Precursor Security
UK Cyber Security and Resilience Bill 2025

Data Centre Security Obligations

The Bill introduces legally binding obligations for data centre operators: enhanced physical security controls, resilience standards, and a 24-hour notification clock from the moment any employee becomes aware of a significant incident. Whether you are above the 1MW threshold, host CNI workloads, or operate enterprise data centres on-premises: Precursor maps your obligations, closes your gaps, and prepares your evidence pack before Ofcom arrives. CREST-accredited. From £12,000.

NCSC CAF Gap Analysis
Physical Security Audit
Incident Runbooks
From £12,000 Fixed-Price
Scroll
Are You In Scope?

Three thresholds. One regulatory obligation set.

Scope is determined by rated IT load, not revenue. If you are unsure whether colocation customer load counts toward your threshold, the gap analysis exists for that.

Non-Enterprise
1MW

Rated IT Load Threshold

Non-enterprise data centres above 1MW rated IT load face the full obligation set as Operators of Essential Services.

Enterprise
10MW

Enterprise Aggregate

Enterprise operators measured across all sites on an aggregate basis. The threshold applies to total capacity, not per-facility.

Maximum Penalty
£17M

Or 4% Global Turnover

Ofcom may conduct on-site inspections without advance notice. Enforcement applies regardless of whether non-compliance caused an incident.

Who This
Covers
Head of IT / CISODC Ops ManagerGRC / Compliance LeadPhysical Security ManagerGeneral Counsel / DPO
Framework Gap Analysis

ISO 27001 and Uptime Institute Are Not Enough

Most certified facilities satisfy 60-70% of NCSC CAF requirements. The remaining 30% is where Ofcom will focus.

Requirement AreaISO 27001Uptime InstituteNCSC CAF (Bill)
Security Governance (CAF Obj. A) CoveredNot assessedMandatory: board-level accountability, risk management framework
Network Security (CAF Obj. B) CoveredNot assessedEnhanced: network segmentation, PAM, monitoring
Physical Security (CAF Obj. B)Partial CoveredEnhanced: EN 50600-2-5, anti-passback, PIDS, SIA guard force
Access Control (CAF Obj. B) CoveredPartialExtended: multi-factor with anti-tailgating and mantrap
Environmental ControlsPartial CoveredCovered with documented evidence for regulators
Power Resilience (N+1/2N)Not assessed CoveredMandatory: tested failover, 72-hour generator capacity
Monitoring and Detection (CAF Obj. C) CoveredNot assessedMandatory: SIEM, intrusion detection, event logging
24-Hour Incident NotificationNot assessedNot assessedMandatory: to Ofcom within 24 hours of first awareness
72-Hour Full Incident ReportNot assessedNot assessedMandatory: detailed report to Ofcom
Annual Security AuditPartialPartialMandatory: full CAF re-assessment annually
Regulatory Evidence PackNot assessedNot assessedMandatory: formatted for Ofcom/DSIT inspection

Based on NCSC CAF Indicators of Good Practice and published policy statement. Specific secondary legislation subject to Parliamentary confirmation.

Regulatory Timeline

When Do These Obligations Come Into Force?

The Bill's framework obligations are already clearly signalled. Secondary legislation will set the final technical requirements, but these will not change materially.

January 2026

Bill completed second reading in Parliament. Scope of obligations for data centre operators clearly established.

2026

Royal Assent expected. Core obligations including incident reporting, physical security, and resilience standards take legal effect.

2026 (post-Assent)

Secondary legislation consultation opens. DSIT and Ofcom publish detailed technical requirements and IGPs for each sector.

2026 to 2027

Phased enforcement commencement. Ofcom begins compliance assessments. Early compliance effort is rewarded.

Act now. Completing your gap analysis and beginning remediation before Royal Assent means your evidence pack is ready when enforcement begins, not when Ofcom contacts you.

Methodology

Data Centre Compliance Methodology:
Five Obligation Areas

Comprehensive security and resilience assessment aligned with the NCSC Cyber Assessment Framework and the UK Cyber Security and Resilience Bill's data centre obligations.

Physical Security

Physical Security Assessment Against NCSC CAF Objective B

Perimeter inspection, access control testing (card and PIN, biometric, mantrap anti-passback, tailgating resistance), CCTV coverage and retention policy review, visitor management procedures, SIA-licensed security guard force patrol records, and alignment with EN 50600-2-5 physical security requirements.

Resilience Testing

Resilience and Redundancy Testing (N+1 Power, Cooling, Network)

Power infrastructure validation (UPS capacity, generator switchover testing, fuel supply agreements), cooling redundancy assessment (N+1 or 2N configuration), network connectivity path diversity, and documented recovery time objectives. We validate that all redundancy systems function as designed under controlled failover conditions.

Environmental

Environmental Controls Audit: Fire, Temperature, Water Detection

Assessing fire suppression systems, temperature monitoring, humidity control, and water detection systems. We verify that environmental controls meet the Bill's resilience standards and are documented in a format Ofcom inspectors can review.

Incident Response

Incident Notification Runbooks: 24-Hour and 72-Hour Workflows

Building and testing incident reporting runbooks aligned with the Bill's notification requirements. We establish clear procedures for the 24-hour initial notification and 72-hour full report to Ofcom, resolving the "first awareness" ambiguity with role-specific escalation chains your NOC and legal team can follow at 2am. See our incident reporting guide for the full notification framework.

