Government Code of Connection & IT Health Check

Public sector bodies that want to access the Public Services Network (PSN) must provide assurance to the Public Services Network Authority (PSNA) that their networks meet the latest supporting guidelines by submitting an annual PSN Code of Connection (CoCo) IT Health Check (ITHC) assessment.

With the ever changing regulations and requirements surrounding this area, even the most diligent of ISOs can find it a challenge to keep up-to-date with their organisation’s obligations.

Using our many years of experience supporting public sector bodies with information security projects, we are confident that our PSN ITHC will provide you with assurance that your external and internal systems are protected from unauthorised access.

The CESG IT Health CHECK (ITHC) or CHECK scheme was developed by the UK Government’s information assurance division. This body is responsible for enhancing the availability and quality of the IT Health Check services that are provided to the Government in line with Her Majesty’s Government (HMG) policy.

NTA were one of the four founding members of the CESG CHECK scheme in 1999 and have maintained our ‘Green Light’ status ever since. If you’re handling information that is OFFICIAL-SENSITIVE, SECRET or TOP SECRET then you will require an annual IT Health Check conducted to CESG CHECK standards.

CHECK IT Health Checks may be deployed as part of a PSN Code of Connection submission or as a part of an RMADS led accreditation of a new system or network, for those bodies handling protectively marked data. We pride ourselves on being agile and responsive to our clients’ needs - you can be confident that our team of SC cleared consultants will help you achieve the objectives relevant to your organisation.

NTA is also a member of the Council of Registered Ethical Security Testers (CREST). This scheme ensures a similar level of technical competency to the CESG CHECK scheme but is suited to those organisations looking for IT Health Checks or penetration testing of networks holding non-protectively marked information.