Cyber Incident Response Planner
🛡️

Cyber Incident Response Planner

Free planning tool for UK schools and colleges. Build a school-specific Cyber Incident Response Plan, mapped to NCSC, DfE and Ofsted guidance.

Takes around 15–25 minutes · readiness check · 10-section plan builder

✓ Free · browser-only · no account ✓ Mapped to NCSC, DfE Standards 2030, RPA & Ofsted
v1.7.0 · changelog
ℹ️ Police CyberAlarm: registrations remain open and vulnerability scanning is available — registering still satisfies the RPA cyber cover condition. More info ↓

Only the on-network data collector is currently paused for new installations during a planned transition period — the rest of the service continues as usual. If you're unsure about your specific position, your local Regional Organised Crime Unit (ROCU) Cyber PROTECT team can advise free of charge, or contact the RPA at RPA.DFE@education.gov.uk. The full registration page is at cyberalarm.police.uk.

The four RPA cyber cover conditions: PCA registration, offline backups, annual NCSC cyber security training for all staff and governors with system access, and a documented Cyber Response Plan (which this tool helps you build).

💾 Cloud MIS / SaaS: do you hold your own copy of the data? If your MIS or pupil-data SaaS is supplier-hosted, you remain the data controller under UK GDPR. More info ↓

When your MIS (Arbor, SIMS Cloud, Bromcom, iSAMS, Engage, ScholarPack) or other school-data SaaS (CPOMS, MyConcern, ParentPay, M365) is hosted by the supplier, you are still the data controller and they are the data processor. Best practice: request and store a current export of your school's data termly, separate from the supplier's environment. If they suffer a breach, fold, or you need to migrate, you can act independently — without waiting for the supplier's recovery timeline or commercial co-operation.

Most schools never test this until it's too late. The Critical systems & impact section in the Plan Builder includes a "Last data export from supplier" field for each system; the SaaS supplier incident playbook walks the response when a supplier-hosted system is breached; the Tabletop scenario F tests this against a cloud / ransomcloud incident.

Why this matters in practice: if Arbor (or your MIS supplier) suffers a serious breach, the 72-hour ICO notification clock falls on you, not them. Without your own data copy, you can't quickly answer "what data was held?", brief parents under UK GDPR Article 34, or maintain operational continuity. Add the termly data-export task to your annual cyber calendar (Plan section 12.1).

Mapped to UK Frameworks
Every readiness question and plan section is tagged
Sources verified
29 April 2026
🏛️ DfE Cyber Security Hub — sector-specific incident response playbooks, planning templates and case studies from the Department for Education. This tool is designed to complement and operationalise the Hub's templates.

Already started?

Jump straight to a specific section of the tool.

PLAN COVERS 10 SECTIONS
Open the plan builder →
🏫 School details
👥 Response team
📞 External contacts
⚠️ Severity & triage
🎯 Escalation
📖 Playbooks
📢 Communications
💾 Recovery
🔍 Post-incident review
🔄 Plan maintenance
🍺 Buy me a beer