CINXE.COM
<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:thr="http://purl.org/syndication/thread/1.0" xml:lang="en-US" > <title type="text">Technology in government</title> <subtitle type="text">About digital and technology projects in government.</subtitle> <updated>2025-04-02T09:14:06Z</updated> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk" /> <id>https://technology.blog.gov.uk/feed/</id> <link rel="self" type="application/atom+xml" href="https://technology.blog.gov.uk/feed/" /> <entry> <author> <name>Cloud and Platform team at GDS</name> </author> <title type="html"><![CDATA[Government’s Cloud First Policy is 12!]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2025/02/18/governments-cloud-first-policy-is-12/" /> <id>https://technology.blog.gov.uk/?p=5193</id> <updated>2025-04-02T09:14:06Z</updated> <published>2025-02-18T13:46:55Z</published> <category scheme="https://technology.blog.gov.uk" term="Cloud" /> <summary type="html"><![CDATA[Two landmark publications: the State of Digital Government Review, and the blueprint for modern digital government are clear - cloud technology is helping to reshape how government works. With the blueprint setting out the long-term vision, and with the Government …]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2025/02/18/governments-cloud-first-policy-is-12/"><![CDATA[ <figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="3840" height="2160" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash.jpg" alt="Graphic image of HD computer with cloud" class="wp-image-5194" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash.jpg 3840w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash-300x169.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash-1024x576.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash-768x432.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash-1536x864.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2025/02/growtika-Am6pBe2FpJw-unsplash-2048x1152.jpg 2048w" sizes="(max-width: 3840px) 100vw, 3840px" /><figcaption class="wp-element-caption">Credit: Unsplash @growtika </figcaption></figure> <p>Two landmark publications: the <a href="https://www.gov.uk/government/publications/state-of-digital-government-review/state-of-digital-government-review">State of Digital Government Review</a>, and <a href="https://www.gov.uk/government/publications/a-blueprint-for-modern-digital-government">the blueprint for modern digital government</a> are clear - cloud technology is helping to reshape how government works.</p> <p>With the blueprint setting out the long-term vision, and with the <a href="https://www.gov.uk/guidance/government-cloud-first-policy">Government Cloud First</a> policy turning 12, we thought it was a good time to reflect on the successes, the challenges and our current focus.</p> <p>The objective of the <a href="https://www.gov.uk/guidance/government-cloud-first-policy">Government Cloud First policy</a> is that government departments and public organisations should use public cloud services as their first choice when buying IT services. This rule must be followed by central government and is strongly encouraged for other public sector organisations. The aim is for us to spend less time provisioning technology and more time improving public services.</p> <h3 class="wp-block-heading"><strong>Cloud technology has helped us improve our public services</strong></h3> <p><a href="https://www.gov.uk/government/publications/state-of-digital-government-review/state-of-digital-government-review">The State of Digital Government Review</a> found that about 60% of UK government and public sector IT systems are run on cloud services. This is a good percentage when compared to big private companies and other countries, and we now have lots of experience of cloud helping departments to deliver services.</p> <p>The Ministry of Justice (MoJ) has used the Cloud to simplify its operations, enhance internal collaboration, and reduce reliance on legacy systems. They have created a <a href="https://aws.amazon.com/solutions/case-studies/uk-ministry-of-justice/">data and analytics platform</a> that serves over 500 professionals daily with data from diverse sources; ranging from legacy databases to modern digital services.</p> <p>While this shift has delivered better public services, cost savings and improved security, it's not without its hurdles. Departments are grappling with the complexities of moving their remaining legacy systems, addressing skills shortages, and managing security concerns.</p> <h3 class="wp-block-heading"><strong>Our focus now</strong></h3> <p><strong>What we are doing</strong></p> <ul class="wp-block-list"> <li>Coordinating professional development opportunities so that Government Digital and Data professionals have access to low (or zero) cost training and certification programmes such as the AWS Solutions architect Profession bootcamp, Microsoft’s Cross Platforms Hero’s, the Oracle University. <a href="https://digitalpeople.blog.gov.uk/2024/09/17/get-cloud-certified-this-autumn/">Read more about the Get Cloud Certified this autumn programme</a> we ran last year as a good example of the training on offer.</li> <li>Supporting under-represented groups in technology with initiatives like the AWS CloudUp for Her pilot and Microsoft’s TechHer for Government.</li> <li>Working with cloud service providers to offer consistently secure, well-architected cloud environments that can be rapidly deployed and consumed. We want to ensure all elements of the public sector can access their services and benefit from enhanced deals and cost savings.</li> <li>Looking to connect and strengthen the communities of cloud practitioners that have emerged across the public sector. We will hold regular events with key partners and suppliers to share knowledge and best practice. </li> </ul> <p>More information and resources to support your organisations’ cloud journey are available in the new <a href="https://www.gov.uk/government/collections/cloud-technology-and-the-public-sector">GOV.UK collection</a>: <a href="https://www.gov.uk/government/publications/cloud-guide-for-the-public-sector/cloud-guide-for-the-public-sector">Cloud Guidance for the public sector</a>, and by contacting <a href="mailto:cloud-strategy@digital.cabinet-office.gov.uk">the GDS Cloud Strategy mailbox</a>.</p> <p></p> <p></p> ]]></content> <link rel="replies" type="text/html" href="https://technology.blog.gov.uk/2025/02/18/governments-cloud-first-policy-is-12/#comments" thr:count="0" /> <link rel="replies" type="application/atom+xml" href="https://technology.blog.gov.uk/2025/02/18/governments-cloud-first-policy-is-12/feed/" thr:count="0" /> <thr:total>0</thr:total> </entry> <entry> <author> <name>Simon Foster, Head of Protecting Public Service Domains, CDDO</name> </author> <title type="html"><![CDATA[The 5 year journey to moving .gov.uk to a new registry]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2024/09/20/the-5-year-journey-to-moving-gov-uk-to-a-new-registry/" /> <id>https://technology.blog.gov.uk/?p=5129</id> <updated>2024-09-20T13:59:24Z</updated> <published>2024-09-20T13:59:10Z</published> <category scheme="https://technology.blog.gov.uk" term="News" /><category scheme="https://technology.blog.gov.uk" term="Security" /><category scheme="https://technology.blog.gov.uk" term="Transformation" /> <summary type="html"><![CDATA[Find out how the Domains team planned and executed the biggest ever change to digital infrastructure with zero disruption to citizen services.]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2024/09/20/the-5-year-journey-to-moving-gov-uk-to-a-new-registry/"><![CDATA[ <figure class="wp-block-image size-large"><img decoding="async" width="1024" height="439" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-1024x439.jpg" alt="DNS Domain Name System Server" class="wp-image-5131" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-1024x439.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-300x129.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-768x329.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-1536x658.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/09/shutterstock_463024261-1-2048x877.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure> <p>A week before the 2024 General Election, the Domains team carried out one of the most important digital infrastructure changes in government history. </p> <p>In theory the migration to a new .gov.uk Registry Operator required a few technical changes, but it was not as simple as that. There was a risk these changes would interrupt people from using all of the UK government’s digital services, including the ability to use the <a href="https://www.gov.uk/register-to-vote">Register to vote service</a> at a time when it was needed most.</p> <p>Before we dive into the preparation that went into the migration, let’s start by explaining the importance of the .gov.uk registry.</p> <h3 class="wp-block-heading"><strong>Why is the .gov.uk domain so important?