This playbook provides a structured process for assessing an enterprise’s cybersecurity posture in alignment with the NCSC Cyber Assessment Framework (CAF) 3.2. It guides security teams through preparation, risk management, protection, detection, incident minimization, and post-assessment review, ensuring compliance with CAF objectives (A: Managing Security Risk, B: Protecting Against Cyber Attack, C: Detecting Cyber Security Events, D: Minimising the Impact of Cyber Security Incidents). The process evaluates governance, controls, monitoring, and resilience to identify gaps and drive improvements, protecting critical systems and data.
Assessment Checklist
The following checklist summarizes key actions for conducting a cybersecurity posture assessment per NCSC CAF 3.2.
Preparation
Define assessment scope.
Assemble assessment team.
Develop assessment plan.
Risk Management Assessment
Review security governance.
Identify critical assets.
Assess cyber risks.
Protection Assessment
Evaluate protective controls.
Assess access controls.
Review staff training.
Detection Assessment
Assess monitoring systems.
Review log collection.
Test detection alerts.
Incident Minimization Assessment
Review incident response plan.
Assess backup processes.
Test recovery procedures.
Post-Assessment Review
Compile assessment report.
Develop improvement plan.
Monitor improvement progress.
1. Preparation
Prepare the organization for a comprehensive cybersecurity posture assessment aligned with NCSC CAF 3.2.
Define Assessment Scope
Identify critical systems, networks, and services to assess (CAF A1: Governance).
Include third-party dependencies and supply chain elements (CAF A4: Supply Chain).
Document scope boundaries (e.g., specific departments, data types).
Assemble Assessment Team
Engage stakeholders from IT, security, compliance, and leadership (CAF A1: Governance).
Assign roles (e.g., lead assessor, data analyst, report writer).
Ensure team understands CAF 3.2 objectives and outcomes.
Develop Assessment Plan
Create a timeline for assessing CAF objectives (A, B, C, D).
Include systems, data, and third-party services (CAF A4: Supply Chain).
Verify asset criticality and ownership are documented.
Assess Cyber Risks
Conduct a risk assessment aligned with CAF A3: Risk Management.
Identify threats, vulnerabilities, and impacts to critical assets.
Evaluate risk treatment plans and mitigation measures.
Notify third parties if their systems are involved in risks. Example:
Subject: Request for Information Regarding Cybersecurity Assessment
Dear [Third-Party Contact],
We are conducting a cybersecurity posture assessment aligned with NCSC CAF 3.2. Our review has identified your system ([domain.com or service]) as part of our supply chain.
To assist our assessment, please provide details on:
- Security controls protecting [system/service]
- Incident response processes
- Recent audit or compliance results
Please respond by [deadline] or contact us for clarification. This information will support our compliance and security efforts.
Best regards,
[Your Name]
[Your Organization]
[Contact Information]
Log notifications and retain copies for records.
3. Protection Assessment
Evaluate protective measures per CAF Objective B: Protecting Against Cyber Attack.
Evaluate Protective Controls
Assess firewalls, endpoint protection, and encryption (CAF B1: Service Protection).