Sector Guides

Cybersecurity for Secondary Schools: Exam Data, Student Records, and DfE Standards Compliance

Secondary schools occupy a uniquely high-risk position in the UK education cybersecurity landscape. They hold sensitive data for thousands of students — exam results, predicted grades, SEN records, pastoral records, and safeguarding files — at scale. They run complex IT environments supporting hundreds of staff and thousands of students, often with a single IT technician or small IT team. They face real threat actor interest: exam data, staff credentials, and financial systems are all targets. And they are subject to the full weight of the DfE Cyber Security Standards (January 2023), which requires governors to be personally accountable for meeting defined requirements.

Secondary schools hold exam predicted grades, SEN files, pastoral records, and UCAS data for thousands of students — high-value targets for ransomware groups and data thieves.

Why Secondary Schools Are High-Value Targets

Secondary schools combine several factors that make them attractive ransomware targets:

  • Operational dependency: schools must function during term — any disruption to MIS, email, or learning platforms creates immediate pressure to restore systems
  • Exam data sensitivity: GCSE and A-level predicted grades, special arrangements, and completed work represent high-value data
  • Financial systems: school finance functions process significant payments to suppliers and contractors
  • UCAS and HE application data: sixth form colleges and secondary schools with sixth forms hold university application data
  • Large attack surface: hundreds of staff devices, thousands of student devices, numerous cloud services

Exam Data Security: A Specific Risk

Exam data — particularly predicted grades and advance information about examination content — is sensitive in ways specific to secondary education. Unauthorised disclosure of predicted grades can affect UCAS applications. Exposure of exam content in advance constitutes serious malpractice. The exam boards (AQA, Edexcel, OCR) have strict data security requirements for schools that hold exam materials. Secondary schools should ensure exam-related data is stored separately from general school systems, with access limited to staff with a direct role in exam management. MIS exam modules should be reviewed for appropriate access controls, and exam scripts and working papers should be stored securely until submission to the board.

DfE Standards in the Secondary Context

The DfE Cyber Security Standards require secondary schools to demonstrate compliance across five domains: governance; protection; response; recovery; and ecosystem (third-party risk). For a secondary school with a dedicated IT team, the path to compliance is clearer than for a primary — but the scale of the environment makes implementation more complex. Key priorities for secondary schools that often lag behind: MFA on all staff accounts (email, MIS, remote access); patching all devices within 14 days; network segmentation between student and staff systems; and a tested incident response plan that governors have reviewed.

Student and Staff Data at Secondary Scale

A typical secondary school of 1,200 students processes personal data for those students across multiple systems: the MIS (SIMS, Arbor, iSAMS), Google Classroom or Microsoft Teams, assessment platforms, communication tools, library systems, and sports management. Each system represents a potential breach point, and many secondary schools have not completed a full Record of Processing Activities mapping all data flows. UK GDPR requires schools to have a legal basis for each processing activity, Data Processing Agreements with each vendor, and documented retention periods. An annual review of the ROPA — identifying new EdTech tools adopted informally by teachers — is essential to maintain compliance as the EdTech stack evolves.

Sixth Form and UCAS Data: Additional Obligations

Secondary schools with sixth forms and sixth form colleges processing UCAS applications hold a category of student data with specific handling requirements. UCAS application data — including academic references, personal statements, and predicted grades — is confidential and must be handled according to UCAS data sharing agreements. Schools must ensure that access to UCAS systems is restricted to authorised sixth form staff, that UCAS portal credentials are protected with appropriate authentication, and that personal statement drafts are not shared insecurely.

Frequently Asked Questions

What are the DfE standards specifically required of secondary schools?

The DfE standards apply equally to all state-maintained schools and colleges, regardless of phase. For secondary schools, the most commonly unmet requirements are: MFA on all staff accounts; a documented and tested incident response plan; regular security awareness training for all staff; and documented Data Processing Agreements with all EdTech vendors. The NCSC Schools Cyber Health Check provides a free assessment of where your school stands against these requirements.

How should a secondary school handle exam data under GDPR?

Exam data — scripts, marks, predicted grades, special arrangement records — should be treated as sensitive personal data under UK GDPR. Access should be limited to staff with a genuine need. Predicted grades should not be stored in general shared drives accessible to all staff. When sharing exam data with exam boards, use the exam board's secure submission systems rather than unencrypted email. Retain exam-related data according to the school's retention schedule and the exam board's requirements.

What is the biggest cybersecurity risk for a secondary school?

Phishing leading to account compromise, followed by ransomware deployment. A single staff member clicking a phishing link can give an attacker credentials for school systems. From there, attackers move laterally to find high-value targets — financial systems, MIS databases, and backup systems. MFA on all staff accounts is the single most effective control to interrupt this attack chain. After MFA, the most important controls are email filtering (to block phishing), backup testing (to survive ransomware), and staff training (to reduce click-through rates).

Get DfE standards compliance support for your secondary school

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Coro

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.