</strong></h3> <p>The Domains team at the Central Digital and Data Office (CDDO) is responsible for operating the .gov.uk domain or as we call it the “.gov.uk registry”. That’s different to the GOV.UK brand, which is used to describe the government’s website. </p> <p>We approve applications for all .gov.uk third-level domains - like “cabinetoffice.gov.uk”, “hmrc.gov.uk” or newly created ones like “greatbritishenergy.gov.uk”. Not all domains have websites - some are simply used to provide emails or other services.</p> <p>The .gov.uk registry currently contains 5,000 public sector domain names. Just like an address book, the registry tells your browser, your email, and everything else where to find that domain on the internet. Domain registries exist in a hierarchy across the internet as part of the global Domain Name System (DNS).</p> <p>If a domain registry fails, your internet browser will not be able to find the websites that the registry was publishing. Similarly, all email and other digital services that use that domain will stop.</p> <h3 class="wp-block-heading"><strong>The journey to a new .gov.uk registry </strong></h3> <p>Our journey to improve the security and resilience of the .gov.uk domain name and all the services that sit under it began 5 years ago when the Domains team was assembled. </p> <p>Up until the switch-over, the .gov.uk registry was run on a pro-bono basis that was not meeting internationally recognised standards. That was not the fault of any party in particular, it was due to having a legacy memorandum of understanding that was set up in a world where the internet was in its infancy.</p> <p>Our 3 objectives for the .gov.uk registry were to make it:</p> <ul class="wp-block-list"> <li>highly globally resilient as it underpins all critical digital services</li> <li>meet internationally recognised DNS standards, set by the Internet Corporation for Assigned Names and Numbers (ICANN), for better interoperability and future portability</li> <li>meet the <a href="https://www.ncsc.gov.uk/collection/cyber-assessment-framework">National Cyber Security Centre’s Cyber Assessment Framework (NCSC CAF) standards</a></li> </ul> <p>We also wanted our .gov.uk Registry provider to help us prevent and fix domain related cyber vulnerabilities, which is the main focus of what the CDDO Domains team does.</p> <p>To create a fair open market competition we worked closely with Crown Commercial Service to enable our registry procurement through the <a href="https://www.crowncommercial.gov.uk/agreements/RM6116:1d/lot-suppliers">Network Services 3 Framework</a>.</p> <p>Once we were set up with a Lot on NS3, the real work could begin. Starting in March 2022, we planned 7 workshops with potential Registry Operator bidders as well as the 300 plus Registrars in our marketplace to assess the viability and impact.</p> <p>Getting feedback from the marketplace was critical. This helped the Domains team create 40 pages worth of in-depth technical requirements for the Registry Operator as well as <a href="https://www.gov.uk/guidance/criteria-to-be-a-govuk-approved-registrar">Criteria to be a .gov.uk Approved Registrar</a>, which all had to go through commercial and legal review. </p> <h3 class="wp-block-heading"><strong>Evaluating bids, planning the transition and getting Public Sector assurance</strong></h3> <p>Our incumbent supplier, Jisc, did not bid for the new contract to run the Registry because it was outside of its educational and charitable remit, but they supported us strongly throughout the process. </p> <p>During the bidding process, each supplier had to answer 44 questions, which were marked by a team of 3 evaluators from the Domains team. Nominet - who have operated the .uk domain since 1996, was awarded the contract in November 2023 and a phased migration plan was put into place. This consisted of:</p> <ul class="wp-block-list"> <li>5 workshops with CDDO, Nominet and Jisc to prepare for the migration</li> <li>1 Assurance deep-dive day</li> <li>3 weekly meetings with suppliers to update</li> <li>2 Registrar workshops to answer their questions</li> </ul> <p>Transitioning a registry is a fairly common activity, but if it goes wrong it could cause significant disruption. We could not let this happen to our stakeholder community of thousands of Public Sector bodies, plus the millions of people that rely on them every day.</p> <p>We wanted to be sure that we had addressed every risk comprehensively, so we asked the Chief Technology Officer’s Council and the Cabinet Office Commercial Information Assurance Team to provide in-depth independent assurance. We also set up a Change Advisory Board (CAB) composed of representatives from across the Public Sector. This group monitored a set of criteria from all transition-critical areas and had the ultimate decision making power on whether to proceed with the transition.</p> <h3 class="wp-block-heading"><strong>Transition day - 26 June 2024</strong></h3> <p>Successful digital change often results in a glorious anti-climax. In our case, the months of data cleaning, testing and risk mitigation planning resulted in an uneventful call with members of the CAB, the outgoing provider and the incoming provider. </p> <p>Instructions were given out to make technical DNS changes, which were monitored step-by-step. </p> <p>User experience of DNS changes do not happen immediately. Your laptop, phone and even your ISP has a cache of its recent DNS queries, so you won’t experience any changes until these caches expire and you run a new DNS lookup. This caching exists at every level across the internet, and the cache expiry times can range from a few seconds to a few days.</p> <p>What this meant was that we could not immediately confirm that the transition was successful. We had to wait, and that is what we did.</p> <p>By lunchtime we had confirmation that the new registry’s 4 primary name servers were responding to DNS queries from across the world, and by mid afternoon, we had confirmation that the new registry’s 4 secondary name servers were also responding.</p> <p>The transition had been a complete success, and - most importantly - no one had noticed that it had happened.</p> <h3 class="wp-block-heading"><strong>Next steps</strong></h3> <p>Our work does not end with the migration. The team is continuing to improve the operation of the .gov.uk registry by introducing technical checks and increasing the governance of the Registrar channel. </p> <p>If you need any more information you can contact support@domains.gov.uk.</p> ]]></content> </entry> <entry> <author> <name>Nick Woodcraft, Domains Product Owner, CDDO</name> </author> <title type="html"><![CDATA[Missing the Point(er)]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2024/05/10/missing-the-pointer/" /> <id>https://technology.blog.gov.uk/?p=5114</id> <updated>2024-05-10T08:34:19Z</updated> <published>2024-05-10T08:15:13Z</published> <category scheme="https://technology.blog.gov.uk" term="Security" /><category scheme="https://technology.blog.gov.uk" term="Tools" /><category scheme="https://technology.blog.gov.uk" term="Transformation" /> <summary type="html"><![CDATA[Email security policy for the UK Government has been fairly consistent for a while, so we were pleased when Google and Yahoo decided to tighten their email authentication requirements that align closely to our own guidance. One element that stands …]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2024/05/10/missing-the-pointer/"><![CDATA[<p><img decoding="async" class="alignnone size-large wp-image-5119" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527-1024x666.jpg" alt="Image of postcard with numbers>words>numbers written on it" width="620" height="403" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527-1024x666.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527-300x195.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527-768x500.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527-1536x999.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/05/PXL_20240509_134906527.jpg 1600w" sizes="(max-width: 620px) 100vw, 620px" /></p> <p><span style="font-weight: 400">Email security policy for the UK Government has been fairly consistent for a while, so we were pleased when </span><a href="https://blog.google/products/gmail/gmail-security-authentication-spam-protection/"><span style="font-weight: 400">Google and Yahoo decided to tighten their email authentication requirements</span></a><span style="font-weight: 400"> that align closely to </span><a href="https://www.gov.uk/guidance/securing-government-email"><span style="font-weight: 400">our own guidance</span></a><span style="font-weight: 400">. One element that stands out however, is their requirement that all IP addresses must have a PTR (‘Pointer’ or ‘reverse DNS’) record. This is also in our guidance, but was a little buried until a recent update. </span></p> <h3><b>What is a PTR?</b></h3> <p><span style="font-weight: 400">They are a less well known but important part of the anti-spam toolkit, and we probably ought to give them more attention than we have up to now. Google and Yahoo may be tightening their approach, but most other email providers use PTR records in their checks as well.