{"id":18972,"date":"2025-01-09T14:47:17","date_gmt":"2025-01-09T14:47:17","guid":{"rendered":"https:\/\/www.dionach.com\/?p=18972"},"modified":"2025-07-15T16:12:35","modified_gmt":"2025-07-15T15:12:35","slug":"data-security-and-protection-toolkit-dspt-2024-2025-caf","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/","title":{"rendered":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18972\" class=\"elementor elementor-18972\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c65cda1 e-flex e-con-boxed e-con e-parent\" data-id=\"c65cda1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24bbaf8 elementor-widget elementor-widget-text-editor\" data-id=\"24bbaf8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.<\/p><p>\u00a0<\/p><p>Organisations are required to have an independent audit assessment to the agreed CAF-aligned DSPT audit framework.<\/p><p>\u00a0<\/p><p>Dionach can provide these independent assessments for organisations, which are required to validate self-assessment outcomes. There are independent assessment guides for two groups who require assessments:<\/p><ul><li>IT Suppliers and OES Independent providers<\/li><li>NHS Trusts, Arm&#8217;s Length Bodies, Integrated Care Boards and Commissioning Support Units<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9dd1fe elementor-widget elementor-widget-heading\" data-id=\"b9dd1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NHS Trusts (Acute, Foundation, Ambulance and Mental Health), Integrated Care Boards, Commissioning Support Units and DHSC Arm\u2019s Length Bodies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aada9e7 elementor-widget elementor-widget-text-editor\" data-id=\"aada9e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These organisations have a set of mandatory outcomes along with other outcomes chosen by the organisation. The mandatory outcomes are:<\/p><ul><li><span id=\"p3R_mc11\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">A2.a Risk management process<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc13\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">A4.a Supply chain<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc15\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">B2.a<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">&#8211;<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">Identity verification, authentication and authorisation<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc17\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">B4.d<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">&#8211;<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">Vulnerability management<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc19\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">C1.a Monitoring coverage<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc21\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">D1.a<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">&#8211;<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">Response plan<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc23\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">E2.b<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">\u2013<\/span><\/span> <span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">Consent<\/span><\/span><\/span><\/li><li><span id=\"p3R_mc25\" class=\"markedContent\"><span dir=\"ltr\" role=\"presentation\"><span tabindex=\"0\">E3.a Using and sharing information sharing for direct care<\/span><\/span><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38550fa elementor-widget elementor-widget-heading\" data-id=\"38550fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Operators of Essential Service and IT Suppliers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2fda2a elementor-widget elementor-widget-text-editor\" data-id=\"c2fda2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These organisations require an independent audit following a defined process and report template, with the mandated scope as follows:<\/p><ul><li><p>1.1 The organisation has a framework in place to support Lawfulness, Fairness<br \/>and Transparency (except 1.1.7 and 1.1.8)<\/p><\/li><li><p>2.2 Staff contracts set out responsibilities for data security<\/p><\/li><li><p>3.1 Staff have appropriate understanding of information governance and cyber<br \/>security, with an effective range of approaches taken to training and awareness<\/p><\/li><li><p>3.2 Your organisation engages proactively and widely to improve data security, and has an open and just culture for data security incidents<\/p><\/li><li>4.5 You ensure your passwords are suitable for the information you are<br \/>protecting<\/li><li>5.1 Process reviews are held at least once per year where data security is put at<br \/>risk and following DS incidents<\/li><li>6.2 All user devices are subject to anti-virus protections while email services<br \/>benefit from spam filtering and protection deployed at the corporate gateway<\/li><li>7.1 Organisations have a defined, planned and communicated response to Data<br \/>security incidents that impact sensitive information or key operational services<\/li><li>8.2 Unsupported software and hardware is categorised and documented, and<br \/>data security risks are identified and managed<\/li><li>9.2 A penetration test has been scoped and undertaken<\/li><li>9.5 You securely configure the network and information systems that support the<br \/>delivery of essential services<\/li><li>9.6 The organisation is protected by a well-managed firewall<\/li><li>10.2 Basic due diligence has been undertaken against each supplier that<br \/>handles personal information<\/li><\/ul><p>The report will include risk ratings for the 10 controls and an overall risk rating.