Critical Supply Chain Security Rules
The Bill requires you to identify your designated critical suppliers, assess their security controls, and hold them to contractual notification timelines, or face penalties of up to £10 million. Most organisations do not know which suppliers qualify as critical, or whether their existing assessments meet the Bill's specific requirements. We map, classify, and assess your supply chain so you have a defensible compliance position before your regulator asks.
Managing suppliers or been designated?
The Bill creates obligations on both sides. Whether you manage a critical supplier estate or you have received a designation letter, Precursor builds the evidence package your regulator or client requires.
Managing Your Critical Supplier Estate
The Bill requires you to identify which suppliers are designated critical, conduct documented assessments, impose contractual notification timelines, and maintain ongoing monitoring. We build the programme your regulator expects.
- Written classification register with rationale
- 87-question vendor security questionnaire
- Contractual clause review (24/72-hr notification)
- Quarterly scorecard monitoring programme
- Evidence-grade documentation for audit
You Have Received a Designation Letter
Being classified as a DCS means your clients can impose security requirements that go beyond standard terms. Before you agree to everything in their questionnaire, understand what the Bill actually obliges you to do.
What the Bill requires
- +Proportionate security controls
- +24/72-hour incident notification
- +Right-to-audit acceptance
- +Subcontractor management
Common client additions beyond the Bill
- -Mandatory ISO 27001 within 6 months
- -Annual pentest as contractual condition
- -Notification of all near-misses
- -Source code escrow
Third-Party Risk Assessment Under the UK Cyber Resilience Bill
A structured programme covering supply chain mapping, risk classification, vendor assessment, contractual security, and ongoing monitoring. Each phase produces evidence-grade documentation for regulatory audit.
Third-Party Risk Assessment
Structured assessment of your critical and designated critical suppliers using a questionnaire framework aligned to ISO 27001:2022 Annex A.5.19-A.5.23, NCSC Supply Chain Security Principles, and the Bill's specific due diligence requirements. We assess inherent risk versus residual risk, verify certifications (ISO 27001, Cyber Essentials Plus, SOC 2 Type II), review incident response capabilities, and produce a scored supplier risk register with documented risk acceptance decisions that withstand regulatory audit.
Supply Chain Mapping and Classification
Complete inventory and classification of your third-party supplier estate, mapping every supplier by service criticality, data access level, and operational dependency. We apply the Bill's designation criteria, including the small and micro enterprise exception and when it does not apply, to produce a written classification register that documents why each supplier is or is not critical. This register is the primary evidence artefact your regulator will request.
87-Question Vendor Security Questionnaire
Design and deployment of an 87-question vendor security questionnaire covering eleven ISO 27001 control domains, NCSC Supply Chain Security Principles, and the Bill's specific requirements, including 24-hour incident notification capability, subcontractor management, and right-to-audit acceptance. We manage supplier distribution, chase non-responses, review returned questionnaires, and document risk ratings with compensating controls where gaps are identified.
Contractual Security Requirements
Review and amendment of supplier contracts to include the mandatory security provisions the Bill requires you to impose: 24-hour initial notification, 72-hour full report, right to conduct or commission security audits, cascading obligations to subcontractors with access to your data, minimum security certification requirements, and breach liability provisions. We distinguish between what the Bill mandates you include and what is commercially advisable to add.
Continuous Supplier Monitoring Programme
Post-assessment monitoring programme for your designated critical supplier estate: quarterly scorecard reviews tracking control maturity, automated alerts for publicly disclosed supplier incidents (data breaches, vulnerabilities, regulatory actions), immediate reassessment trigger on any supplier security event, and annual full reassessment with updated risk register. The monitoring programme produces the ongoing evidence of supplier oversight that the Bill requires, not just a point-in-time assessment that goes stale within months. Per-supplier monitoring from £500/year.
What your regulator will ask for.
All deliverables are formatted for regulatory presentation. Evidence packs are provided in both PDF and editable formats for ongoing programme maintenance.
Engagement Workflow
Structured to minimise operational friction and maximise the value of the testing window.
Supply Chain Inventory
A structured workshop-led exercise to catalogue your complete third-party supplier estate, including shadow IT and undocumented dependencies. We distinguish between direct suppliers, subcontractors, and Nth-party relationships that may carry inherited risk. Output: a complete supplier register with enough data to apply the Bill's classification criteria. Typical duration: three to five days for organisations with up to 50 suppliers.
Risk Classification
Application of the Bill's classification criteria to each supplier in the register: service criticality to your operations, sensitivity of data processed, potential impact of supplier failure or compromise on your ability to deliver services, and whether the small and micro enterprise exemption applies (and whether the Bill's override provision is triggered). Output: a written classification report with designation decisions documented, rationale recorded, and a prioritised assessment queue for Step 03. This document is the evidence your regulator will ask for first.