</span></p> <p><span style="font-weight: 400">PTR records provide some reassurance that a sender is well established and trustworthy. When an email is received the IP address is checked for its PTR record. Google states:</span></p> <p><i><span style="font-weight: 400">Every IP address must map to a hostname in the PTR record. The hostname specified in the PTR record must have a forward DNS that refers to the sending IP address.</span></i></p> <p><span style="font-weight: 400">This means the sending service has control of the IP address, the DNS associated with the IP address, and the sending hostname. Spammers are more likely to use short lived domains for sending, and spoof IP addresses, meaning they won’t be able to get valid PTR records in place.</span></p> <p><span style="font-weight: 400">A lack of good PTR records won’t always cause an email to be rejected, but it adds to the overall spam score and could be the thing that tips a message into the spam folder.</span></p> <h3><b>PTR in government</b></h3> <p><span style="font-weight: 400">Improving email security is a collective effort in the UK Government, across teams including the Government Security Group in Cabinet Office, the National Cyber Security Centre (NCSC), us in the Central Digital and Data Office (CDDO), and the Government Security Centre for Cyber. We also get help with implementation in the local sector from Information Security for London (ISfL).</span></p> <p><span style="font-weight: 400">Across these organisations we’ve looked at email sending IP addresses and at IP addresses in Sender Policy Framework (SPF) records. These records list the email sending sources approved to send email for a domain. A review of SPF records across the sector shows there are problems. Many include email sending services that are out of use, or have changed IP addresses.</span></p> <p><span style="font-weight: 400">It is vital that genuine messages from government to citizens are delivered, so in CDDO, NCSC, and ISfL we’ve been doing some outreach to the organisations explaining the problem and providing help on how to fix it.</span></p> <h3><b>Identifying the problem</b></h3> <p><span style="font-weight: 400">Spotting when a PTR record is missing or broken can be difficult, particularly if you don’t have great visibility of the services you use to send email. People in your organisation may notice email failing to deliver. It could be when they send from a particular source, like a mailing list service, or when they send to a particular provider like Google or Yahoo.</span></p> <p><span style="font-weight: 400">If you’re signed up to the </span><a href="https://www.ncsc.gov.uk/information/mailcheck"><span style="font-weight: 400">NCSC’s Mail Check service</span></a><span style="font-weight: 400"> (and if you look after email for a public sector organisation you definitely should be) you can send them your </span><a href="https://www.gov.uk/government/publications/email-security-standards/domain-based-message-authentication-reporting-and-conformance-dmarc"><span style="font-weight: 400">DMARC</span></a><span style="font-weight: 400"> reports. Mail Check can tell you where problems lie, and specifically calls out when PTR records aren’t set up correctly.</span></p> <h3><b>Looking up PTR records</b></h3> <p><span style="font-weight: 400">You can also check your records for yourself. If you have an IP address in your SPF record that’s a good place to start. You can use </span><a href="https://en.wikipedia.org/wiki/Dig_(command)"><span style="font-weight: 400">dig</span></a><span style="font-weight: 400"> (the Domain Information Groper) or a web-based dig-like tool like the </span><a href="https://toolbox.googleapps.com/apps/dig/"><span style="font-weight: 400">Google Admin toolbox</span></a><span style="font-weight: 400"> or </span><a href="https://www.digwebinterface.com/"><span style="font-weight: 400">Dig web interface</span></a><span style="font-weight: 400">.</span></p> <p><span style="font-weight: 400">Enter the IP address of your sending email service and lookup the PTR record:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">dig -x <your_ip_address></span></pre> </div> <p><span style="font-weight: 400">and it should return an in-addr.arpa record pointing to a valid domain.</span></p> <p><span style="font-weight: 400">For example, Mail Chimp sends some of its email on behalf of customers from 148.105.10.6. If we look up the PTR record for this:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">dig -x 148.105.10.6</span></pre> </div> <p><span style="font-weight: 400">we get:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">6.10.105.148.in-addr.arpa. 86400 IN</span> <span style="font-weight: 400">PTR</span> <span style="font-weight: 400">mail6.sea172.mcdlv.net.</span></pre> </div> <p><span style="font-weight: 400">If we then look for an A record of mail6.sea172.mcdlv.net.:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">dig a mail6.sea172.mcdlv.net</span></pre> </div> <p><span style="font-weight: 400">we get:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">mail6.sea172.mcdlv.net.</span> <span style="font-weight: 400">86400</span> <span style="font-weight: 400">IN</span> <span style="font-weight: 400">A</span> <span style="font-weight: 400">148.105.10.6</span></pre> </div> <p><span style="font-weight: 400">So the IP address points to a valid hostname AND that domain points back to the same IP address. This tells us that both the hostname and the IP address are linked and under some level of shared control, making email sent from this address more trustworthy.</span></p> <h3><b>What is in-addr.arpa?</b></h3> <p><span style="font-weight: 400">.in-addr.arpa domains are delegated to the owners of a network range. The owner of the IP address range also controls the DNS of the respective .in-addr.arpa domain and can create DNS records on it, including the all important PTR record.</span></p> <h3><b>Fixing the problem</b></h3> <p><span style="font-weight: 400">If you find an IP address that doesn’t have working PTR record somewhere in your email sending services, you can look up the owner with the WHOIS command:</span></p> <div class="highlight"> <pre><span style="font-weight: 400">whois <your_ip_address></span></pre> </div> <p><span style="font-weight: 400">or use a </span><a href="https://lookup.icann.org/en/lookup"><span style="font-weight: 400">web based WHOIS lookup</span></a><span style="font-weight: 400">. For example, looking up the IP 148.105.10.6 again tells us it is delegated by ARIN (the </span><a href="https://www.arin.net/"><span style="font-weight: 400">American Registry of Internet Numbers</span></a><span style="font-weight: 400">) to MailChimp. There are five </span><a href="https://en.wikipedia.org/wiki/Regional_Internet_registry"><span style="font-weight: 400">Regional Internet Registries</span></a><span style="font-weight: 400"> (RIRs) providing Internet resource allocations, registration services and coordination activities for the internet. </span></p> <p><span style="font-weight: 400">Once you know who owns the IP address you’ll need to contact them and ask them to put the PTR record in place. Some larger organisations or service providers may own their own IP addresses. Others may be owned by an Internet Service Provider and leased to the organisation running the email service. Whoever owns it, they’ll need to add the record. This is a standard part of running a reliable email service and should always be provided.</span></p> <h3><strong>Read my previous blogs on</strong></h3> <ul> <li style="font-weight: 400"><a href="https://technology.blog.gov.uk/2024/02/16/how-our-domains-data-sharing-beta-aims-to-reduce-domain-vulnerabilities/"><span style="font-weight: 400">How our Domains Data Sharing beta aims to reduce domain vulnerabilities</span></a></li> <li style="font-weight: 400"><a href="https://technology.blog.gov.uk/2023/05/10/weve-removed-98-gsi-family-domains-from-the-public-sector/"><span style="font-weight: 400">We’ve removed 98% of gsi-family domains from the public sector</span></a></li> <li style="font-weight: 400"><a href="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/"><span style="font-weight: 400">Removing gsi-family domains from the public sector</span></a></li> </ul> ]]></content> </entry> <entry> <author> <name>Nick Woodcraft, Domains Product Owner, CDDO</name> </author> <title type="html"><![CDATA[How our Domains Data Sharing beta aims to reduce domain vulnerabilities]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2024/02/16/how-our-domains-data-sharing-beta-aims-to-reduce-domain-vulnerabilities/" /> <id>https://technology.blog.gov.uk/?p=5097</id> <updated>2024-02-16T14:20:06Z</updated> <published>2024-02-16T14:20:06Z</published> <category scheme="https://technology.blog.gov.uk" term="News" /> <summary type="html"><![CDATA[Every organisation has vulnerabilities in its digital infrastructure, including in its Domain Name System (DNS). In the Protecting Public Sector Domains team in the Central Digital and Data Office (CDDO) we work to identify and fix those vulnerabilities before our …]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2024/02/16/how-our-domains-data-sharing-beta-aims-to-reduce-domain-vulnerabilities/"><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5099" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359.jpg" alt="DNS Domain Name System Concept photography" width="6000" height="4000" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359.jpg 6000w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359-300x200.