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c528d02 elementor-widget elementor-widget-heading\" data-id=\"c528d02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Summary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa4f8d elementor-widget elementor-widget-text-editor\" data-id=\"6aa4f8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NHS England expect the independent assessments to be completed between January and June 2025, with self-assessment submission by 30 June 2025.<\/p><p>Dionach provide independent assessments against DSPT CAF \u2013 contact Dionach to arrange a call to see how we can help you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd335c5 elementor-widget elementor-widget-heading\" data-id=\"fd335c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">References:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-500aa09 elementor-widget elementor-widget-text-editor\" data-id=\"500aa09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NHS England DSPT CAF Guidance<\/p><p><a href=\"https:\/\/digital.nhs.uk\/cyber-and-data-security\/guidance-and-assurance\/2024-25-caf-aligned-dspt-guidance\">https:\/\/digital.nhs.uk\/cyber-and-data-security\/guidance-and-assurance\/2024-25-caf-aligned-dspt-guidance<\/a> \u00a0<\/p><p>NHS England Independent Assessment Guides<\/p><p><a href=\"https:\/\/www.dsptoolkit.nhs.uk\/Help\/Independent-Assessment-Guides\">https:\/\/www.dsptoolkit.nhs.uk\/Help\/Independent-Assessment-Guides<\/a><\/p><p>NCSC Cyber Assessment Framework (CAF)<\/p><p><a href=\"https:\/\/www.ncsc.gov.uk\/collection\/cyber-assessment-framework\">https:\/\/www.ncsc.gov.uk\/collection\/cyber-assessment-framework<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT. \u00a0 Organisations are required to have an independent audit assessment to the agreed CAF-aligned DSPT audit framework. \u00a0 Dionach can provide these independent assessments for organisations, which are required to validate self-assessment outcomes. There [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":18977,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-18972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF<\/title>\n<meta name=\"description\" content=\"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF\" \/>\n<meta property=\"og:description\" content=\"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-09T14:47:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T15:12:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach by Nomios\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach by Nomios\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9\"},\"headline\":\"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF\",\"datePublished\":\"2025-01-09T14:47:17+00:00\",\"dateModified\":\"2025-07-15T15:12:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\"},\"wordCount\":478,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1\",\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\",\"url\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\",\"name\":\"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1\",\"datePublished\":\"2025-01-09T14:47:17+00:00\",\"dateModified\":\"2025-07-15T15:12:35+00:00\",\"description\":\"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1\",\"width\":2048,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\/\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF","description":"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/","og_locale":"en_US","og_type":"article","og_title":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF","og_description":"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an","og_url":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2025-01-09T14:47:17+00:00","article_modified_time":"2025-07-15T15:12:35+00:00","og_image":[{"width":2048,"height":1024,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","type":"image\/jpeg"}],"author":"Dionach by Nomios","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach by Nomios","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9"},"headline":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF","datePublished":"2025-01-09T14:47:17+00:00","dateModified":"2025-07-15T15:12:35+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/"},"wordCount":478,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/","url":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/","name":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","datePublished":"2025-01-09T14:47:17+00:00","dateModified":"2025-07-15T15:12:35+00:00","description":"The new DSPT for 2024\/2025 is now aligned to the NCSC Cyber Assessment Framework (CAF). This version 7 of the DSPT.\u00a0Organisations are required to have an","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","width":2048,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/data-security-and-protection-toolkit-dspt-2024-2025-caf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Data Security and Protection Toolkit (DSPT) 2024\/2025 CAF"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/01\/AdobeStock_975472578.jpeg?fit=2048%2C1024&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-4W0","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/18972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=18972"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/18972\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/18977"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=18972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=18972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=18972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}