Security Assessment Programme
Tiered assessment of classified suppliers, scaled to their risk designation: critical suppliers receive the full 87-question questionnaire plus documentation review and where warranted, on-site or remote audit; important suppliers receive an abbreviated questionnaire with annual review; lower-risk suppliers are monitored via certification status. We verify questionnaire responses against supplied evidence (ISO 27001 certificates, Cyber Essentials Plus assessments, SOC 2 Type II reports, penetration test summaries) rather than accepting self-attestation. Output: risk-rated supplier assessments with identified gaps, compensating controls, and risk acceptance documentation.
Ongoing Monitoring
Establishment of a repeatable monitoring programme: quarterly security scorecard reviews for critical suppliers, annual full reassessment, and an incident response protocol for supplier security events. We help you build the internal capability to run the programme yourselves, or we run it for you under a retained advisory arrangement. Output: a monitoring framework with defined review triggers, scorecard templates, reassessment criteria, and a quarterly evidence log suitable for regulatory audit.
Know the cost before you commit.
All supply chain programmes are fixed-price after an initial scoping call. No day-rate ambiguity.
Inventory and Classification
10-25 critical suppliers
From £6,000
Comprehensive TPRM Programme
25-50 suppliers
From £12,000
Enterprise Programme
50+ suppliers
From £25,000
DCS Readiness Assessment
For designated suppliers
From £4,500
Tell us your supplier count and sector. We confirm scope and price within 24 hours.
Get a Fixed-Price ScopeTest What the Assessment Finds. Close the Loop.
Your supply chain assessment identifies which suppliers need tighter controls. Precursor delivers the verification: penetration testing of vendor environments, ISO 27001 consultancy to close the gap between existing certification and the Bill's requirements, and incident response retainers supporting your 24-hour notification obligations.
Explore Related ServicesPenetration Testing
Verify vendor security controls go beyond questionnaire self-attestation.
ISO 27001 Consultancy
Close the gap between existing certification and the Bill's supply chain requirements.
Incident Response Retainer
Supporting your 24-hour notification obligations with a dedicated response team.
MSP Requirements
Supply chain security obligations specific to managed service providers.
Full Penetration Testing Catalogue
Comprehensive penetration testing services tailored to your environment.
Internal Testing
Post-perimeter assessments targeting Active Directory, lateral movement, privilege escalation, and segmentation validation from inside your network.
How many suppliers are in your critical estate?
Tell us your supplier count and sector. We determine which suppliers are likely designated critical under the Bill, quantify the assessment programme scope, and provide a fixed-price quote within 24 hours. No obligation. No day-rate surprises.
Get a Fixed-Price ScopeSupply Chain Compliance: Common Questions
Designated critical suppliers, third-party risk assessment, vendor questionnaires, contractual obligations, and programme pricing.
Supply chain security assessment services for the UK Cyber Resilience Bill are priced by supplier volume and programme scope: Supply chain inventory and risk classification (10-25 critical suppliers): £6,000-£10,000. Comprehensive TPRM programme with questionnaires and contractual review (25-50 suppliers): £12,000-£20,000. Full enterprise supply chain security programme with continuous monitoring (50+ suppliers): £25,000-£35,000+. Ongoing per-supplier monitoring: from £500/supplier/year. DCS readiness assessment (for suppliers who have received designation from a client): from £4,500. All engagements are fixed-price. We provide a confirmed scope and price within 24 hours of receiving your supplier count and sector.
Annual questionnaires satisfy the spirit of supplier oversight but rarely survive regulatory scrutiny. The specific gaps we find consistently in existing programmes: (1) no written classification methodology distinguishing critical from important suppliers using the Bill's criteria, (2) questionnaire responses accepted at face value with no verification, (3) contracts that mention security obligations but do not specify notification timelines, audit rights, or subcontractor requirements, and (4) no documented process for what happens when a supplier's posture deteriorates between reviews. We build those missing components into your existing programme rather than replacing it.
The UK Cyber Security and Resilience Bill requires operators of essential services (OES) and relevant digital service providers (RDSP) to: identify which suppliers qualify as designated critical suppliers (DCS) under the Bill's classification criteria; conduct documented security assessments of those suppliers aligned to the NCSC 12 Supply Chain Security Principles and ISO 27001:2022 Annex A.5.19-A.5.23; impose contractual incident notification obligations (24-hour initial notification, 72-hour full incident report); establish right-to-audit clauses and cascading obligations to subcontractors; and monitor supplier security posture on an ongoing basis. Penalties for non-compliance reach up to £10 million or 2% of global annual turnover for most violations, with higher tiers for the most serious failures.