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359-1024x683.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359-768x512.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359-1536x1024.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2024/02/shutterstock_2165242359-2048x1365.jpg 2048w" sizes="auto, (max-width: 6000px) 100vw, 6000px" /></p> <p><span style="font-weight: 400">Every organisation has vulnerabilities in its digital infrastructure, including in its Domain Name System (DNS). In the Protecting Public Sector Domains team in the Central Digital and Data Office (CDDO) we work to identify and fix those vulnerabilities before our adversaries find them. We’d also like to do that for other kinds of vulnerabilities, related to email and web services. This isn’t easy, but it’s a goal we’re working towards.</span></p> <p><span style="font-weight: 400">Our monitoring tools find misconfiguration and vulnerability data from a variety of services, and we’re gradually expanding our scope and capability. Once we have the data, we have found the hardest part is getting the information into the hands of the person who can fix it.</span></p> <p><span style="font-weight: 400">To that end we are running a Domain Data Sharing programme to send the vulnerability data we collect directly to public sector organisations via their SIEM (Security Information and Event Management) or other systems. </span></p> <h3><b>SIEM on the rise, tracking is hard: what we learnt during discovery</b></h3> <p><span style="font-weight: 400">Last year, we ran a discovery programme to look for a way to share <em>all </em>our vulnerability data, not just the biggest and most urgent problems. We talked to people in public sector organisations who manage and fix domain issues, or operate vulnerability management or other teams that work every day to fix these kinds of problems. We found that:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">knowing what domains an organisation has and who controls them is surprisingly hard</span></li> <li style="font-weight: 400"><span style="font-weight: 400">it can take longer to find the person who can fix the vulnerability, than it does to fix the vulnerability itself</span></li> <li style="font-weight: 400"><span style="font-weight: 400">lots of organisations lack a consistent approach to handling vulnerabilities - they come in different formats and from different sources, and different parts of the organisation need to fix them depending on what they are</span></li> <li style="font-weight: 400"><span style="font-weight: 400">some processes for managing vulnerabilities are new, or more informal, and the process can be hard to track</span></li> <li style="font-weight: 400"><span style="font-weight: 400">lots of people like the National Cyber Security Centre’s </span><a href="https://www.ncsc.gov.uk/section/active-cyber-defence/services"><span style="font-weight: 400">Active Cyber Defence (ACD) services</span></a><span style="font-weight: 400">, and that is where they expect to go to find out about misconfigurations and vulnerabilities</span></li> <li style="font-weight: 400"><span style="font-weight: 400">lots of people also like someone to get in touch and tell them directly when something is wrong</span></li> </ul> <p><span style="font-weight: 400">We also found that SIEM adoption is growing. These are systems that collect and analyse data from different sources like network devices or servers, and external feeds like ours, and use them to spot security issues. These are toolsets that can handle the volume of data we offer in a way that’s useful to our users.</span></p> <h3><b>Launching our Domain Data Sharing beta programme</b></h3> <p><span style="font-weight: 400">In light of our learnings during the discovery phase, we've got a Domain Data Sharing beta programme running right now that will:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">set up SIEM integrations, so we can get data to where it can be acted on most quickly</span></li> <li style="font-weight: 400"><span style="font-weight: 400">set up DNS hosting integrations, so we know what domains you have, and make sure we're monitoring everything</span></li> <li style="font-weight: 400"><span style="font-weight: 400">work with your organisation to map out the business processes used to handle vulnerabilities, and help you improve them if needed</span></li> </ul> <p><span style="font-weight: 400">We’re also working with NCSC to include our data in ACD services in the future.</span></p> <div class="highlight"> <h3><b>Join our beta and explore your organisation’s domain vulnerabilities </b></h3> <p><span style="font-weight: 400">So if you have struggled with the kind of problems we found in our discovery, or you'd just like to get a free feed of domain, web, and email vulnerabilities for your public sector organisation, we’d like you to join our Domain Data Sharing beta programme. Get in touch with us at </span><a href="mailto:support@domains.gov.uk"><span style="font-weight: 400">support@domains.gov.uk</span></a><span style="font-weight: 400"> to sign up.</span></p> </div> ]]></content> </entry> <entry> <author> <name>Claudia Chiurlia, Delivery Manager, Central Digital and Data Office</name> </author> <title type="html"><![CDATA[Navigating Microsoft 365 guidance for UK government digital, data and technology professionals]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2023/10/05/navigating-microsoft-365-guidance-for-uk-government-digital-data-and-technology-professionals/" /> <id>https://technology.blog.gov.uk/?p=5040</id> <updated>2023-10-20T13:55:53Z</updated> <published>2023-10-05T13:50:02Z</published> <category scheme="https://technology.blog.gov.uk" term="Tools" /><category scheme="https://technology.blog.gov.uk" term="Transformation" /> <summary type="html"><![CDATA[In an unprecedented age where secure and efficient collaboration is paramount, the Central Digital and Data Office has taken a significant stride forward by collaborating with Microsoft and the National Cyber Security Centre (NCSC) to develop comprehensive guidance for the …]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2023/10/05/navigating-microsoft-365-guidance-for-uk-government-digital-data-and-technology-professionals/"><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5042 size-large" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/10/CDDO-Blog-Featured-Image-template-19-1024x535.png" alt="3d fingerprint cyber secure icon. Digital security authentication concept. " width="620" height="324" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/10/CDDO-Blog-Featured-Image-template-19-1024x535.png 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/10/CDDO-Blog-Featured-Image-template-19-300x157.png 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/10/CDDO-Blog-Featured-Image-template-19-768x401.png 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/10/CDDO-Blog-Featured-Image-template-19.png 1200w" sizes="auto, (max-width: 620px) 100vw, 620px" /></p> <p><span style="font-weight: 400">In an unprecedented age where secure and efficient collaboration is paramount, <a href="https://www.gov.uk/government/organisations/central-digital-and-data-office">the Central Digital and Data Office</a> has taken a significant stride forward by collaborating with Microsoft and the National Cyber Security Centre (NCSC) to develop comprehensive guidance for the UK government organisations that are using Microsoft 365. </span></p> <p><span style="font-weight: 400">The guidance has been designed by digital, data and technology professionals across government to empower and support each other in alignment with the Mission Four: Efficient, Secure and Sustainable Technology of the 2022 to 2025 roadmap: Transforming for a digital future.</span></p> <p><span style="font-weight: 400">This blog outlines three pieces of guidance available that are key to enhancing </span><b>secure configuration, external collaboration and information protection </b><span style="font-weight: 400">within the Microsoft 365 environment.