DSPT Compliance

The Data Security and Protection Toolkit (DSPT) is an online self-assessment tool that allows organizations to measure their performance against the National Data Guardian’s 10 data security standards. Portnox’s cloud-native platform for zero trust access control meets and supports these critical security standards in a variety of different and interconnected ways.

There's no disputing it—access control is an absolute necessity for NHS security compliance.

users-check

Data Security Standard 1: Personal Confidential Data

Portnox delivers technical controls for the protection of personal confidential data across the network for both on-site and remote employees, as well as contractors and on-site guests. Administrators can configure and enforce network authentication and access control policies based on role, location, device type, access layer, and more. Automated network segmentation ensures that the right users have access to the critical data and resources they need to perform their jobs, while also preventing lateral movement across the network that could result in data loss and in the event of a cyber attack.

Technical controls include, but are not limited to:

  • Individual user logins
  • Role-based access
  • Two factor authentication
  • Encryption
  • Endpoint port control
  • Data loss prevention
  • Effective audit logging
  • …and more
file-shield-02

Data Security Standard 4: Managing Data Access

As mentioned above, Portnox delivers access control policy enforcement for organizational resources across the network and to the network itself. The platform is fundamentally designed to allow access to data ONLY to those users who should have access in accordance with NHS data security standards. This is accomplished by implementing security measure across every step of the user’s digital journey:

  • Endpoint visibility & awareness: 24/7/365 visibility of devices (models, OS, locations, etc.) requesting network authentication
  • Network authentication: Leveraging directory service (Okta, Active Directory, etc.) user profiles to dictate network access privileges
  • Segmentation & access control: 802.1x access control and dynamic vLAN assignment for all users and devices no matter location
  • Risk monitoring: Endpoint risk posture awareness, looking at firewall status, antivirus status, apps in use, USBs drives, and more
  • Endpoint remediation: Automatically quarantining and remediating devices that fall out of compliance to mitigate potential risk
  • Systems integrations: MDM and SIEM integrations provide further holistic visibility and control of user access to organizational data
message-alert-circle

Data Security Standard 6: Responding to Incidents

Portnox is inherently used to close the gap on access vulnerabilities. Post-network connection, Portnox monitors every device (managed, BYOD, IoT, etc.) and continually assesses the risk posture of each device. When devices exceed an organization’s predefined risk threshold, Portnox responds to this compliance and security incident by automatically quarantining that device on the network and remediating it.

Portnox monitors risks across the following endpoint factors:

  • Geolocation
  • Firewall status
  • Antivirus status
  • Dormancy
  • Applications
  • Open ports
  • Device encryption
  • OS version
  • Rootkit
  • Passcode
  • Running services
  • Administrator privileges
  • Peripheral devices
  • Domain membership
  • …and more
passcode-lock

Data Security Standard 9: IT Protection

Portnox enables organizations to maintain transparent and secure administration of network devices such as routers, switches, and firewalls, and by centralizing user authentication, access control policy enforcement, activity audit trails, and more – all from the cloud. This is accomplished through the platform’s built-in TACACS+ server, which delivers authentication, authorization, and accounting (AAA) services.

image-user-check

Data Security Standard 10: Accountable Suppliers

Portnox is ISO 27001 certified. ISO 27001 is a framework that helps organizations establish, implement, operate, monitor, review, maintain and continually improve an ISMS, and is the international standard for information security. Portnox is also SOC 2 Type II certified. SOC 2 certification validates that the Portnox Cloud upholds the standards of the American Institute of Certified Public Accountants (AICPA).

Zero trust risk mitigation and remediation

Mitigate risk at the source with continuous endpoint risk monitoring

In order to thwart cyber attacks, you have to go to the source. More times than not, that source is a user’s device that’s been used to breach a network. While visibility of connected devices is critical, it’s just the first step. Portnox goes deeper – monitoring the risk posture of every connected device 24/7/365. Look at the state of anti-virus, firewall, applications in use, and a variety of other common areas of vulnerability to detect and remove non-compliant devices from the network.

Data Security and Protection Toolkit

FAQs

The Data Security and Protection Toolkit (DSPT) is an online self-assessment tool developed by NHS Digital in the United Kingdom. It is designed to help organizations, particularly those in the health and social care sector, to assess and improve their data security and information governance practices.

The DSPT aims to provide organizations with a framework to demonstrate that they are meeting the required standards for the secure handling of sensitive and personal data. It covers various aspects of data security and protection, including information governance, cybersecurity, staff training, and incident management.

Organizations using the DSPT are required to complete a self-assessment questionnaire, which consists of a series of statements about their data security practices. These statements cover different areas and are categorized into various standards and criteria. Organizations are expected to assess their current practices against these statements and provide evidence to support their responses.

By completing the DSPT, organizations can identify any areas where they may have gaps or weaknesses in their data security measures. It also helps them to demonstrate compliance with the General Data Protection Regulation (GDPR) and other relevant data protection laws.

The Data Security and Protection Toolkit (DSPT) has four categories:

  • Category 1: NHS Trusts, Ambulance Trusts, Mental Health Trusts, and Care Service Providers (CSPs).
  • Category 2: Arm’s Length Bodies (ALBs), Clinical Commissioning Groups (CCGs), NHS Digital, and NHS Business Partners.
  • Category 3: All other sectors, including primary care (excluding GPs), social care, companies, charities, researchers, universities, and local authorities.
  • Category 4: GPs.

The category of an organisation determines which set of evidence items they must complete in the DSPT. The evidence items are designed to assess an organisation’s compliance with the 10 data security standards set out in the DSPT.

If you fail a DSPT assessment, you will be given a set of recommendations to help you improve your data security practices. You will have a set period of time to implement these recommendations, and you will be reassessed at the end of this period. If you are still not compliant, you may be subject to further action, such as a fine or a ban on processing patient data.

Here are some of the consequences of failing a DSPT assessment:

  • You may be required to implement a range of corrective actions to improve your data security practices.
  • You may be required to report your findings to the Information Commissioner’s Office (ICO).
  • You may be subject to a fine by the ICO.
  • You may be banned from processing patient data.

It is important to note that the consequences of failing a DSPT assessment can vary depending on the severity of the non-compliance. For example, if you fail to implement a basic security measure, such as password protection, you may be given a warning. However, if you fail to implement a more complex security measure, such as encryption, you may be subject to a fine.

If you are concerned about your data security practices, you should contact a data protection expert to help you assess your compliance with the DSPT.

The Information Commissioner’s Office (ICO) can impose fines of up to £17.5 million or 4% of your global turnover, whichever is greater, for failing to comply with the Data Security and Protection Toolkit (DSPT). The amount of the fine will depend on the severity of the non-compliance and the impact on individuals.

For example, in 2022, the ICO fined Clearview AI Inc. £7.55 million for failing to comply with the DSPT. Clearview AI is a facial recognition company that scraped billions of images from the internet without the consent of the individuals in the images. The ICO found that Clearview AI’s actions had a significant impact on individuals’ privacy, and that the company had not taken adequate steps to protect people’s data.

If you are concerned about your compliance with the DSPT, you should contact a data protection expert to help you assess your risks and take steps to improve your security practices.

Here are some additional factors that the ICO may consider when determining the amount of a fine for a failed DSPT assessment:

  • The intentionality of the non-compliance.
  • The level of cooperation with the ICO’s investigation.
  • The steps taken to mitigate the impact of the non-compliance.
  • The public interest in the case.

If you are fined by the ICO for failing to comply with the DSPT, you may be able to appeal the decision to the First-Tier Tribunal. However, it is important to note that appeals are rarely successful.

Related Reading

Webinars

Taming Tool Sprawl: How Portnox Unifies Security Through Smarter Integrations

NEW REPORT: CISOs' Perspectives on Cybersecurity in 2026

X