Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
Part 1 of a 2-part series on adopting the NCSC Cyber Assessment Framework (CAF 4.0)
In September 2025, the UK’s National Cyber Security Centre (NCSC) updated its Cyber Assessment Framework (CAF) to version 4.0, marking a significant evolution in how organisations assess and improve their cyber security maturity.
Unlike prescriptive checklists, CAF 4.0 is outcome focused. It establishes objectives, principles, and Indicators of Good Practice (IGPs) that define what success looks like, not just what needs to be done.
“The NCSC CAF… [is a] … specification of what needs to be achieved rather than a checklist of what needs to be done.”
This shift reflects a broader recognition that resilience cannot be achieved through compliance alone. Organisations must demonstrate measurable outcomes with clear evidence that their policies, processes, and governance structures are effectively managing cyber risk.
At its core, the CAF is designed to help organisations understand, assess, and manage cyber security risks systematically. But to achieve that, leadership must have access to reliable, real-time information about their security posture. When you lack visibility and evidence, governance relies on opinion and assumption. Both of which are inadequate in today’s dynamic threat landscape.
Target Outcome
Appropriate organisational structures, policies, processes, and procedures in place to understand, assess, and systematically manage security risks to network and information systems supporting essential functions.
Managing security risk is foundational to the CAF. It ensures that the systems and processes supporting essential functions are resilient to disruption, compromise, or misuse. To meet these objectives, organisations need structures and processes that connect governance intent with operational execution, to ensure that every stakeholder, from the board to the technical team, has access to accurate and timely information about risk.
CAF Objective A is built around four key principles: Governance, Risk Management, Asset Management, and Supply Chain Security. Together, they create a framework for systematic practices, continuous assurance and informed decision-making.
Strong governance begins at the top. The CAF defines that overall accountability for cyber security rests with the board, supported by clear delegation of roles and responsibilities. Decision-makers must remain informed about the security and resilience of the organisation’s essential systems and act where issues could impact operations.
Governance in a CAF context is not about oversight alone; it’s about active assurance. Boards must regularly review their risk management policies, evaluate their continued relevance, and ensure that reporting mechanisms provide evidence of effectiveness.
This requires consistent, quantitative insight into how well security policies, controls, and behaviours are performing. With that data, leaders can make informed decisions about risk tolerance, investment, and remediation priorities.
Effective risk management relies on the ability to identify, assess, and respond to threats in a structured and verifiable way. CAF 4.0 calls for systematic processes that move beyond questionnaires and periodic reviews and towards evidence-based, enterprise-wide risk management practices.
This means continuously collecting data on vulnerabilities, control effectiveness, and incidents. This approach gives decision-makers current, reliable information to make informed risk decisions. The process must deliver visibility into which risks matter most, their likely impact, and the mitigations in place.
An organisation that manages risk effectively understands not only what its risks are, but also how well its existing defences are performing against them. This continuous feedback loop is central to achieving the CAF’s goal of sustained resilience.
You cannot protect what you cannot see. Asset management, though often overlooked, is critical to understanding and maintaining resilience across essential functions.
The CAF requires organisations to identify and understand everything that supports those functions. From data and people to systems and infrastructure. This inventory is the foundation for prioritising protection, detecting anomalies, and managing dependencies.
Maintaining an accurate and current picture of assets, however, can be difficult, especially in dynamic environments where systems and users change frequently. Organisations must therefore adopt routine processes (ideally automated), that monitor the state of assets continuously, flagging changes, and alerting stakeholders to new risks.
So, without that visibility, even the most robust governance and risk management frameworks can be undermined by unknown or unmanaged components in the environment.
Cyber resilience extends beyond an organisation’s boundaries. Dependencies on suppliers, managed service providers, and other third parties can introduce significant risks, particularly when those entities support critical systems or data.
The CAF emphasises the need to understand and manage these dependencies throughout the procurement lifecycle. This includes assessing supplier maturity, the provenance of their supply chain, and clearly defining shared security obligations within contracts and ongoing operations.
Visibility across the extended enterprise is often challenging, but essential. Consistent and objective supplier-performance evidence gives organisations confidence that they are managing external risks to the same standard as internal ones.
In practice, this means embedding supplier assurance processes that deliver verifiable data about control effectiveness and risk posture, not just attestations.
CAF 4.0 reflects the reality that cyber security governance and risk management cannot be static or compliance driven. Threats evolve, systems change, and business priorities shift. Therefore, organisations need governance structures and assurance processes that are continuous, data-driven, and responsive.
Manual or ad hoc assessments, even when well-intentioned, are no longer sufficient. They invariably offer only fleeting snapshots in time, while risks and exposures evolve continuously. To meet CAF’s outcome-based expectations, organisations must modernise how they gather, analyse, and act on security information.
This means moving from a reactive audit cycle to a proactive, continuous assurance model. One that leverages automation and real-time data to reliably measure and manage cyber security performance.
The NCSC CAF calls for evidence-based measurement of cyber security outcomes. Huntsman Security’s suite of technologies, Enterprise SIEM, Scorecard, and SmartCheck, are designed to help organisations deliver exactly that.
Certainly, by adopting these evidence-based tools, organisations can confidently measure progress, identify weaknesses, and prioritise remediation in support of essential functions.
Finally, adopting the NCSC CAF 4.0 is not merely a compliance exercise, it’s an opportunity to embed stronger, outcome-driven cyber resilience practices across the organisation.
Objective A, Managing Security Risk, lays the foundation for that transformation. It connects governance, risk management, asset awareness, and supplier assurance under a single principle: informed, accountable decision-making based on evidence.
Huntsman Security’s continuous threat exposure management solutions provide the measurement and visibility needed to support that principle in practice, enabling organisations to turn CAF objectives into operational reality.
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.