</span></p> <h3><strong>1. Secure Configuration Alignment for Enhanced Security</strong></h3> <p><span style="font-weight: 400">The </span><a href="https://www.gov.uk/guidance/microsoft-365-guidance-for-uk-government#microsoft-365-configuration-guidance-for-uk-government-secure-configuration-blueprint"><b>Microsoft 365 Guidance for UK Government: Secure Configuration Alignment</b></a><span style="font-weight: 400"> guides government departments on how to securely configure their Microsoft 365 Platform in alignment with the latest NCSC advice in the journey towards fortified cybersecurity. </span><span style="font-weight: 400"><br /> </span><span style="font-weight: 400"><br /> </span><span style="font-weight: 400">By adhering to these guidelines, digital, data and technology professionals can understand how the features and capabilities in Microsoft 365 can be used to ensure that a common bar has been achieved for their tenant and promote a secure digital ecosystem. </span></p> <h3><strong>2. Fostering cross-government collaboration</strong></h3> <p><span style="font-weight: 400">It is no surprise that collaboration lies at the heart of modern government operations. The </span><a href="https://www.gov.uk/guidance/microsoft-365-guidance-for-uk-government#microsoft-365-configuration-guidance-for-uk-government-external-collaboration"><b>Microsoft 365 Guidance for UK Government: External Collaboration</b></a><span style="font-weight: 400"> is a huge step forwards for colleagues that rely on effective collaboration and rapid communication with teams across HM government. </span></p> <p><span style="font-weight: 400">This guidance provides a baseline configuration for the Microsoft 365 platform enabling key features such as real-time file sharing and co-authoring across government departments, efficient meeting scheduling through free-busy calendar sharing, consistent instant messaging (IM), video conferencing and the creation of cross-governmental Microsoft Teams sites. </span></p> <p><span style="font-weight: 400">This blueprint not only streamlines communication, but also paves the way for more efficient and impactful cross-department collaboration. </span></p> <h3><strong>3. Safeguarding information with precision</strong></h3> <p><span style="font-weight: 400">In an era of data-driven governance, safeguarding sensitive information is non-negotiable. </span></p> <p><span style="font-weight: 400">The </span><a href="https://www.gov.uk/guidance/microsoft-365-guidance-for-uk-government#microsoft-365-configuration-guidance-for-uk-government-information-protection"><b>Microsoft 365 Guidance for UK Government: Information Protection</b></a><span style="font-weight: 400"> sets forth a standard configuration for sensitivity labels and data loss prevention. This guidance caters to organisations aiming to implement the OFFICIAL tier of the updated </span><a href="https://www.gov.uk/government/publications/government-security-classifications/government-security-classifications-policy-html"><span style="font-weight: 400">Government Security Classification Policy</span></a><span style="font-weight: 400"> (GSCP) using Microsoft Purview, a part of the Microsoft 365 suite. </span></p> <p><span style="font-weight: 400">By adhering to this guidance, government departments can confidently navigate the intricacies of data protection while harnessing the full potential of their information assets.</span></p> <div class="highlight"> <h3><strong>Taking your next steps</strong></h3> <p><span style="font-weight: 400">For digital, data and technology colleagues navigating the implementation of our Microsoft 365 guidance within the UK Government, assistance and insights are just an email away. Connect with the dedicated OneIT team at </span><a href="mailto:oneit@digital.cabinet-office.gov.uk"><span style="font-weight: 400">oneit@digital.cabinet-office.gov.uk</span></a><span style="font-weight: 400"> for tailored support and clarifications.</span></p> <p><span style="font-weight: 400">For those curious about the integration of these guidelines within your department, your IT Department is perfectly placed to provide further details. Reach out to them to learn about the plans and strategies for adopting the Microsoft 365 guidance, tailored to the UK government. </span></p> <p><span style="font-weight: 400">Stay informed and engaged as your department takes strides towards secure and efficient collaboration.</span></p> </div> ]]></content> </entry> <entry> <author> <name>Ollie N, Head of Vulnerability Management, National Cyber Security Centre</name> </author> <title type="html"><![CDATA[Advocating security.txt across UK government]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2023/08/10/advocating-security-txt-across-uk-government/" /> <id>https://technology.blog.gov.uk/?p=5033</id> <updated>2023-08-10T11:44:53Z</updated> <published>2023-08-10T11:44:53Z</published> <category scheme="https://technology.blog.gov.uk" term="Data" /><category scheme="https://technology.blog.gov.uk" term="Open Standards" /><category scheme="https://technology.blog.gov.uk" term="Security" /> <summary type="html"><![CDATA[Publishing a security.txt file to help finders report vulnerabilities has now been championed for use across government following endorsement by the Open Standards Board and the Data Standards Authority’s Steering Board.]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2023/08/10/advocating-security-txt-across-uk-government/"><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone wp-image-5035 size-large" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-1024x617.jpg" alt="" width="620" height="374" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-1024x617.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-300x181.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-768x462.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-1536x925.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/08/shutterstock_1931787956-2048x1233.jpg 2048w" sizes="auto, (max-width: 620px) 100vw, 620px" /></p> <p><span style="font-weight: 400">Technology has revolutionised every aspect of our society and our economy, including the way that we deliver our public services, helping to make people’s lives easier and safer. Security vulnerabilities are discovered all the time online and people want to be able to report them directly to the organisation responsible. That’s why we are advocating for the use of security.txt as a standardised way of doing just that. One of the most important elements of vulnerability disclosure, and a challenge for the finder, is understanding who to contact. </span></p> <p><span style="font-weight: 400">Security.txt describes a text file that advertises the organisation’s vulnerability disclosure process so that someone can quickly find all of the information needed to report a vulnerability. It is a voluntary standard for internet users set by the </span><a href="https://www.ietf.org/about/introduction/"><span style="font-weight: 400">Internet Engineering Task Force</span></a><span style="font-weight: 400"> (RFC 9116).</span></p> <p><span style="font-weight: 400">Security.txt will serve the government in its aim to become more resilient in its online security by making it easier for anyone to report vulnerabilities they have found. Quick, easy and secure reporting directly to the affected department speeds up the triage and remediation time and reduces the risk of compromise, such as reporting of a vulnerable web server so it can be remediated before being exploited. The security.txt was </span><a href="https://alphagov.github.io/data-standards-authority/standards/"><span style="font-weight: 400">endorsed</span></a><span style="font-weight: 400"> by the Data Standards Authority in March 2023.</span></p> <p><b>Benefits to government departments & finders</b></p> <p><span style="font-weight: 400">The ability to receive, respond and ultimately fix a reported vulnerability is essential to providing secure products and services. Being open to receiving vulnerability reports helps departments engage constructively with those who find them - ‘finders’. Engaging with finders can be a source of valuable information that would otherwise be missed or require additional time and effort to discover.</span></p> <p><b>Vulnerability disclosure policy</b></p> <p><span style="font-weight: 400">Departments should define what they expect from someone reporting a vulnerability, as well as what they will do in response, by providing a clear policy. This enables the department and the finder to confidently work within an agreed framework.</span></p> <p><span style="font-weight: 400">In its basic form, a vulnerability disclosure policy should contain the following information:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">how you want to be contacted</span></li> <li style="font-weight: 400"><span style="font-weight: 400">secure communication options (for example, a secure web form)</span></li> <li style="font-weight: 400"><span style="font-weight: 400">what information to include in the report</span></li> <li style="font-weight: 400"><span style="font-weight: 400">what the finder should expect to happen</span></li> <li style="font-weight: 400"><span style="font-weight: 400">guidance on what is in and out of scope for the finder to do in finding vulnerabilities</span></li> </ul> <p><b>How to implement security.txt</b></p> <p><span style="font-weight: 400">Security.txt is a plaintext file that should be published in the “/.well-known” directory of the domain root.</span></p> <p><span style="font-weight: 400">The file contains three key fields:</span><span style="font-weight: 400"> </span></p> <p><span style="font-weight: 400">CONTACT: How finders should report vulnerabilities. For example, email or secure web form.