Precursor Security
UK Cyber Security and Resilience Bill 2025

Critical Supply Chain Security Rules

The Bill requires you to identify your designated critical suppliers, assess their security controls, and hold them to contractual notification timelines, or face penalties of up to £10 million. Most organisations do not know which suppliers qualify as critical, or whether their existing assessments meet the Bill's specific requirements. We map, classify, and assess your supply chain so you have a defensible compliance position before your regulator asks.

From £6,000
Fixed-Price Assessment
CREST-Accredited
Bill-Aligned
Scroll
Supplier Designation

Managing suppliers or been designated?

The Bill creates obligations on both sides. Whether you manage a critical supplier estate or you have received a designation letter, Precursor builds the evidence package your regulator or client requires.

For OES and RDSP Organisations

Managing Your Critical Supplier Estate

The Bill requires you to identify which suppliers are designated critical, conduct documented assessments, impose contractual notification timelines, and maintain ongoing monitoring. We build the programme your regulator expects.

  • Written classification register with rationale
  • 87-question vendor security questionnaire
  • Contractual clause review (24/72-hr notification)
  • Quarterly scorecard monitoring programme
  • Evidence-grade documentation for audit
Book a Supply Chain Readiness Briefing
For Designated Critical Suppliers

You Have Received a Designation Letter

Being classified as a DCS means your clients can impose security requirements that go beyond standard terms. Before you agree to everything in their questionnaire, understand what the Bill actually obliges you to do.

What the Bill requires

  • +Proportionate security controls
  • +24/72-hour incident notification
  • +Right-to-audit acceptance
  • +Subcontractor management

Common client additions beyond the Bill

  • -Mandatory ISO 27001 within 6 months
  • -Annual pentest as contractual condition
  • -Notification of all near-misses
  • -Source code escrow
Get a DCS Readiness Assessment, From £4,500
Assessment Framework

Third-Party Risk Assessment Under the UK Cyber Resilience Bill

A structured programme covering supply chain mapping, risk classification, vendor assessment, contractual security, and ongoing monitoring. Each phase produces evidence-grade documentation for regulatory audit.

Risk Assessment

Third-Party Risk Assessment

Structured assessment of your critical and designated critical suppliers using a questionnaire framework aligned to ISO 27001:2022 Annex A.5.19-A.5.23, NCSC Supply Chain Security Principles, and the Bill's specific due diligence requirements. We assess inherent risk versus residual risk, verify certifications (ISO 27001, Cyber Essentials Plus, SOC 2 Type II), review incident response capabilities, and produce a scored supplier risk register with documented risk acceptance decisions that withstand regulatory audit.

Supply Chain Mapping

Supply Chain Mapping and Classification

Complete inventory and classification of your third-party supplier estate, mapping every supplier by service criticality, data access level, and operational dependency. We apply the Bill's designation criteria, including the small and micro enterprise exception and when it does not apply, to produce a written classification register that documents why each supplier is or is not critical. This register is the primary evidence artefact your regulator will request.

Vendor Questionnaires

87-Question Vendor Security Questionnaire

Design and deployment of an 87-question vendor security questionnaire covering eleven ISO 27001 control domains, NCSC Supply Chain Security Principles, and the Bill's specific requirements, including 24-hour incident notification capability, subcontractor management, and right-to-audit acceptance. We manage supplier distribution, chase non-responses, review returned questionnaires, and document risk ratings with compensating controls where gaps are identified.

Contractual Review

Contractual Security Requirements

Review and amendment of supplier contracts to include the mandatory security provisions the Bill requires you to impose: 24-hour initial notification, 72-hour full report, right to conduct or commission security audits, cascading obligations to subcontractors with access to your data, minimum security certification requirements, and breach liability provisions. We distinguish between what the Bill mandates you include and what is commercially advisable to add.

Ongoing Monitoring

Continuous Supplier Monitoring Programme

Post-assessment monitoring programme for your designated critical supplier estate: quarterly scorecard reviews tracking control maturity, automated alerts for publicly disclosed supplier incidents (data breaches, vulnerabilities, regulatory actions), immediate reassessment trigger on any supplier security event, and annual full reassessment with updated risk register. The monitoring programme produces the ongoing evidence of supplier oversight that the Bill requires, not just a point-in-time assessment that goes stale within months. Per-supplier monitoring from £500/year.

Evidence Artefacts

What your regulator will ask for.

Classified supplier register with written designation rationale for every supplier
Risk-rated supplier assessments with identified gaps and compensating controls
87-question vendor security questionnaire responses (verified, not self-attested)
Contractual review report: clause-by-clause analysis of mandatory vs advisory provisions
Quarterly supplier security scorecard templates and monitoring framework
Executive summary for board reporting with risk heat map and remediation priorities
Incident response protocol for supplier security events (aligned to 24/72-hour notification)

All deliverables are formatted for regulatory presentation. Evidence packs are provided in both PDF and editable formats for ongoing programme maintenance.

Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Supply Chain Inventory

A structured workshop-led exercise to catalogue your complete third-party supplier estate, including shadow IT and undocumented dependencies. We distinguish between direct suppliers, subcontractors, and Nth-party relationships that may carry inherited risk. Output: a complete supplier register with enough data to apply the Bill's classification criteria. Typical duration: three to five days for organisations with up to 50 suppliers.

Step 02

Risk Classification

Application of the Bill's classification criteria to each supplier in the register: service criticality to your operations, sensitivity of data processed, potential impact of supplier failure or compromise on your ability to deliver services, and whether the small and micro enterprise exemption applies (and whether the Bill's override provision is triggered). Output: a written classification report with designation decisions documented, rationale recorded, and a prioritised assessment queue for Step 03. This document is the evidence your regulator will ask for first.

Step 03

Security Assessment Programme

Tiered assessment of classified suppliers, scaled to their risk designation: critical suppliers receive the full 87-question questionnaire plus documentation review and where warranted, on-site or remote audit; important suppliers receive an abbreviated questionnaire with annual review; lower-risk suppliers are monitored via certification status. We verify questionnaire responses against supplied evidence (ISO 27001 certificates, Cyber Essentials Plus assessments, SOC 2 Type II reports, penetration test summaries) rather than accepting self-attestation. Output: risk-rated supplier assessments with identified gaps, compensating controls, and risk acceptance documentation.

Step 04

Ongoing Monitoring

Establishment of a repeatable monitoring programme: quarterly security scorecard reviews for critical suppliers, annual full reassessment, and an incident response protocol for supplier security events. We help you build the internal capability to run the programme yourselves, or we run it for you under a retained advisory arrangement. Output: a monitoring framework with defined review triggers, scorecard templates, reassessment criteria, and a quarterly evidence log suitable for regulatory audit.

Fixed-Price Programmes

Know the cost before you commit.

All supply chain programmes are fixed-price after an initial scoping call. No day-rate ambiguity.

Inventory and Classification

10-25 critical suppliers

Supply chain mappingRisk classification registerBill designation analysisPrioritised assessment queue
5-10 days

From £6,000

Comprehensive TPRM Programme

25-50 suppliers

Everything in Inventory87-question questionnairesContractual security reviewRisk acceptance documentation
15-25 days

From £12,000

Enterprise Programme

50+ suppliers

Full programme implementationContinuous monitoring setupBoard reporting frameworkRetained advisory option
30-45 days

From £25,000

DCS Readiness Assessment

For designated suppliers

Bill obligation analysisClient requirement reviewCompliance gap assessmentEvidence pack preparation
2-3 weeks

From £4,500

Tell us your supplier count and sector. We confirm scope and price within 24 hours.

Get a Fixed-Price Scope
After Assessment

Test What the Assessment Finds. Close the Loop.

Your supply chain assessment identifies which suppliers need tighter controls. Precursor delivers the verification: penetration testing of vendor environments, ISO 27001 consultancy to close the gap between existing certification and the Bill's requirements, and incident response retainers supporting your 24-hour notification obligations.

Explore Related Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Free Scoping Call

How many suppliers are in your critical estate?

Tell us your supplier count and sector. We determine which suppliers are likely designated critical under the Bill, quantify the assessment programme scope, and provide a fixed-price quote within 24 hours. No obligation. No day-rate surprises.

Get a Fixed-Price Scope
CREST Accredited
Fixed Pricing
From £6,000
24hr Quote

Supply Chain Compliance: Common Questions

Designated critical suppliers, third-party risk assessment, vendor questionnaires, contractual obligations, and programme pricing.

Supply chain security assessment services for the UK Cyber Resilience Bill are priced by supplier volume and programme scope: Supply chain inventory and risk classification (10-25 critical suppliers): £6,000-£10,000. Comprehensive TPRM programme with questionnaires and contractual review (25-50 suppliers): £12,000-£20,000. Full enterprise supply chain security programme with continuous monitoring (50+ suppliers): £25,000-£35,000+. Ongoing per-supplier monitoring: from £500/supplier/year. DCS readiness assessment (for suppliers who have received designation from a client): from £4,500. All engagements are fixed-price. We provide a confirmed scope and price within 24 hours of receiving your supplier count and sector.

Annual questionnaires satisfy the spirit of supplier oversight but rarely survive regulatory scrutiny. The specific gaps we find consistently in existing programmes: (1) no written classification methodology distinguishing critical from important suppliers using the Bill's criteria, (2) questionnaire responses accepted at face value with no verification, (3) contracts that mention security obligations but do not specify notification timelines, audit rights, or subcontractor requirements, and (4) no documented process for what happens when a supplier's posture deteriorates between reviews. We build those missing components into your existing programme rather than replacing it.

