blog post ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Download.9707f7cfb011873c42d284fb1469de73.svg) Download / Print article PDF ##### ShareCopied to clipboard ##### Share![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)##### Facebook![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)##### Linkedin![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)##### X![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)##### Copy LinkCopied to clipboard ##### Share![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)##### Facebook![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)##### Linkedin![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)##### X![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)##### Copy LinkAccessibility as a cyber security priority==========================================Want security that works better for people? Make it accessible. Lee C Invalid DateTime ![](https://www.ncsc.gov.uk/images/library/Accessibility.jpg?mpwidth=545&mlwidth=737&twidth=961&dwidth=618&dpr=1&width=800) https://accessibility.day/ 3 years ago, Anna (not her real name) was diagnosed with a neurological autoimmune disease in which her body attacks substances that are naturally found in the body, causing pain and vision loss.Before her diagnosis, Anna worked in software technology and felt very confident and safe online. She now uses glasses, a magnifying glass and screen magnification where needed.Anna has no peripheral vision or depth perception. Face ID, or proving her identity by taking a photo of herself on her phone are impossible as she does not have the vision to line up her face with the camera.Trying to zoom in, clicking on the wrong link, or using websites with a time limit enhance her frustration and constantly remind her of interactions that used to be second nature, but now feel like an ongoing battle with technology. ‘I can start to get very stressed’ says Anna. ‘The pressure can make me feel inadequate, which makes me shake. For me, it can spiral very quickly.’Anna’s experience is taken from [Thinks Insights and Strategy](https://thinksinsight.com/accessibility-and-cyber-security/), looking at the cyber security ‘lived experiences’ of people with disabilities. Commissioned by the NCSC, it’s part of a growing body of work identifying how cyber security actions can be challenging if you have an accessibility requirement.Accessibility is about ensuring that nobody is excluded from using something due to a disability or impairment. It is about helping **everybody** , irrespective of any physical or neurological difference. An estimated [22% of working age adults are disabled, with 4.9 million disabled people in the workforce](https://www.gov.uk/government/statistics/the-employment-of-disabled-people-2022).There are many reasons to address accessibility, whether meeting legal requirements, delivering better operational outcomes, or attracting and retaining a more diverse set of talent. Addressing accessibility also provides cyber security benefits by making systems more usable and making human errors or workarounds less likely. Conversely, if we fail to consider accessibility, these risks increase.If Anna was working in **your** organisation, would she find your systems accessible? Where might your processes be challenging, and what could the security consequences be if doing things securely wasn’t accessible? *** ** * ** ***How security can be inaccessible——————————–Anna might not work for your organisation, but if you have security measures that aren’t accessible, then the system will be harder for **everyone** to use. Security measures can be inaccessible in a number of ways. Here are a few examples:* Awareness campaigns, training, or security policies that are not in accessible formats or written in simple, accessible language leave people lacking the knowledge they need of how to do their jobs securely.* Complicated interfaces, mis-labelled buttons, ambiguous link text, or audio-only/visual-only warnings make human errors more likely.* Colour schemes of ‘red for high risk’ and ‘green for safe’ may be inappropriate for people with colour blindness.* A lack of accessible feedback or error messaging when completing a configuration change may lead to falsely presuming you have implemented a security control when you haven’t.* Security that removes accessibility functionality might leave people needing to adopt a less-secure workaround or avoiding doing their job entirely.* Concerns about breaking compatibility with assistive technology or altering coping strategies might prevent users updating systems.* If accessible ways to recover from errors or access support are not present then what could have been a ‘near miss’ can quickly turn into a serious incident.The examples above are not exhaustive, but they highlight how accessibility is important for processes as well as technology.We don’t intentionally end up with security that is hard to use. We often end up with it because we don’t factor it in to our security decision making, or because it’s seen as someone else’s responsibility. Alternatively it can be seen as necessary to compromise usability to achieve security, not recognising the two to be interdependent.This is surprising given the number of incidents which still claim ‘human error’ as a contributing factor. Considering accessibility within your security requirements is a great way of ensuring that you are actively considering your ‘human factors risks’, and that you are stress testing your security against the conditions where people will find it most difficult to use, and where human errors will be most likely. *** ** * ** ***Security that works better for everyone—————————————Everyone benefits when systems are deployed where accessibility is built-in. Consider three colleagues:* one is deaf* one has an ear infection* one is working in a noisy environment without access to headphonesIf your security awareness video doesn’t have a transcript or captions, it isn’t accessible to *any* of them. By focussing on meeting the accessibility needs of your deaf colleague, you make the solution work better for *everyone*.This is an example of how the barriers people experience can be permanent, temporary and situational. [Microsoft’s inclusive 101 guidebook](https://inclusive.microsoft.design/) (part of a set of tools on inclusive design) has further examples of this for a range of disabilities.In all cases, designing for people with disabilities makes things more usable for everyone. We all experience limitations based on our environment that mean that security doesn’t work for us in the way it was designed to. However, if that security has been designed with accessibility in mind, it will be more resilient to work as it’s really done, and less likely to fail. *** ** * ** ***Training is not a silver bullet——————————-When people behave insecurely, the temptation is to treat them like we treat technology. We ‘patch’ them by sending them on a training course, in the hope that this will fix the ‘vulnerability’ in the system.Training is only effective when the problem is a lack of knowledge. However if the problem is a lack of accessibility, training isn’t the answer. If the security timeout is too short for Anna to complete her job due to her disability, no amount of security training is going to solve that. People will bypass security to do their jobs if you make them. The security itself needs to be made more accessible. *** ** * ** ***What can you do?