</span></p> <p><span style="font-weight: 400">POLICY: A link to the department’s vulnerability disclosure policy.</span></p> <p><span style="font-weight: 400">EXPIRES: Indicates the date and time after which the data contained in the "security.txt" file is considered stale and should not be used. The value of this field is formatted according to the Internet profile of [ISO.8601] as defined in [RFC3339]. It is recommended that the value of this field be less than a year into the future to avoid staleness.</span></p> <p><span style="font-weight: 400">The ENCRYPTION field is optional and should link to the PGP public key you wish to be used for encrypted communication.</span></p> <div class="highlight"> <p><span style="font-weight: 400">The National Cyber Security Centre (NCSC) has published <a href="https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit">the NCSC Vulnerability Disclosure Toolkit</a> that provides information on how to implement security.txt as well as an example vulnerability disclosure policy.</span></p> </div> ]]></content> </entry> <entry> <author> <name>Nick Woodcraft, Domains Product Owner, CDDO</name> </author> <title type="html"><![CDATA[We’ve removed 98% of gsi-family domains from the public sector]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2023/05/10/weve-removed-98-gsi-family-domains-from-the-public-sector/" /> <id>https://technology.blog.gov.uk/?p=5025</id> <updated>2023-05-10T15:38:26Z</updated> <published>2023-05-10T14:42:24Z</published> <category scheme="https://technology.blog.gov.uk" term="News" /> <summary type="html"><![CDATA[An important update on work to remove gsi-family domains from the public sector including what to do if you believe you still have an active domain. ]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2023/05/10/weve-removed-98-gsi-family-domains-from-the-public-sector/"><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5026" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/05/gsi-family-blog.png" alt="Photo of plug socket with post it saying 'Please switch off after use'" width="512" height="366" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/05/gsi-family-blog.png 512w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/05/gsi-family-blog-300x214.png 300w" sizes="auto, (max-width: 512px) 100vw, 512px" /></p> <p><span style="font-weight: 400">We posted previously about </span><a href="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/"><span style="font-weight: 400">our work removing gsi-family domains from the public sector</span></a><span style="font-weight: 400"> and why we are doing it.</span></p> <p><span style="font-weight: 400">This work is now complete and over 3,500 domains have been removed including:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">all gse.gov.uk domains</span></li> <li style="font-weight: 400"><span style="font-weight: 400">all gcsx.gov.uk domains</span></li> <li style="font-weight: 400"><span style="font-weight: 400">all gsx.gov.uk domains</span></li> <li style="font-weight: 400"><span style="font-weight: 400">2533 gsi.gov.uk domains - 83 remain (further details below)</span></li> </ul> <p><span style="font-weight: 400">We will continue to monitor the remaining domains for issues, but this work has removed the bulk of the risk of email spoofing and domain hijacking from misconfiguration for these domains. We expect that further work may be required in the future to completely remove gsi.gov.uk and to look at the domains that remain within the PSN (Public Services Network).</span></p> <h2><b>Changes made</b></h2> <p><span style="font-weight: 400">Since our previous blog, we’ve made the following changes:</span></p> <ol> <li style="font-weight: 400"><span style="font-weight: 400">At the end of January 2023 we updated the Domain-based Message Authentication, Reporting and Conformance (</span><a href="https://www.gov.uk/government/publications/email-security-standards/domain-based-message-authentication-reporting-and-conformance-dmarc"><span style="font-weight: 400">DMARC</span></a><span style="font-weight: 400">) records to block email from any domain without its own DMARC record.</span> </li> <li style="font-weight: 400"><span style="font-weight: 400">At the beginning of March 2023 we suspended domains in the internet-facing zones for 72 hours to help identify any remaining services.</span> </li> <li style="font-weight: 400"><span style="font-weight: 400">At the beginning of April 2023 we permanently removed the internet-facing zones for gse.gov.uk, gcsx.gov.uk and gsx.gov.uk and the domains they contained. Most .gsi.gov.uk domains were also removed but a small number remain.</span></li> </ol> <p><span style="font-weight: 400">Please note that no PSN-facing zones were changed during this work.</span></p> <h2><b>What to do if you still have gsi-family domains</b></h2> <p><span style="font-weight: 400">There are 83 .gsi.gov.uk domains remaining. If you still have one of these domains you should take steps now to remove it. If it still works for email, we recommend you change settings to start rejecting inbound email. You can also choose to include a bounce-back message giving senders the correct address.</span></p> <p><span style="font-weight: 400">You should also check public facing websites or documentation for mentions of gsi-family domains and remove them.</span></p> <div class="highlight"> <p><span style="font-weight: 400">If you have any questions around this work or need advice on removing a domain get in touch with us at </span><a href="mailto:support@domains.gov.uk"><span style="font-weight: 400">support@domains.gov.uk</span></a><span style="font-weight: 400">.</span></p> <p><span style="font-weight: 400">If you have a domain that has been suspended or removed as part of this work and you need it restored contact Nominet directly on </span><a href="mailto:psnsupport@nominet.uk"><span style="font-weight: 400">psnsupport@nominet.uk</span></a><span style="font-weight: 400"> or 01865 332493.</span></p> </div> ]]></content> </entry> <entry> <author> <name>Nick Woodcraft, Domains Product Owner, CDDO</name> </author> <title type="html"><![CDATA[Removing gsi-family domains from the public sector]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/" /> <id>https://technology.blog.gov.uk/?p=5003</id> <updated>2023-03-29T08:41:53Z</updated> <published>2023-01-20T14:07:55Z</published> <category scheme="https://technology.blog.gov.uk" term="News" /> <summary type="html"><![CDATA[Public sector organisations are no longer using gsi-family domains and therefore they are scheduled for removal by the beginning of April. Read this post to find out more. ]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/"><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-5005" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-1024x731.jpg" alt="Image of plug socket with post it saying 'please switch off after use'" width="620" height="443" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-1024x731.jpg 1024w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-300x214.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-768x548.jpg 768w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-1536x1096.jpg 1536w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2023/01/PXL_20230109_165213963-2048x1461.jpg 2048w" sizes="auto, (max-width: 620px) 100vw, 620px" /></p> <p>Last updated: 29 March 2023</p> <div class="highlight"> <p><span style="font-weight: 400">Most gsi-family domain names (gsi.gov.uk, gse.gov.uk, gcsx.gov.uk or gsx.gov.uk) are scheduled for removal from their internet-facing zones by the beginning of April.</span></p> </div> <p><span style="font-weight: 400">A core pillar of the </span><a href="https://www.gov.uk/government/publications/roadmap-for-digital-and-data-2022-to-2025/transforming-for-a-digital-future-2022-to-2025-roadmap-for-digital-and-data"><span style="font-weight: 400">Transforming for a Digital Future strategy</span></a><span style="font-weight: 400"> is delivering efficient, secure and sustainable technology, and, at CDDO’s </span><span style="font-weight: 400">Securing Government Services</span><span style="font-weight: 400"> team <a href="https://cddo.blog.gov.uk/2022/11/15/is-it-time-to-retire-the-gb-top-level-domain/">we're working hard to clean up and remove legacy services</a>. </span></p> <p><span style="font-weight: 400">Some public sector organisations have previously used .gsi.gov.uk, x.gsi.gov.uk, .gsx.gov.uk, .gse.gov.uk and .gcsx.gov.uk to email each other in a secure way. However, the </span><a href="https://www.gov.uk/guidance/securing-government-email"><span style="font-weight: 400">current email standards and guidance</span></a><span style="font-weight: 400"> mean they can now get better security sending the same email over the internet rather than using the Public Services Network (PSN).