Precursor Security
UK Cyber Resilience Bill 2025

MSP Requirements Under the UK Cyber Security & Resilience Bill

Your clients are already asking for documented compliance. The Bill designates qualifying MSPs as Relevant Managed Service Providers, with specific obligations that Cyber Essentials Plus does not cover: 24-hour ICO notification, tenant isolation, supply chain due diligence, and annual penetration testing. We assess your RMSP status, identify the gaps, and build the compliance programme. From £8,000.

RMSP Threshold Assessment
24-Hour ICO Notification Runbook
Sub-Contractor Audit Clauses
CE+ Gap Analysis Included
Scroll
Who This Applies To

Three roles. Three sets of obligations. One engagement.

This assessment is for the people who will be held accountable when the Bill is enforced.

MSP Founders and MDs

You need to confirm to a client that your operation meets the Bill's requirements and need a documented compliance programme to reference in contracts and tenders. The client demand letter has already arrived or will arrive.

Operations Directors and Compliance Leads

You need to understand the specific technical controls required (PAM, tenant isolation, SIEM) and build an implementation roadmap with a realistic budget that you can take to the board.

Technical Directors

You need to know exactly what the 24-hour notification obligation requires operationally and how to build an incident runbook that works at 2am on a Saturday when an RMM compromise hits three client environments.

Compliance Gap Analysis

CE+ vs Bill Requirements: The Six Gaps

Cyber Essentials Plus is the minimum baseline. It does not satisfy six specific RMSP obligations.

RequirementCyber Essentials PlusUK Cyber Resilience Bill (RMSP)
Firewall configuration CoveredCovered
Secure configuration CoveredCovered
Access control CoveredExtended: PAM required for privileged accounts
Malware protection CoveredExtended: EDR/MDR recommended
Patch management CoveredCovered, with 14-day critical patch requirement
Tenant isolationNot assessedMandatory for multi-tenant MSPs
24-hour incident notification to ICONot assessedMandatory
72-hour full incident reportNot assessedMandatory
Client notification proceduresNot assessedMandatory, within 24-72 hours
Supply chain due diligenceNot assessedMandatory, documented programme
Right-to-audit on sub-contractorsNot assessedRequired for critical sub-contractors
SIEM / 24/7 monitoringNot assessedEffectively mandatory for RMSP status (subject to guidance)
Business continuity / RTO commitmentsNot assessedMandatory for critical service MSPs
ICO registration as RMSPNot assessedMandatory
Annual penetration testingNot assessedMandatory
Board-level security governanceNot assessedMandatory

Based on published policy statement. Specific secondary legislation subject to Parliamentary confirmation. Rows marked (subject to guidance) reflect current NCSC/ICO expectations pending final secondary legislation.

Parliamentary Progress

Bill Progress Timeline for MSPs

Real dates are more compelling than urgency language. The transition periods will be shorter than most MSPs expect.

July 2024

Bill announced in King's Speech

November 2025

Policy statement published

2026

Bill introduced to Parliament (Second Reading)

TBC

Committee stage, MSP provisions debated

TBC

Royal Assent (estimated)

TBC

ICO begins RMSP registration

TBC

Incident reporting obligations in force

TBC

Full RMSP compliance deadline

Source: UK Parliament Bills portal . Timeline subject to Parliamentary progress.

Methodology

MSP Compliance Methodology:
Five Obligation Areas

Comprehensive security control implementation and compliance management for Relevant Managed Service Providers under the UK Cyber Resilience Bill.

Security Controls

RMSP Security Controls: What the Bill Requires Beyond CE+

The Bill requires MSPs to implement six controls that Cyber Essentials Plus does not assess: multi-tenant isolation preventing cross-client data access, PAM for all administrative accounts, SIEM-based security monitoring with 24/7 incident detection capability, continuous vulnerability management, and annual penetration testing. We assess your current posture against each requirement and build a prioritised remediation plan aligned with the NCSC CAF.

24hr Notification

24-Hour Incident Notification: Building the Runbook

When a significant incident occurs, your clock starts: not when your engineer sees the alert, but when the incident is first detectable. The Bill requires initial notification to the ICO within 24 hours of a major incident and a full report within 72 hours. We develop the runbook: incident classification criteria, escalation paths, ICO notification templates, client communication procedures, and the out-of-hours call tree your team needs at 2am on a Saturday when an RMM compromise hits three environments simultaneously. See our incident reporting guide for the full notification framework.

