuity plansÂ
- Keep registers relating to hardware and systems up to dateÂ
Cloud solution:Â
Servers and storage:Â