UK CAF v4.0

UK Cyber Assessment Framework: What’s New in CAF v4.0

The UK cyber assessment framework helps organizations measure their resilience against defined outcomes, ensuring that risks are not only identified but effectively managed. CAF v4.0 builds on this approach with clearer guidance, higher expectations, and stronger emphasis on areas such as software assurance, supply chain oversight, and continuous monitoring.

Why CAF v4.0 Matters Now

The UK’s critical national infrastructure (CNI) is under constant pressure from ransomware groups, hostile nation-states, and cybercriminals seeking disruption or financial gain. To strengthen resilience across essential services, the National Cyber Security Centre (NCSC) has released version 4.0 of the UK Cyber Assessment Framework (CAF). (Cyber Assessment Framework v4.0 Released in Response to Growing Threat, n.d.)

Far from being a checklist exercise, the framework acts as a roadmap to improve accountability, protect critical services, and give boards and regulators confidence in cyber risk management. This article explores what has changed in CAF v4.0, who will be most affected, and the steps organizations can take to align quickly and effectively.

CAF in a Nutshell — What is the UK Cyber Assessment Framework

The UK Cyber Assessment Framework (CAF) is the NCSC’s structured method for assessing and improving cyber resilience across critical services. Introduced in 2018, it is designed to help organizations demonstrate how well they can withstand and recover from cyber threats, particularly those affecting essential infrastructure.

At its core, the CAF is outcomes-based. Instead of prescribing specific technical controls, it focuses on whether an organization can achieve the security outcomes required to deliver essential functions safely and reliably. This flexibility makes it applicable across multiple sectors, from energy and transport to healthcare and finance.

CAF’s Core Outcomes & Structure

The framework is built on four high-level objectives, broken down into 14 principles, each supported by detailed Indicators of Good Practice (IGPs).

Objective A: Managing Security Risk
Covers governance, risk management, asset management, and supply chain assurance.

Objective B: Protecting Against Cyber Attack
Focuses on secure system design, vulnerability management, and data protection

Objective C: Detecting Cyber Security Events
Addresses monitoring, detection, and incident response readiness.

Objective D: Minimizing the Impact of Cyber Security Incidents
Ensures resilience through recovery planning, continuity, and lessons learned.

These objectives give organizations a comprehensive view of cyber maturity, from governance at the board level to technical detection capabilities within SOC teams.

What’s New in CAF v4.0

Since its introduction, the UK cyber assessment framework has been regularly refined, but CAF v4.0 marks its most substantial update. Released in August 2025, this version responds directly to the rising complexity of cyber threats and the evolving expectations of regulators.

The update introduces clearer guidance, refined thresholds, and stronger requirements in key areas such as software security, supply chain oversight, and proactive threat detection. Organizations will find a sharper focus on evidence, moving away from broad statements of compliance and toward verifiable proof of resilience.

Key Enhancements in CAF v4.0

  1. Structured Threat Understanding – Organizations must show how they analyze and model attacker methods, rather than relying on general intelligence.
  2. Software Development & Assurance – Secure design, code review, and use of software bills of materials (SBOMs) are emphasized.
  3. Monitoring & Threat Hunting – Proactive detection and hunt capabilities are now expected alongside traditional logging and alerts.
  4. Supply Chain Assurance – Vendors must provide evidence of meeting outcomes, not just self-attestations.
  5. Emerging Technology Risks – CAF now integrates considerations for AI and other disruptive technologies.

Comparison: CAF v3.x vs CAF v4.0

AreaCAF v3.x BaselineCAF v4.0 EnhancementImpact on Organizations
Threat UnderstandingGeneral use of threat intelligenceStructured threat modeling and analysisBetter prioritization of risks
Software AssuranceRecommended secure practicesSecure SDLC, SBOM adoption, patch managementReduced exposure to known vulnerabilities
Detection & ResponseMonitoring and incident response plansProactive detection engineering and threat huntingFaster identification and recovery
Supply Chain AssuranceVendor due diligenceContinuous monitoring, evidence-based assuranceStronger third-party risk management
Governance & RiskPeriodic risk reviewsOutcomes-driven, evidence-backed governance reportingMore informed board-level oversight

CAF v4.0 does not abandon the outcomes-based approach. Instead, it reinforces the expectation that organizations can prove they are achieving these outcomes consistently and effectively.

Who Is Impacted — Sectors & Stakeholders

The release of CAF v4.0 affects a broad spectrum of organizations across the UK. While its primary audience is operators of essential services (OES) designated under the NIS Regulations, its reach extends beyond core critical infrastructure.

Sectors directly impacted include:

  • Energy and Utilities – electricity, oil, gas, and water services
  • Transport – aviation, maritime, and rail operators
  • Healthcare – hospitals, NHS trusts, and digital health platforms
  • Telecommunications – network operators and service providers
  • Public Sector – central government, local authorities, and defense-related services

These entities are expected to demonstrate resilience not only internally but also throughout their supply chains.

Stakeholders Who Must Take Action

CAF v4.0 places responsibility across multiple roles:

  • CISOs and Risk Leaders – accountable for aligning programs with CAF outcomes.
  • OT Security Managers – ensuring resilience in operational technology environments.
  • Procurement and Vendor Risk Teams – collecting and validating supplier evidence.
  • Board Members – responsible for understanding and overseeing cyber resilience.
  • Security Operations Teams (SOCs) – adapting monitoring and threat hunting to meet new standards.

Why Supply Chain Programs Must Evolve

Under CAF v4.0, third-party assurance moves from self-attestation to evidence-backed oversight. Vendors and service providers must now demonstrate compliance with CAF outcomes, often requiring:

  • Tiering suppliers by criticality
  • Defining baseline security outcomes per tier
  • Requesting verifiable proof (e.g., SBOMs, test results, scan reports)
  • Continuously monitoring suppliers for emerging risks

For many organizations, this represents a significant shift in vendor management: moving from reactive checks to proactive, ongoing assurance.


Governance & Risk — Elevating Assurance with CAF v4.0

Governance and risk management sit at the heart of the UK cyber assessment framework. With v4.0, the NCSC places greater emphasis on evidence-backed decision making, requiring boards and executives to demonstrate not only awareness but accountability.

Organizations are now expected to integrate threat intelligence, business impact, and likelihood modeling into their risk assessments. This shift ensures that cyber risk is treated as a business risk, with decisions grounded in measurable outcomes rather than generic heatmaps.

Raising the Bar for Board Accountability

CAF v4.0 calls for leadership to have direct visibility of:

  • Evidence libraries showing policies, test results, and remediation proof
  • Key risk indicators (KRIs), such as mean time to detect/respond (MTTD/MTTR)
  • Supply chain dependencies and vendor risk status
  • Progress against CAF objectives using structured maturity levels

By embedding these practices, boards can demonstrate compliance with regulators and gain confidence that cyber risks are actively managed.


Secure Software & Product Assurance

One of the most notable updates in CAF v4.0 is the expanded emphasis on secure software development and product assurance. The framework now requires organizations to demonstrate that software used to deliver critical services is built, maintained, and procured with security embedded at every stage.

This shift reflects the growing exploitation of software supply chains, where vulnerabilities in dependencies or build pipelines can create systemic risks across entire sectors.

Expectations for the Software Development Lifecycle (SDLC)

CAF v4.0 aligns with modern software assurance practices by requiring:

  • Secure design reviews before development begins
  • Code analysis and peer reviews for critical applications
  • SBOM (Software Bill of Materials) to track dependencies and vulnerabilities
  • Patch management processes with clear timelines for remediation
  • Artifact signing and provenance tracking in CI/CD pipelines

Procurement & Third-Party Software

Organizations are now expected to extend these requirements to vendors and third-party providers. This means:

  • Including software security clauses in procurement contracts
  • Requesting SBOMs from suppliers for critical applications
  • Defining vulnerability remediation service-level agreements (SLAs)
  • Evaluating build integrity as part of due diligence

Monitoring, Detection & Response

CAF v4.0 significantly raises expectations around security monitoring and incident response. Traditional logging and alerting are no longer sufficient, organizations must now show they can actively detect, investigate, and respond to advanced threats in real time.

This update reflects the growing need for proactive defense, where resilience depends not just on identifying incidents but on anticipating and hunting for them.


Supply Chain & Third-Party Risk Management Under CAF v4.0

One of the most impactful changes in CAF v4.0 is the stronger focus on supply chain resilience. Cyber incidents increasingly exploit weaknesses in third-party providers, and the framework now requires organizations to evidence that vendors and contractors can meet the same resilience standards as internal teams.

