§ Mr. Peter Lloyd
The security requirements for IT systems and services used by central Government Departments are stated in the Government IT security policy document. This document is supported by use of the CCTA risk analysis and management method—CRAMM—and Baseline Security for IT systems—BSITS—risk analysis methods, by the Communications Electronic Security Group—CESG—memorandum No. 10 where appropriate and by supporting advice and guidance published by the Government IT security authorities. These are regularly reviewed to ensure best practice, have been developed specifically for use within government and have been in operation for some time. The code of practice for information security management was developed by and established for use by commercial organisations. It is currently not a British standard, and does not specifically address the requirements for the protection of official information.