The Bill uses the term designated critical supplier (DCS) for third parties whose compromise or failure would have a significant impact on your ability to deliver essential services. Classification depends on four criteria: (1) service criticality to your operations, (2) sensitivity of data the supplier processes, (3) potential impact of supplier failure or breach, and (4) the degree of operational dependency. Managed service providers (MSPs) with administrative access, cloud infrastructure providers, critical SaaS platforms, payment processors, and suppliers with access to sensitive customer or operational data are typically in scope. Crucially, the Bill includes a provision that the small and micro enterprise exemption does not apply where the supplier's service is genuinely critical, regardless of the supplier's headcount or turnover.
A Bill-compliant vendor security questionnaire should cover eleven control domains: (1) information security governance and accountability, (2) access control and privileged access management, (3) network security and segmentation, (4) data handling and encryption, (5) incident detection and response capabilities, (6) incident notification procedures and 24/72-hour reporting capability, (7) vulnerability management and patch timelines, (8) business continuity and disaster recovery, (9) physical and environmental security, (10) subcontractor and supply chain management (cascading obligations), and (11) security certifications held (ISO 27001, Cyber Essentials Plus, SOC 2 Type II). Questionnaires should also ask suppliers to provide their Statement of Applicability if ISO 27001 certified, and to identify subcontractors who have access to your data or systems.
The Bill does not prescribe a single assessment methodology, but the NCSC's 12 Supply Chain Security Principles provide the closest thing to an official framework. A defensible third-party risk assessment under the Bill requires four components: (1) a written classification methodology identifying which suppliers qualify as designated critical suppliers under the Bill's definitions; (2) a security assessment conducted through questionnaires aligned to ISO 27001:2022 controls (Annex A.5.19-A.5.23) and verified where possible through documentation review or on-site audit; (3) contractual review to confirm mandatory incident notification timelines (24-hour initial, 72-hour full report) and right-to-audit clauses are in place; and (4) a documented process for ongoing monitoring and reassessment. The assessment must produce evidence-grade documentation capable of withstanding scrutiny from your competent authority.
Directly, the Bill's primary obligations apply to operators of essential services (OES) and relevant digital service providers (RDSP), not to their suppliers. However, the Bill creates cascading obligations: OES and RDSP organisations must impose contractual security requirements on their designated critical suppliers, including incident notification timelines, audit rights, and minimum security standards. If a client has notified you that you are classified as one of their designated critical suppliers, those obligations are contractual rather than directly regulatory. You are complying with your client's contractual requirements (which the Bill mandates they impose), not with the Bill itself. The distinction matters when you receive a questionnaire that appears to go beyond the Bill's actual requirements, which is common. Our DCS readiness assessment helps you understand exactly what you are required to do, and what your client may be adding on top of the statutory baseline.
Both frameworks extend security obligations through the supply chain, but they differ in scope and mechanism. EU NIS2 directly brings certain categories of suppliers in scope as important or essential entities in their own right, making them directly regulated. The UK Bill primarily creates cascading contractual obligations: the OES or RDSP organisation is responsible for ensuring its critical suppliers meet required standards, rather than regulators directly supervising those suppliers. The UK Bill also uses the designated critical supplier designation mechanism, which NIS2 does not. Organisations operating in both UK and EU jurisdictions should map requirements separately. Compliance with NIS2 does not automatically satisfy the UK Bill, and vice versa, because the classification criteria and documentation requirements differ.
ISO 27001:2022 Annex A.5.19-A.5.23 covers supplier relationships and is a good foundation. The Bill adds requirements that sit outside the standard: mandatory 24-hour incident notification clauses (ISO 27001 does not specify timeframes), cascading obligations to your suppliers' subcontractors (not standard ISO scope), and regulator-facing evidence documentation in specific formats. In practice, most ISO 27001 certified organisations need to close around four to six specific gaps to meet the Bill's supply chain provisions. We identify those gaps in a half-day workshop and give you a prioritised remediation roadmap, without re-doing your entire ISO programme.
The Bill requires ongoing monitoring, not annual point-in-time assessments. For designated critical suppliers, we recommend: quarterly scorecard reviews tracking control maturity and certification status; immediate reassessment triggered by any supplier security incident (data breach, ransomware, regulatory action, key personnel change); and annual full reassessment with updated risk register and classification review. For important but non-critical suppliers, annual questionnaire refresh with certification verification. The monitoring programme must produce a quarterly evidence log suitable for presentation to your competent authority.