The UK Cyber Security and Resilience Bill requires operators of essential services (OES) and relevant digital service providers (RDSP) to: identify which suppliers qualify as designated critical suppliers (DCS) under the Bill's classification criteria; conduct documented security assessments of those suppliers aligned to the NCSC 12 Supply Chain Security Principles and ISO 27001:2022 Annex A.5.19-A.5.23; impose contractual incident notification obligations (24-hour initial notification, 72-hour full incident report); establish right-to-audit clauses and cascading obligations to subcontractors; and monitor supplier security posture on an ongoing basis. Penalties for non-compliance reach up to £10 million or 2% of global annual turnover for most violations, with higher tiers for the most serious failures.

The Bill uses the term designated critical supplier (DCS) for third parties whose compromise or failure would have a significant impact on your ability to deliver essential services. Classification depends on four criteria: (1) service criticality to your operations, (2) sensitivity of data the supplier processes, (3) potential impact of supplier failure or breach, and (4) the degree of operational dependency. Managed service providers (MSPs) with administrative access, cloud infrastructure providers, critical SaaS platforms, payment processors, and suppliers with access to sensitive customer or operational data are typically in scope. Crucially, the Bill includes a provision that the small and micro enterprise exemption does not apply where the supplier's service is genuinely critical, regardless of the supplier's headcount or turnover.

A Bill-compliant vendor security questionnaire should cover eleven control domains: (1) information security governance and accountability, (2) access control and privileged access management, (3) network security and segmentation, (4) data handling and encryption, (5) incident detection and response capabilities, (6) incident notification procedures and 24/72-hour reporting capability, (7) vulnerability management and patch timelines, (8) business continuity and disaster recovery, (9) physical and environmental security, (10) subcontractor and supply chain management (cascading obligations), and (11) security certifications held (ISO 27001, Cyber Essentials Plus, SOC 2 Type II). Questionnaires should also ask suppliers to provide their Statement of Applicability if ISO 27001 certified, and to identify subcontractors who have access to your data or systems.

The Bill does not prescribe a single assessment methodology, but the NCSC's 12 Supply Chain Security Principles provide the closest thing to an official framework. A defensible third-party risk assessment under the Bill requires four components: (1) a written classification methodology identifying which suppliers qualify as designated critical suppliers under the Bill's definitions; (2) a security assessment conducted through questionnaires aligned to ISO 27001:2022 controls (Annex A.5.19-A.5.23) and verified where possible through documentation review or on-site audit; (3) contractual review to confirm mandatory incident notification timelines (24-hour initial, 72-hour full report) and right-to-audit clauses are in place; and (4) a documented process for ongoing monitoring and reassessment. The assessment must produce evidence-grade documentation capable of withstanding scrutiny from your competent authority.

Directly, the Bill's primary obligations apply to operators of essential services (OES) and relevant digital service providers (RDSP), not to their suppliers. However, the Bill creates cascading obligations: OES and RDSP organisations must impose contractual security requirements on their designated critical suppliers, including incident notification timelines, audit rights, and minimum security standards. If a client has notified you that you are classified as one of their designated critical suppliers, those obligations are contractual rather than directly regulatory. You are complying with your client's contractual requirements (which the Bill mandates they impose), not with the Bill itself. The distinction matters when you receive a questionnaire that appears to go beyond the Bill's actual requirements, which is common. Our DCS readiness assessment helps you understand exactly what you are required to do, and what your client may be adding on top of the statutory baseline.

Both frameworks extend security obligations through the supply chain, but they differ in scope and mechanism. EU NIS2 directly brings certain categories of suppliers in scope as important or essential entities in their own right, making them directly regulated. The UK Bill primarily creates cascading contractual obligations: the OES or RDSP organisation is responsible for ensuring its critical suppliers meet required standards, rather than regulators directly supervising those suppliers. The UK Bill also uses the designated critical supplier designation mechanism, which NIS2 does not. Organisations operating in both UK and EU jurisdictions should map requirements separately. Compliance with NIS2 does not automatically satisfy the UK Bill, and vice versa, because the classification criteria and documentation requirements differ.

ISO 27001:2022 Annex A.5.19-A.5.23 covers supplier relationships and is a good foundation. The Bill adds requirements that sit outside the standard: mandatory 24-hour incident notification clauses (ISO 27001 does not specify timeframes), cascading obligations to your suppliers' subcontractors (not standard ISO scope), and regulator-facing evidence documentation in specific formats. In practice, most ISO 27001 certified organisations need to close around four to six specific gaps to meet the Bill's supply chain provisions. We identify those gaps in a half-day workshop and give you a prioritised remediation roadmap, without re-doing your entire ISO programme.

The Bill requires ongoing monitoring, not annual point-in-time assessments. For designated critical suppliers, we recommend: quarterly scorecard reviews tracking control maturity and certification status; immediate reassessment triggered by any supplier security incident (data breach, ransomware, regulatory action, key personnel change); and annual full reassessment with updated risk register and classification review. For important but non-critical suppliers, annual questionnaire refresh with certification verification. The monitoring programme must produce a quarterly evidence log suitable for presentation to your competent authority.