Securing Information
Strengthening Business

The New G-Cloud Security Approach – A change for the better?

What is changing?

GCloud image

UPDATE June 2015: Since the original publication of this article, the Government’s approach to G-Cloud security has significantly changed. Please refer to this article instead – it explains the new security assertions process introduced with G-Cloud 6. To keep in touch with future developments why not sign-up to receive our regular news .

For G-Cloud services up to and including G-Cloud 5, the security approach has been for suppliers to gain accreditation through the CESG Pan Government Accreditation (PGA) service. It basically involved a PGA Accreditor independently reviewing assertions by suppliers and checking with third parties that these assertions were actually true. For G-Cloud 6 suppliers there will no longer be a role for PGA. Instead, suppliers will provide assertions regarding how they comply with CESG’s Cloud Security Principles .It will then be up to consumers of their services to determine whether these assertions provide a sufficient level of confidence for them to use the service.

What will the process be?

The process will involve all G-Cloud 6 suppliers completing a questionnaire covering the14 Cloud Security Principles .for each service they provide on G-Cloud. Responses to questions are likely to be selected from pre-defined answers. The questionnaire has not been released as yet (July 2014) but a draft for comment is expected shortly. Ascentor will be posting a blog on the subject very soon after it is released.

Will there be different levels?

The new security approach has three different levels of confidence that a supplier can seek to provide to their customers about their service:

  1. Unassured . Supplier assertions but with no independent proof that the assertion is correct.
  2. Assured Public Cloud . The supplier assertions will have been independently validated by a third party. Examples include:
    1. Independent third party review (but not to a recognised standard).
    2. Certificate of compliance with a recognised standard.
    3. Scope of certification validated by qualified individuals.
    4. Independent testing of control implementation.
    5. Scope of testing validated by qualified individuals.
    6. Independent assurance in the design.
    7. Use of assured components.
  3. Accredited Public Cloud . The supplier assertions and validation by a third party will be subject to a government department’s accreditation process. This will provide confidence that all aspects of the supplier’s service have been considered and are working effectively together.

Will it make a difference?

The PGA process has proven costly in time and effort. Additionally, the level of assurance gained was not appropriate for some consumers who had greater or lesser risk appetite levels. The onus will now be on both the suppliers to provide assertions and the consumers to determine if those assertions, and the assurance that goes with them, are sufficient to meet the needs of their particular business requirements. What may be good for one organisation may not necessarily be good enough for another; after all good information security is all about context. The new security approach puts responsibility firmly in the hands of consumers to determine their risk appetite levels and decide whether or not the supplier assertions are good enough. This is bound to speed up the whole process – a good thing.

What’s the catch?

There is a danger that standards will decline over time. The PGA service ensured that a certain standard of assurance was maintained in order to meet the security requirements of organisations with similar levels of business impact. Now, organisations more tolerant of risk may not seek assurance and be satisfied with an ‘unassured’ service. Other organisations with less risk tolerance may be tempted to use the ‘unassured’ service because if it’s ok for them why not for us?

….. but on the plus side

Suppliers of cloud services have recognised consumer concerns regarding security and are adopting a far more robust approach. Every time they make an improvement and gain additional validation, they can upgrade their G-Cloud profile. Over time, those offering services with more assurance but within a similar price bracket as their competitors are likely to win consumer business. Assurance by default – sounds good!

For further information

If you have found this article of interest, the Ascentor blog regularly carries articles about cyber security and information assurance issues. You might also like to keep in touch with Ascentor by receiving our quarterly newsletter and following us on LinkedIn and Twitter.

If you’d like to discuss how ourconsultants could advise on any aspect of cyber security, please contact Dave Jamesat Ascentor.


Office: 01452 881712


For Further Information

If you have any questions about the topics we've covered, or would like to have a chat about any aspect of your own cyber security strategy, please get in touch with the team at Ascentor.

Please use the contact details below - also found on our Contact Us page.


Fields marked with an * are required
Share this:

You may also be interested in:

Less rules, more goals. How recent changes in regulatory approaches can enable innovation in information security

Regulated sectors such as the civil nuclear industry and financial institutions have seen a recent shift towards outcome-focused regulation which is

How to pass Cyber Essentials PLUS first time

As anyone who’s ever run a race will know, it’s all about the preparation. As the saying goes, ‘if you fail to plan – you plan to fail’. The

The NIS Directive explained – compliance and guidance

Originally published in May 2018 just before it entered UK law, this article covers the NIS Directive, also known as NIS (D). We look at what it is,