—————-1. Work with your colleagues—————————-The best way to make security more accessible is to engage with the people who interact with it. Consult your colleagues in your security decision making processes and encourage feedback. Test new systems and processes with people with accessibility needs to discover where issues might exist.You don’t need everyone in your security team to be an expert in accessibility. People with accessibility requirements themselves, accessibility professionals, user researchers, user experience (UX) designers, service owners or developers all likely have knowledge you could be using if you make security a team sport.If colleagues need access to specific functionality or technology that might otherwise break security policies, work with them to understand their needs and manage the risks. Where it isn’t appropriate to change a whole policy, have a process to enable people to raise issues.Working collaboratively to make sensible exemptions and managing any associated risk is better than forcing people to avoid security, or suffering through not being comfortable enough to raise a concern.2. Don’t compromise on the ‘what’, but be flexible on the ‘how’—————————————————————You don’t need to dilute your security requirements to achieve accessibility, but you should be open to different ways of realising these requirements.For example, imagine you’ve identified an asset that requires multi-factor authentication (MFA). There is no ‘universally accessible’ MFA method. One person’s preferred method might be a barrier for another. The key here is to [offer enough flexibility that people can select an approach that works for them and their needs](/guidance/authentication-methods-choosing-the-right-type).Providing this flexibility has a secondary benefit in that in improves the resilience of your systems. So if one method of authentication were to fail, an alternative method can provide a backup to minimise business loss.3. Make ‘accessibility’ and ‘usability’ part of your security requirements————————————————————————–Treating usability and accessibility alongside other security requirements rather than a separate thing is useful to ensure it gets considered. Take time to consider which actions would have the largest impact if they were carried out insecurely or avoided, and then test the accessibility of these.You can conduct some due diligence by asking vendors or suppliers for an accessibility statement for their products which should let you know where any shortcomings might be. Alternatively, you could build in a requirement for a certain level of compliance against a framework or standard such as the [Web Content Accessibility Guidelines (WCAG)](https://www.w3.org/TR/WCAG21/). Just be mindful that, as with security more generally, you need more than compliance for effective risk management. *** ** * ** ***Striving for more inclusive and effective cyber security——————————————————–With new research, our understanding of the barriers people face interacting with systems and the implications for our shared security goals is improving. This understanding is providing the motivation for citing the importance of usability and accessibility in our guidance and for including it as a requirement as we transform the way we do assurance. It is driving us to trial new approaches to the identification and treatment of cyber risk, and to explore wider barriers to successfully implementing security through adapting the [universal barriers framework](https://gds.blog.gov.uk/2019/03/26/understanding-all-the-barriers-service-users-might-face/) for the design of security.Recognising and responding to the increased drive to consider accessibility as a security need will help organisations get on top of their human cyber risk, while also cultivating a more inclusive culture and allowing themselves to make the most of a more diverse talent pool.#### Lee CNCSC Sociotechnical and Risk GroupTopics——[Cyber strategy](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Cyber strategy)[Equality, Diversity and Inclusion](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=Equality, Diversity and Inclusion)[People-centred security](https://www.ncsc.gov.uk/section/advice-guidance/all-topics?topics=People-centred security)| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) | Back to top | ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Download.9707f7cfb011873c42d284fb1469de73.svg) | Download / Print article PDF || ##### Share|| Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)|| ##### X|| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)|| ##### Copy Link|| Copied to clipboard || ##### Share|| ![Facebook](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Facebook.695a42932737575e03881b3dae4c729f.svg)|| ##### Facebook|| ![Linkedin](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Linkedin.9c46437a494eb1e6c877fc3e1634aa99.svg)|| ##### Linkedin|| ![X](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/x-icon-black.8bab2404a5e5c1a0f3e748f82fdcb2e4.svg)|| ##### X|| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/CopyLink.594f762f40cab3b56f5f0248d0cb306a.svg)|| ##### Copy Link|| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Blogger.34b9cc54e1e80c3f8282efbe1412c4d9.svg) || ##### Written By|| Lee C|| NCSC Sociotechnical and Risk Group | * || ##### Published|| * 18 May 2023| *|| ##### Written For|| * [You -& your family](/section/advice-guidance/you-your-family)| * [Small -& medium sized organisations](/section/advice-guidance/small-medium-sized-organisations)| * [Self employed -& sole traders](/section/advice-guidance/self-employed-sole-traders)| * [Large organisations](/section/advice-guidance/large-organisations)| * [Public sector](/section/advice-guidance/public-sector)| * [Cyber security professionals](/section/advice-guidance/cyber-security-professionals)| *|| ##### Part of blog|| * [NCSC publications](/section/keep-up-to-date/ncsc-blog)| ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Blogger.34b9cc54e1e80c3f8282efbe1412c4d9.svg) || ##### Written By|| Lee C|| NCSC Sociotechnical and Risk Group| * || ##### Published|| * 18 May 2023| *|| ##### Written For|| * [You -& your family](/section/advice-guidance/you-your-family)| * [Small -& medium sized organisations](/section/advice-guidance/small-medium-sized-organisations)| * [Self employed -& sole traders](/section/advice-guidance/self-employed-sole-traders)| * [Large organisations](/section/advice-guidance/large-organisations)| * [Public sector](/section/advice-guidance/public-sector)| * [Cyber security professionals](/section/advice-guidance/cyber-security-professionals)| *|| ##### Part of blog|* [NCSC publications](/section/keep-up-to-date/ncsc-blog) ![](https://www.ncsc.gov.uk/static-assets/dist/ncsc/static/media/Chevron_blue_up-CA.0731190020f3afd1faf8227c16c32bfd.svg) Back to top

Related Tags:
NAICS: 56 – Administrative And Support And Waste Management And Remediation Services

NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 561 – Administrative And Support Services

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 92 – Public Administration

Blog: NCSC Reports

Guidance and Blog-post

M1032 – Multi-factor Authentication

Clipboard Data

Associated Indicators: