UK government admits years of cyber policy have failed, announces reset
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲英国政府承认之前的网络安全策略有问题,无法在2030年前达到预期目标。他们发布了一个新的行动计划,包括成立一个中央机构来协调网络安全,改革应急响应机制,并加强与供应商的合同要求。此外,还提到了资金不足和人才吸引的问题。 接下来,我需要把这些要点浓缩到100字以内。确保涵盖承认失败、新计划、措施和问题。注意不要使用“总结”或“这篇文章”这样的开头词。 可能的结构是:英国政府承认网络安全策略失败,发布新计划,包括中央机构、改革响应机制、加强供应商合同,并提到资金和人才挑战。 最后检查字数是否符合要求,并确保内容准确简洁。 </think> 英国政府承认其网络安全策略存在严重缺陷,无法在2030年前实现目标。为应对日益严峻的网络威胁,政府推出新的《政府网络安全行动计划》,包括建立中央协调机构、改革应急响应机制及加强供应商合同要求。该计划旨在解决技术债务和人才短缺问题,但仍面临资金不足等挑战。 2026-1-6 16:1:32 Author: therecord.media(查看原文) 阅读量:2 收藏

In an unusually candid admission on Tuesday, the British government acknowledged that its years-long approach to its own cybersecurity was flawed and warned it will be impossible to meet a previous target of securing all government organizations from known cyber vulnerabilities and attack methods by 2030.

Describing numerous failures in how Whitehall currently defends its own digital systems, the government presented a new Government Cyber Action Plan as a major policy reset to protect public services. It comes ahead of a relaunched national cyber strategy, which will be called a National Cyber Action Plan, to be published later this year.

The document was presented to Parliament by the Department for Science, Innovation and Technology (DSIT) and concedes that the current system of accountability has left much of the British government vulnerable to cyberattacks, with responsibilities for risk “unclear at all levels of government,” including across the supply chain.

“To protect our critical national infrastructure, defend public institutions and maintain public confidence in essential public services, we must achieve a radical shift in approach and a step change in pace,” states the action plan. It warns the public sector is facing a “critically high” cyber risk despite years of work on improving its resilience to attacks and outages.

Those risks are “not hypothetical” stated the government but “recurring realities that result in service breakdown [and] harm to the public,” describing incidents such as the ransomware attack on Synnovis — which contributed to at least one patient’s death — as symptoms of systemic failures to tackle the challenge.

A powerful ‘Government Cyber Unit’

At its core, the government describes the new approach as a move away from the previous focus on providing nonbinding guidance to public sector authorities. Under the new action plan it will instead advance a more centralized and mandatory model for cybersecurity, with a new Government Cyber Unit established by next year that will hover over all government organizations to set policy direction, coordinate implementation activities and provide a single point of accountability.

An overhaul of incident response is also being planned, with more centralized coordination during major cyber events, regular cross-government exercises and better preparation for large-scale disruptions. 

Strategic suppliers to government will face stronger contractual expectations around cyber security, reflecting the government’s assessment that third-party vulnerabilities pose a growing threat to public services.

Following ridicule over a job listing in 2023 that was perceived to be dramatically underpaid, the government also announced a new Government Cyber Profession to attract and retain better talent.

Joe Jarnecki,  a cyber research fellow at RUSI, said the move should be welcomed as something “that will likely increase the attractiveness of government cybersecurity roles,” although he cautioned “government will not be able to match private sector salaries.”

Jarnecki said: “Given that this is an implementation plan for what could or should have been an internal strategy, why is this a public document? I do think transparency should be welcomed, but the question I would ask is who is this for?”

MPs moving on legislation

The plan is announced on the same day that the government’s flagship Cybersecurity and Resilience Bill (CSRB) receives its second reading in Parliament. The second reading is the first opportunity for MPs to debate the basic premise of the legislation, and among the most relevant criticisms of the bill are the suggestion that it would establish a two-tier system between the obligations on private sector companies versus public sector entities operating essential services.

Jamie MacColl, a cyber research fellow at RUSI, said: “I think timing of the Government Cyber Action Plan is partly designed to mitigate some of the criticism about the majority of the public sector not being in scope of the CSRB, unlike how the European Union has included the public sector under NIS2.”

According to the action plan, senior leaders in government will be held responsible for cyber outcomes rather than being allowed to treat security as a purely technical issue — an attempt to answer the criticism about the public sector being held to a lower standard than others.

Under the current draft of the CSRB, there are stronger and more enforceable obligations on private sector entities than there are on public sector ones, including fines and regulatory sanctions. The EU’s comparable legislation, NIS2, does not feature such a separation.

MacColl told Recorded Future News it wasn’t clear how the pledge regarding senior leaders being held to account would be upheld: “Personally, I don’t see the action plan addressing those specific criticisms. In my reading, there are no meaningful enforcement mechanisms if government departments and agencies aren’t meeting the standards the action plan sets out.”

A legacy of failure

Cyberthreats have escalated far more quickly than the government’s own defenses. State-backed actors and organized criminal groups are described as increasingly sophisticated, while government capability has struggled to keep pace to keep them out.

Last year, the head of Britain's cyber and signals intelligence agency GCHQ, Anne Keast-Butler, warned that the country was grappling with the most “contested and complex” threat environment in decades, noting there were four times as many attacks last year than in the year previously.

The underlying problem for British government departments and agencies in trying to defend themselves is their reliance on legacy technology, stated the action plan, acknowledging a report by the National Audit Office which last year warned of the dire state of government IT infrastructure.

According to the new document, decades of underinvestment have left departments running outdated systems that are difficult or impossible to secure to modern standards. This “technical debt” has accumulated faster than it has been addressed, increasing vulnerability year after year.

The plan is not a program of mass replacement but instead attempting to manage the risk by ensuring the government has visibility and understanding over its own critical digital assets, including by building a clear inventory of aging systems and their vulnerabilities across government departments and agencies.

“The big unsaid part of this is funding,” said MacColl. “Going back to the National Audit Office report from last year, this is an IT problem as much as it’s a cybersecurity problem.

“It’s a fact that there’s not enough funding to replace legacy IT infrastructure, and having a cybersecurity action plan is not going to be the thing that fundamentally addresses that. Unless there’s more funding, I think there’s a limit to what the Cabinet Office or DSIT can do to drive up standards across the public sector.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.


文章来源: https://therecord.media/uk-government-cyber-action-plan
如有侵权请联系:admin#unsafe.sh