§ Mr. Goodlad
The security requirements for IT services and systems used by central Government Departments are stated in the Government IT security policy document. This document is supported by use of the CCTA risk analysis and management method—CRAMM—and baseline security for IT systems—BSITS—risk analysis methods and by supporting advice and guidance published by the Government IT security authorities. These are regularly reviewed to ensure best practice, have been developed specifically for use within government and have been in operation for some time. The code of practice for information security management was developed by and established for use by commercial organisations and does not specifically address the requirements for the protection of official information.