Supply Chain

Sub-Contractor Due Diligence and Flow-Down Obligations

If you white-label a SOC service, resell a third-party RMM platform, or sub-contract specialist engineering work, the Bill's liability sits with you, not your supplier. We conduct documented due diligence assessments of your technology vendors and sub-contractors, review or draft right-to-audit clauses in your supplier contracts, and build the ongoing monitoring programme the Bill requires. If three of your clients are NHS trusts, the data flow map is not optional. See our guidance on critical supply chain rules under the Bill.

Client Assessments

Client Security Assessments

Conducting security assessments of client environments as part of MSP onboarding. We help MSPs establish baseline security requirements for clients and implement security monitoring across multi-tenant infrastructure. The Bill requires RMSPs to demonstrate ongoing assessment of the environments they manage, not just their own internal posture.

Resilience

Resilience and Business Continuity

Ensuring MSP services meet the Bill's resilience requirements: backup and disaster recovery for client data, service continuity planning, and documented recovery time objectives (RTO) for critical services. For RMSPs serving critical infrastructure, specific RTO commitments are not aspirational targets: they are regulatory obligations. We model your current continuity posture against the Bill's requirements and identify gaps before your clients or the ICO do.

Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

RMSP Status Determination and Gap Analysis

Before assessing what needs to change, we establish whether your MSP meets the RMSP threshold. 50+ employees or £10m+ turnover is the primary test, but client sector composition often determines effective scope regardless of size. We map your current security controls against the Bill's six RMSP-specific requirements, produce a documented gap analysis with prioritised remediation, and give you a clear answer to what a client's procurement team is asking: Are you compliant?

Step 02

Security Control Implementation

Implementing enhanced security controls: tenant isolation, Privileged Access Management (PAM) for all administrative accounts, Security Information and Event Management (SIEM), and continuous vulnerability management across MSP infrastructure. Each control is mapped to the specific Bill clause it satisfies and documented for ICO registration.

Step 03

Incident Notification Runbook Development

We build the operational runbook your team needs before an incident happens. This includes: incident classification criteria aligned with the Bill's significant and major thresholds, the ICO notification template and submission procedure, client communication cascade (who gets notified, in what order, with what information), coordinated response procedures when multiple client environments are affected simultaneously, and quarterly tabletop exercises to test the runbook before the ICO does.

Step 04

Continuous Compliance Programme

Implementing ongoing compliance monitoring: quarterly security audits, annual penetration testing (a mandatory requirement for RMSPs), continuous vulnerability scanning, and regular review of client security assessments. Annual compliance support from £4,000/year.

Fixed-Price Programmes

Know the cost before you commit.

All compliance programmes are fixed-price after an initial scoping call. No day-rate ambiguity.

Small MSP Gap Analysis

Under 50 staff, <100 clients

RMSP status determinationGap analysis + remediation roadmapICO notification runbook
2-4 weeks

From £8,000

Mid-Size MSP Programme

50-200 staff

Everything in Gap AnalysisTenant isolation assessmentPAM implementation guidance
6-10 weeks

From £15,000

Large MSP / CNI Clients

200+ staff, critical infra

Full compliance implementationPenetration testing includedRegulatory engagement support
8-16 weeks

From £25,000

Annual Compliance Support

All MSP sizes

Quarterly security auditsAnnual penetration testRegulatory update briefings
Ongoing

From £4,000/yr

Fixed pricing after scoping call. No retainer required.

Request MSP Gap Analysis
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Free Scoping Call

Your clients are asking. Do you have the answer?

The client demand letter is already arriving at MSPs across the UK. Book a free scoping call: we determine your RMSP status, quantify the gap between CE+ and Bill compliance, and provide a fixed-price programme quote. No obligation. No day-rate surprises.

Request MSP Gap Analysis
CREST Accredited
Fixed Pricing
From £8,000
UK-Based Only

MSP Compliance: Common Questions

Pricing, RMSP thresholds, CE+ gaps, incident reporting, and sub-contractor obligations.

MSP security compliance services for the UK Cyber Resilience Bill typically range from £8,000 to £35,000+ depending on MSP size, client base, and current security maturity. Small MSPs (under 50 employees, fewer than 100 clients) average £8,000-£12,000 for gap analysis, security control implementation guidance, and incident notification procedures including the runbook. Mid-sized MSPs (50-200 employees) typically require £15,000-£25,000 for comprehensive compliance programmes including tenant isolation assessment, PAM implementation, and client notification procedures. Large MSPs serving critical infrastructure clients typically invest £25,000-£35,000+ for full compliance implementation including continuous monitoring, penetration testing, and regulatory engagement support. Annual compliance maintenance and monitoring is available from £4,000/year. We provide fixed pricing after assessing your client portfolio and current security posture. No day-rate ambiguity.

