The Cyber Assessment Framework (CAF) is the UK's framework for assessing cyber security in critical national infrastructure and other regulated sectors. Developed by the NCSC, it has 14 principles across 4 objectives. Regulators use CAF to assess organisations under NIS Regulations.
Quick answer: The Cyber Assessment Framework (CAF) is the UK's framework for assessing cyber security in critical national infrastructure and other regulated sectors. Developed by the NCSC, it has 14 principles across 4 objectives. Regulators use CAF to assess organisations under NIS Regulations.
What CAF Is
CAF is the NCSC's framework for:
- Assessing cyber resilience of organisations
- Consistent approach across regulators
- Outcome-based (focuses on what you achieve, not how)
- Used for NIS Regulation compliance
Who CAF Applies To
Directly:
- Operators of Essential Services (OES) under NIS Regulations
- Energy, transport, health, water, digital infrastructure
- Organisations designated by sector regulators
- Suppliers to regulated organisations
- Organisations wanting to demonstrate robust security
- Those using CAF principles for self-assessment
The Four Objectives
Objective A: Managing Security Risk
Principles:
- A1: Governance
- A2: Risk management
- A3: Asset management
- A4: Supply chain
Objective B: Protecting Against Cyber Attack
Principles:
- B1: Service protection policies and processes
- B2: Identity and access control
- B3: Data security
- B4: System security
- B5: Resilient networks and systems
- B6: Staff awareness and training
Objective C: Detecting Cyber Security Events
Principles:
- C1: Security monitoring
- C2: Proactive security event discovery
Objective D: Minimising the Impact of Cyber Security Incidents
Principles:
- D1: Response and recovery planning
- D2: Lessons learned
How Assessment Works
Indicators of Good Practice (IGPs)
Each principle has IGPs describing what "good" looks like. These aren't requirements—they're indicators that help assessors evaluate your posture.
Contributing Outcomes
Principles are broken into contributing outcomes—specific aspects to assess.
Achieved/Not Achieved
For each contributing outcome, assessment determines whether you've achieved the expected level of security.
Profile
Your CAF profile shows achievement against each principle—identifying strengths and gaps.
Preparing for CAF Assessment
Self-assessment first
Before regulatory assessment:
- Understand CAF structure and principles
- Gather evidence against each IGP
- Identify gaps honestly
- Prioritise remediation
Evidence preparation
What assessors look for:
- Policies and procedures (documented, current)
- Technical evidence (configurations, logs)
- Process evidence (meeting minutes, reviews)
- Outcome evidence (test results, incidents handled)
Gap remediation
Common gaps:
- Governance not formalised
- Asset inventory incomplete
- Supply chain risk management immature
- Security monitoring limited
- Incident response not tested
CAF vs Other Frameworks
| CAF | ISO 27001 | Cyber Essentials | |
|---|---|---|---|
| Purpose | Regulatory assessment | Certification | Baseline certification |
| Scope | Critical infrastructure | Any organisation | Any organisation |
| Approach | Outcome-based | Control-based | Control-based |
| Assessment | Regulator-led | Third-party audit | Self/verified |
| Certification | No | Yes | Yes |
Sector Regulators Using CAF
- Ofgem: Energy
- DfT/CAA: Aviation
- Ofwat: Water
- NHS Digital: Health
- Ofcom: Communications
- FCA: Financial services (with DORA)
How We Help
CAF readiness:
- Self-assessment facilitation
- Evidence review and gap identification
- Remediation planning and support
- Evidence preparation
- vCISO for continuous compliance
- Security controls that support CAF
- Regular review and improvement
---
about preparation and support.
---