</span></p> <p><span style="font-weight: 400">The PSN, where these gsi-family domains were used, is in the </span><a href="https://www.gov.uk/guidance/future-networks-for-government-fn4g"><span style="font-weight: 400">process of being wound down</span></a><span style="font-weight: 400">, and </span><a href="https://www.gov.uk/government/publications/changing-government-email-migrating-from-gsi/changing-government-email-migrating-from-gsi"><span style="font-weight: 400">we officially stopped using these domains in 2019</span></a><span style="font-weight: 400">. The PSN email relay they depended on meanwhile was shut down in 2021.</span></p> <h2><b>The end of gsi-family domains</b></h2> <p><span style="font-weight: 400">People are reluctant to remove old domain names, often because they are concerned there might be a forgotten service that depends on the domain. This means these old domains can get neglected and become vulnerable to spoofing and malicious attacks.</span></p> <p><span style="font-weight: 400">Many gsi-family domains still exist in both internet and PSN-facing zones. Most are dormant, some are misconfigured, and all are targeted heavily for email spoofing. As a result <b>we plan to remove most of the internet-facing zones entirely at the beginning of April</b></span><span style="font-weight: 400">.</span></p> <p><span style="font-weight: 400">As a starting point we’ve added more protection to reduce the impact, in the form of </span><a href="https://www.gov.uk/government/publications/email-security-standards/domain-based-message-authentication-reporting-and-conformance-dmarc"><span style="font-weight: 400">DMARC</span></a><span style="font-weight: 400"> records to protect the apex domains and prevent the spoofing of domains that don’t exist. DMARC records tell the receiving email service what the legitimate senders are for that domain. If an email comes from somewhere else it gets marked as spam.</span></p> <h2><b>Timeline for changes</b></h2> <ol> <li style="font-weight: 400"><span style="font-weight: 400">At the end of January 2023 we updated the DMARC records to block email from any domain without its own DMARC record.</span></li> <li style="font-weight: 400"><span style="font-weight: 400">At the beginning of March we suspended domains in the internet-facing zones for 72 hours to help identify any remaining services.<br /> Start of suspension: 10am Monday 6th March 2023<br /> End of suspension: 10am Thursday 9th March 2023</span></li> <li style="font-weight: 400"><span style="font-weight: 400">On the 3rd April at 10am we’ll permanently remove the internet-facing zones and the domains they contain.</span></li> </ol> <div class="highlight"> <p><span style="font-weight: 400">This blog previously stated we would suspend and remove PSN-facing zones in addition to the internet-facing zones. This is no longer the case, although we will review the option to do this in the future.</span></p> </div> <p><span style="font-weight: 400">Most of the domains appear to be dead already, pointing to services that do not exist or reject queries. It is possible there are still some dependencies we don’t know about. Email may be being routed through to modern systems to provide continuity for old addresses.</span></p> <h2><b>What to do if you think you have gsi-family domains</b></h2> <p><span style="font-weight: 400">If you still have one of these domains and it still works for email, start rejecting inbound email. You can also choose to include a bounce-back message giving senders the correct address. It will be removed at the beginning of April so it would be good to give anyone still using it some notice.</span></p> <p><span style="font-weight: 400">You should also check public facing websites or documentation for mentions of gsi-family domains and remove them.</span></p> <p><span style="font-weight: 400">We have identified a small number of domains that are operating internet facing services that can't yet migrate to a new domain. We have excluded these domains from the suspension and removal process.</span></p> <p><span style="font-weight: 400">If you have a domain you think you will need beyond the beginning of April, get in touch with us now at </span><a href="mailto:support@domains.gov.uk"><span style="font-weight: 400">support@domains.gov.uk</span></a><span style="font-weight: 400"> so we can work out a solution.</span></p> <p><span style="font-weight: 400">If you have a domain that has been suspended or removed as part of this work and you need it restored contact Nominet directly on </span><a href="mailto:psnsupport@nominet.uk"><span style="font-weight: 400">psnsupport@nominet.uk</span></a><span style="font-weight: 400"> or 01865 332493.</span></p> ]]></content> <link rel="replies" type="text/html" href="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/#comments" thr:count="4" /> <link rel="replies" type="application/atom+xml" href="https://technology.blog.gov.uk/2023/01/20/removing-gsi-family-domains-from-the-public-sector/feed/" thr:count="4" /> <thr:total>4</thr:total> </entry> <entry> <author> <name>Agatha Blake, Programme Delivery Manager, CDDO, Cabinet Office</name> </author> <title type="html"><![CDATA[Help shape the future of FN4G]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2022/11/07/help-shape-the-future-of-fn4g/" /> <id>https://technology.blog.gov.uk/?p=4978</id> <updated>2022-11-07T11:54:31Z</updated> <published>2022-11-07T16:00:37Z</published> <category scheme="https://technology.blog.gov.uk" term="Event" /><category scheme="https://technology.blog.gov.uk" term="News" /><category scheme="https://technology.blog.gov.uk" term="Security" /><category scheme="https://technology.blog.gov.uk" term="Tools" /><category scheme="https://technology.blog.gov.uk" term="domains" /><category scheme="https://technology.blog.gov.uk" term="security" /><category scheme="https://technology.blog.gov.uk" term="user needs" /> <summary type="html"><![CDATA[The Future Network for Government programme is launching pre-market engagement and industry consultation to help determine future ways of working - here the FN4G team explain the plans and announces a launch event.]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2022/11/07/help-shape-the-future-of-fn4g/"><![CDATA[<p><div id="attachment_4991" style="width: 623px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-4991" class="wp-image-4991 size-full" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2022/10/network_cables.jpg" alt="Purple cables with yellow and green markings plugged into networking equipment" width="613" height="420" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2022/10/network_cables.jpg 613w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2022/10/network_cables-300x206.jpg 300w" sizes="auto, (max-width: 613px) 100vw, 613px" /><p id="caption-attachment-4991" class="wp-caption-text">Photo credit: Possessed Photography on Unsplash</p></div></p> <p><span style="font-weight: 400">The Future Networks for Government (FN4G) team, part of the Cabinet Office’s Central Digital and Data Office (CDDO), is helping </span><a href="https://technology.blog.gov.uk/2019/09/09/the-vision-for-the-future-networks-for-government-fn4g-programme/"><span style="font-weight: 400">organisations to migrate away from the Public Services Network</span></a><span style="font-weight: 400"> (PSN) as it’s increasingly hard to secure. The team is encouraging organisations to migrate to modern network solutions, which offer more competitive commercial terms as well as greater flexibility and scalability.</span></p> <h2><strong>Consulting with industry and our users </strong></h2> <p><span style="font-weight: 400">To help us get a better picture of what our users and suppliers need, we’re running a pre-market engagement and industry consultation. We’re partnering with </span><a href="https://www.innopsis.uk/"><span style="font-weight: 400">Innopsis</span></a><span style="font-weight: 400">, which will run the pre-market engagement and coordinate the consultation with industry.</span></p> <p><span style="font-weight: 400">We’ll discuss, test, and iterate technical models, service models, and different ways of working. We hope the outcome will mean PSN users can improve their network security posture and implement a more modern network and telecommunications services environment.</span></p> <p><span style="font-weight: 400">More specifically, we want the pre-market engagement process to:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">define architectural market models for FN4G that are able to realise the goals and requirements of the FN4G programme for the customers and the suppliers</span></li> <li style="font-weight: 400"><span style="font-weight: 400">be collaborative, open, and iterative</span></li> <li style="font-weight: 400"><span style="font-weight: 400">minimise upfront investment costs for both buyers and suppliers </span></li> <li style="font-weight: 400"><span style="font-weight: 400">take a default position to align with existing policies, principles, and processes - wherever a recommendation exists the work groups will conduct a cost-benefit analysis to show that any impact is justified</span></li> </ul> <p><span style="font-weight: 400">We’ll be looking into setting up work groups jointly chaired by the Cabinet Office and Innopsis. Initially focusing on 4 areas - technical, transition and commercial, security, and service management - the work groups will make sure the pre-market engagement meets its deadlines.