Cyber Essentials Plus is the minimum baseline the Bill requires, but it does not cover six specific obligations that apply to Relevant Managed Service Providers: (1) 24-hour initial notification to the ICO for major incidents and 72-hour full incident reporting, which CE+ does not address; (2) Multi-tenant isolation preventing cross-client data access, which CE+ does not assess for MSP environments; (3) Documented supply chain due diligence on sub-contractors and technology vendors, with right-to-audit clauses; (4) Privileged Access Management (PAM) for all administrative accounts across client environments, beyond CE+ access control requirements; (5) SIEM-based 24/7 security monitoring, which CE+ recommends but does not require; (6) ICO registration as an RMSP and board-level security governance documentation. We help CE+ certified MSPs identify exactly which of these six gaps apply to their operation and build the compliance programme on top of their existing certification.

The Bill introduces the term Relevant Managed Service Provider (RMSP) to designate managed service providers that fall within its regulatory scope. An RMSP is broadly defined as an MSP that: (a) has 50 or more employees or £10m or more in annual turnover, and (b) provides managed IT services to organisations in critical sectors including energy, health, transport, water, financial services, government, and digital infrastructure. Size alone does not determine RMSP status. An MSP with 15 employees that manages IT for three NHS trusts may be treated as functionally equivalent to an RMSP by its clients' own regulators. The ICO will publish a formal RMSP registration process. MSPs should assess their RMSP status now rather than wait for ICO guidance, as the compliance gap analysis itself informs the determination.

The Bill is currently progressing through Parliament with implementation expected on a phased basis. Incident reporting obligations are expected to be among the first requirements enforced. MSPs should implement 24-hour ICO notification procedures immediately. ICO registration for RMSPs will follow Royal Assent. Full security control implementation (SIEM, tenant isolation, PAM, supply chain due diligence) is subject to transition periods, but MSPs serving regulated sector clients are already being asked to demonstrate Bill-readiness by those clients' own compliance teams. We recommend beginning gap analysis now. A compliance programme takes 8-16 weeks to implement depending on current security maturity, and the transition periods will be shorter than most MSPs expect.

The Bill uses the term Relevant Managed Service Provider (RMSP). The primary threshold is 50+ employees or £10m+ turnover. But size alone does not determine your exposure. If you serve critical infrastructure clients, NHS trusts, local councils, energy suppliers, or financial services firms, your clients' own regulatory requirements will contractually impose Bill-equivalent standards on you regardless of your size. We have assessed MSPs with 12 employees who are contractually required to meet RMSP standards because of their client base. Do not assume the threshold protects you until you have mapped your client portfolio against the Bill's critical sector definitions.

The Bill distinguishes between significant incidents and major incidents, each with different notification obligations. For major incidents, MSPs must file an initial notification to the ICO within 24 hours of detection and a full incident report within 72 hours. Significant incidents have longer reporting windows. The classification criteria include: ransomware attacks affecting client data or services, data breaches involving client information, significant service disruptions to critical infrastructure clients, security incidents affecting multiple client environments simultaneously, and RMM tool compromises that create pathways into client environments. The runbook we develop defines these classification criteria operationally, not just theoretically.

MSPs must conduct documented security due diligence on sub-contractors and technology suppliers, ensure contractual security obligations flow down to sub-contractors through right-to-audit clauses, monitor sub-contractor security posture on an ongoing basis, and notify clients of sub-contractor changes that could impact security. If you white-label a SOC service or resell a third-party RMM platform, the regulatory liability for that service sits with your MSP under the Bill. The ICO will not accept that you trusted a supplier you have worked with for years as a defence under a regulatory investigation.

Non-compliance can result in: regulatory fines (up to £10 million or 2% of turnover, whichever is higher), mandatory improvement notices from the ICO, client contract terminations (particularly from regulated sector clients who will audit supplier compliance), loss of critical infrastructure clients who require RMSP compliance as a contractual condition, and reputational damage that affects tender responses. The more immediate commercial risk for most MSPs is the client demand letter: a procurement team at an NHS trust or financial services firm requiring written confirmation of Bill compliance. That is the scenario that produces phone calls to us.