Security management is concerned with the protection of government security and includes strategy and planning, prevention and detection, incident management and reviews from lessons learned, protecting:
- the government’s assets (people, property and information)
- visitors to government property, and third-party suppliers whilst engaged on government business
- personal data
Protective security in government comprises of 4 interconnected domains, through which attacks are perpetrated: physical, personnel, cyber and technical. Although they are considered as separate domains, they rarely occur in isolation and are managed holistically.
Physical security is the practice of protecting elements of government infrastructure, estates, physical assets and personnel against attacks or compromises in the physical (tangible and real-world) environment.
Personnel security is the practice of ensuring the security of government information and infrastructure against threats arising from government personnel, others working to government and those who formerly worked in government circles. This could include deliberate attacks, criminal activity for profit, unmalicious and unwitting insider threat, or gross negligence, and could manifest in a variety of environments, including the physical or virtual environments. Such individuals could join government service intending to commit such acts, or decide to do so after employment.
Cyber security comprises technologies, processes and controls that are designed to protect systems, networks and data from the deliberate and inadvertent exploitation of computer systems, technology dependent enterprises and networks.
Technical security is the practice of detecting the compromise of protective security systems, analysis and prevention of technical attack, mitigation of technology vulnerabilities and the deployment of countermeasures.
Government security also extends to the security of its supply chain, referred to as industry security. Maintaining oversight of the security arrangements of any third-party suppliers that provide goods and services to government or which hold government or international partners’ classified information is essential for the overall management of security.
The Government Functional Standard for Security sets out the expectations for managing security in government, and is underpinned by subject specific standards which define the requirement for physical, personnel, cyber, and incident management. Guidance on information and data security is also available in the Government Functional Standard for Digital. Further guidance and information is available at security.gov.uk.
Information management is closely allied to security in government and requires the implementation of protective security measures that mitigate insider threat and ensure consistency and efficiency between government organisations. All organisations are required to have policies, systems and processes for information handling that are compliant with HM Government information security policies and standards, and relevant legislation and regulations, such as the Data Protection Act 2018 and the Public Records Act 1958 (as amended)(see Chapter 24: Information and data management).
Also allied to security management is the management of activity to counter fraud, bribery and corruption, which cuts across a number of domains. More information on this is in Chapter 29: Finance, and in the Government Functional Standard for Counter-Fraud.