This means moving beyond static questionnaires and self-attestations. CAF v4.0 expects continuous assurance supported by evidence, tiered vendor management, and proactive monitoring.

What Organizations Must Do

  • Tier Vendors by Criticality – Prioritize oversight for suppliers whose failure could disrupt essential services.
  • Set Baseline Security Outcomes – Define minimum expectations for each tier, aligned to CAF outcomes.
  • Collect Verifiable Evidence – Request SBOMs, penetration test results, vulnerability reports, and remediation timelines.
  • Use Continuous Monitoring – Leverage external attack surface tools and intelligence feeds to spot changes in vendor risk posture.

Suggested Vendor Tiering Model

TierDescriptionRequirements
Tier 1Critical suppliers directly affecting CNIFull CAF-aligned evidence pack, monthly monitoring
Tier 2High-impact suppliers with significant accessQuarterly evidence, validated remediation reports
Tier 3Standard vendors with limited exposureAnnual attestation, exception-based investigations

Why This Matters

By requiring evidence-based assurance, CAF v4.0 reduces the risk of cascading failures from third-party compromises. For organizations, it creates a structured way to demonstrate control over vendor risks; something regulators and boards now expect as part of a mature cyber resilience program.


Mapping CAF v4.0 to Other Standards

Most organizations do not operate under a single framework. CAF v4.0 is designed to be sector-agnostic, but many entities must also comply with regulations such as NIS2, DORA, or ISO/IEC 27001. Mapping CAF outcomes to these frameworks helps streamline compliance and reduces duplication of effort.

Alignment Highlights

  • NIS2 (EU): Both CAF and NIS2 emphasize governance, incident reporting, and supply chain oversight. CAF v4.0’s outcome-based structure can help demonstrate NIS2 compliance in regulated sectors.
  • DORA (Financial Services): DORA focuses on ICT risk management and operational resilience. CAF’s outcomes on monitoring, testing, and third-party assurance align closely with these requirements.
  • ISO/IEC 27001: CAF outcomes can be mapped to ISO controls, allowing organizations already certified to ISO 27001 to use existing evidence for CAF readiness.

Quick Crosswalk Example

CAF Outcome AreaNIS2 AlignmentISO/IEC 27001 ClauseDORA Article
Governance & RiskBoard accountabilityA.5.1 — Information Security PoliciesArt. 5 — Governance Framework
Threat UnderstandingRisk-based approachA.6.1 — Information Security Risk AssessmentArt. 8 — ICT Risk Mgmt
Software AssuranceSupply-chain riskA.14.2 — System Development SecurityArt. 28 — ICT Third-Party Risk
Monitoring & ResponseIncident handling/reportingA.16.1 — Information Security IncidentsArt. 19 — Incident Reporting
Recovery & ContinuityBusiness continuity & testingA.17.1 — Information Security ContinuityArt. 24 — Resilience Testing

By maintaining a crosswalk matrix, organizations can reuse existing evidence across multiple audits, reducing administrative burden and focusing on real improvements to resilience.


FAQs About the UK Cyber Assessment Framework (CAF v4.0)

Is CAF mandatory?

CAF itself is not legally binding, but regulators in many critical sectors adopt it as their assessment framework. For operators of essential services, alignment with CAF outcomes is often expected under the UK’s NIS Regulations and assurance schemes like GovAssure.

How is “evidence” defined?

Evidence must be verifiable artifacts, not just policy statements. Examples include: logs, SBOMs, penetration test results, remediation records, incident playbooks, and recovery test outcomes.

What’s different for suppliers and third parties?

Vendors can no longer rely on self-attestation. CAF v4.0 expects continuous assurance, including SBOMs, vulnerability reports, remediation proof, and monitoring data from critical suppliers.

How do we show progress to regulators?

Organizations should track Key Risk Indicators (KRIs) such as detection times, remediation rates, and vendor compliance status. Progress is demonstrated through outcome dashboards, exercise results, and evidence libraries.

Does CAF v4.0 address AI risks?

Yes. CAF v4.0 integrates AI under the lens of threat modeling and software assurance. Organizations must consider how AI tools, data models, and automated systems may introduce new vulnerabilities or alter attacker methods.

Contact Us

Let’s explore how Sling can work for you.