</span></p> <p><span style="font-weight: 400">The work groups will also be responsible for:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">concluding a manageable and meaningful set of proposals </span></li> <li style="font-weight: 400"><span style="font-weight: 400">providing a clear rationale for decisions made, suggested changes adopted and suggested changes not adopted</span></li> <li style="font-weight: 400"><span style="font-weight: 400">providing a clear view for each proposal of what will be defined as a success</span></li> </ul> <p><span style="font-weight: 400">We’ll also be setting up a steering committee to coordinate activities across the work groups, and take overall responsibility for taking these proposals forward to the Cabinet Office for final approval. </span></p> <h2><strong>Sign up to our pre-market engagement event</strong></h2> <p><span style="font-weight: 400">We’ll be hosting a pre-market engagement launch event where you can learn more about FN4G, what it will mean for future public sector networking and telecommunications procurements, and how you can shape it.</span></p> <div class="highlight"><span style="font-weight: 400">The online event will be held at 11.00am on 15 November. You can register for the event <a href="https://www.innopsis.uk/engagements/fn4g">here</a>.</span></div> ]]></content> <link rel="replies" type="text/html" href="https://technology.blog.gov.uk/2022/11/07/help-shape-the-future-of-fn4g/#comments" thr:count="1" /> <link rel="replies" type="application/atom+xml" href="https://technology.blog.gov.uk/2022/11/07/help-shape-the-future-of-fn4g/feed/" thr:count="1" /> <thr:total>1</thr:total> </entry> <entry> <author> <name>Terence Eden</name> </author> <title type="html"><![CDATA[Solving an interesting problem with Sender Policy Framework records]]></title> <link rel="alternate" type="text/html" href="https://technology.blog.gov.uk/2022/07/11/solving-an-interesting-problem-with-sender-policy-framework-records/" /> <id>https://technology.blog.gov.uk/?p=4970</id> <updated>2022-07-11T15:33:08Z</updated> <published>2022-07-11T12:52:36Z</published> <category scheme="https://technology.blog.gov.uk" term="Security" /><category scheme="https://technology.blog.gov.uk" term="domains" /><category scheme="https://technology.blog.gov.uk" term="email" /><category scheme="https://technology.blog.gov.uk" term="security" /> <summary type="html"><![CDATA[The Securing Government Services team found and fixed a curious problem regarding email security]]></summary> <content type="html" xml:base="https://technology.blog.gov.uk/2022/07/11/solving-an-interesting-problem-with-sender-policy-framework-records/"><![CDATA[<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4043 size-full" src="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2019/06/47994682357_cf5fe5e569_z.jpg" alt="Code on a laptop" width="640" height="427" srcset="https://technology.blog.gov.uk/wp-content/uploads/sites/31/2019/06/47994682357_cf5fe5e569_z.jpg 640w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2019/06/47994682357_cf5fe5e569_z-300x200.jpg 300w, https://technology.blog.gov.uk/wp-content/uploads/sites/31/2019/06/47994682357_cf5fe5e569_z-435x290.jpg 435w" sizes="auto, (max-width: 640px) 100vw, 640px" /></p> <p><span style="font-weight: 400">The Securing Government Services team at the Central Digital and Data Office recently encountered, and fixed, a small bug with the way some government domains handle their </span><a href="https://www.gov.uk/government/publications/email-security-standards/sender-policy-framework-spf"><span style="font-weight: 400">Sender Policy Framework (SPF) records</span></a><span style="font-weight: 400">.</span></p> <p><span style="font-weight: 400">SPF allows a domain owner to specify which email services are authorised to send email on their behalf. For example, the website </span><span style="font-weight: 400">example.gov.uk</span><span style="font-weight: 400"> might use Outlook for email - so they can create a TXT record in their DNS which says:</span></p> <p><code><span style="font-weight: 400">"v=spf1 include:spf.protection.outlook.com -all"</span></code></p> <p><span style="font-weight: 400">This tells the internet that if someone tries to send an email purporting to come from </span><span style="font-weight: 400">example.gov.uk</span><span style="font-weight: 400">, it will only be valid if it has been sent from the Outlook server. If it comes from a different server, it must be rejected. </span></p> <p><span style="font-weight: 400">This prevents people from sending spoofed emails which impersonate legitimate government services.</span></p> <p><span style="font-weight: 400">SPF records need to be written in a precise format. If the syntax is even slightly different from the specification, the record is invalid and spoofed emails will be able to be delivered.</span></p> <h2><strong>Discovering the problem</strong></h2> <p><span style="font-weight: 400">Our team recently noticed a record which was syntactically correct - but was, somehow, still being marked as invalid. This was a serious risk and could have let a malicious actor send emails as though they were from a specific government service.</span></p> <p><span style="font-weight: 400">The SPF record looked like this:</span></p> <p><code><span style="font-weight: 400">"v=spf1 include:example.com include:spfprotectionoutlook.com -all"</span></code></p> <p><span style="font-weight: 400">The SPF checker works on multiple levels. The first is a simple conformance check - that is, seeing if the record is written in the correct syntax. This record was correct.</span></p> <p><span style="font-weight: 400">The second level is to evaluate the included domains. This involves doing a DNS lookup on the domain. And this is where the problem was.</span></p> <p><span style="font-weight: 400">The second domain was misspelt. When a lookup was performed on that domain, it returned an error - NXDOMAIN.</span></p> <p><span style="font-weight: 400">Because this recursive check failed, it resulted in what the specification calls a "permerror" - which means </span><a href="https://datatracker.ietf.org/doc/html/rfc7208#section-8.7"><span style="font-weight: 400">the domain's published records could not be correctly interpreted</span></a><span style="font-weight: 400">.</span></p> <p><span style="font-weight: 400">Even though the record has the correct syntax, and even though other included domains validated correctly, because a single domain didn't exist the </span><i><span style="font-weight: 400">entire</span></i><span style="font-weight: 400"> SPF record failed validation. </span></p> <p><a href="https://datatracker.ietf.org/doc/html/rfc7208"><span style="font-weight: 400">The specification is complicated</span></a><span style="font-weight: 400"> and we had initially expected that a partially matching set of includes would still validate and the SPF would be valid. A thorough reading of the specification shows that is not the case.</span></p> <h2>Fixing the issue and lessons learned</h2> <p><span style="font-weight: 400">The issue was fixed by correcting the spelling of the incorrect domain. We do not believe this error was actively exploited by malicious parties.</span></p> <p><span style="font-weight: 400">We learned several lessons from this incident:</span></p> <ul> <li style="font-weight: 400"><span style="font-weight: 400">Domain names in SPF records need to be regularly audited. Domain names can be misspelt or expire - so they will need to be updated.</span></li> <li style="font-weight: 400"><span style="font-weight: 400">The failure mode of SPF can be unexpected. It’s only one tool which can be used to reduce spoofed emails.</span></li> <li style="font-weight: 400"><span style="font-weight: 400">Different mail servers can interpret an SPF permerror differently. Just because one mail system rejects the SPF record, that does not mean all of them will.</span></li> </ul> <p><span style="font-weight: 400">For more information, you can read our guidance on </span><a href="https://www.gov.uk/guidance/set-up-government-email-services-securely"><span style="font-weight: 400">how to set up government email services securely</span></a><span style="font-weight: 400">.</span></p> <div class="highlight"><span style="font-weight: 400">Interested in our work? </span><a href="https://gdscareers.gov.uk/"><span style="font-weight: 400">CDDO is hiring</span></a><span style="font-weight: 400">.</span></div> ]]></content> <link rel="replies" type="text/html" href="https://technology.blog.gov.uk/2022/07/11/solving-an-interesting-problem-with-sender-policy-framework-records/#comments" thr:count="2" /> <link rel="replies" type="application/atom+xml" href="https://technology.blog.gov.uk/2022/07/11/solving-an-interesting-problem-with-sender-policy-framework-records/feed/" thr:count="2" /> <thr:total>2</thr:total> </entry> </feed>