Continuous Compliance

Ongoing Compliance Monitoring and Annual Re-Assessment

Quarterly security posture reviews, annual NCSC CAF re-assessment, and continuous environmental monitoring. We ensure sustained compliance as the Bill's secondary legislation is finalised and enforcement commences.

Deliverables

What You Receive at Engagement Close

Gap Analysis Report

NCSC CAF Indicators of Good Practice mapping against your current controls

Prioritised Remediation Roadmap

Risk-ranked findings with time and cost estimates for each remediation

Evidence Pack

Formatted for regulatory review and Ofcom inspection, ready to produce immediately

Incident Notification Runbooks

Tested 24-hour and 72-hour workflows, not template documents

Compliance Letter

Written determination of your scope, obligations met, and outstanding items

Resilience Test Reports

Documented failover testing results for UPS, cooling, and network path diversity

All fixed-price. Scope and cost agreed in writing before work begins. Reports delivered via encrypted portal.

Engagement Pipeline

Engagement Workflow

Structured to minimise operational friction and maximise the value of the testing window.

Step 01

Gap Analysis and Scoping

Determining whether your data centre falls within scope by reviewing your rated IT load, customer profile, and service criticality against the Bill's definitions and DSIT's published guidance. You receive a written determination of your regulatory scope, the specific NCSC CAF objectives that apply, and a scoped fixed-price cost for the full assessment before any further commitment.

Step 02

Physical and Logical Security Audit

Comprehensive audit of physical security (access controls, CCTV, perimeter, mantrap anti-passback, SIA-licensed guard force) and logical security (network segmentation, privileged access management, monitoring systems aligned to NCSC CAF Objectives B and C).

Step 03

Resilience Testing

Controlled testing of failover systems: UPS and generator switchover, cooling backup activation, and network path failover. We validate N+1 redundancy configurations and document 72-hour generator capacity against the Bill's standards.

Step 04

Compliance Documentation and Evidence Pack

Preparing the full compliance evidence pack: NCSC CAF Indicators of Good Practice mapping, security policies, tested incident notification runbooks, and resilience test reports. The completed evidence pack is formatted to the structure Ofcom and DSIT inspectors expect. If you receive a regulatory enquiry, you can produce this pack immediately without emergency document preparation.

Fixed-Price Programmes

Know the cost before you commit.

All compliance programmes are fixed-price after an initial scoping call. No day-rate ambiguity.

Single-Site Facility

Existing security controls in place

CAF gap analysisPhysical security auditResilience testingEvidence pack
5-10 days on-site

From £12,000

Multi-Site / Colocation

CNI workloads hosted

Everything in Single-SiteMulti-facility coordinationCustomer class segmentation
10-20 days total

From £20,000

Large Colocation Provider

Complex regulatory profile

Full compliance implementationOfcom engagement supportMulti-stakeholder coordination
15-30 days total

From £35,000

Annual Re-Assessment

All facility types

Quarterly posture reviewsAnnual CAF re-assessmentRegulatory update briefings
Ongoing

From £6,000/yr

Fixed pricing after scoping call. Scope and cost confirmed in writing.

Get a Fixed-Price Scope
Data Centre Services

Beyond the Audit. Continuous Protection.

Your data centre compliance programme identifies what needs fixing. Precursor delivers the ongoing security capabilities the Bill requires: 24/7 monitoring for CAF Objective C, penetration testing for CAF Objective B validation, and incident response retainers for your notification obligations.

Book a Scoping Call
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Free Scoping Call

Ofcom won't call ahead. Will your evidence pack be ready?

Book a free scoping call: we determine whether your facility is in scope, quantify the gap between your current controls and NCSC CAF requirements, and provide a fixed-price programme quote. No obligation. No day-rate surprises.

Get a Fixed-Price Scope
CREST Accredited
NCSC CAF Aligned
Fixed Pricing
From £12,000

Data Centre Compliance: Common Questions

Scope thresholds, NCSC CAF framework, pricing, physical security controls, and incident reporting obligations.

The UK Cyber Security and Resilience Bill imposes obligations on data centre operators across four areas: enhanced physical security controls (perimeter, access control, CCTV, visitor management aligned to NCSC CAF Objective B), resilience and redundancy standards (N+1 power and cooling, 72-hour generator capacity, tested failover), mandatory incident notification to Ofcom within 24 hours (significant incidents) or 72 hours (major incidents), and annual security audits against the NCSC Cyber Assessment Framework. Data centres above 1MW rated IT load (non-enterprise operators) or 10MW (enterprise operators) face the full obligation set.

Data centre security compliance assessments start from £12,000 on a fixed-price basis agreed before work begins. Single-site facilities with existing security controls typically fall in the £12,000 to £18,000 range for gap analysis, physical security audit, resilience testing, and a complete NCSC CAF evidence pack. Multi-site operators or colocation providers hosting CNI workloads typically require £20,000 to £35,000. Large colocation providers with multiple customer classes and complex regulatory profiles typically invest £35,000 to £40,000 or more. Annual re-assessment is available from £6,000 per year. All engagements are fixed-price with the scope and cost confirmed in writing before any work commences.

Scope is determined primarily by rated IT load and the nature of services hosted. Data centres above 1MW rated IT load (for non-enterprise operators) or 10MW (for enterprise operators measured on an enterprise basis across all sites) face the full obligation set as Operators of Essential Services under the Bill. The question of whether colocation customers' load counts toward your threshold is among the most common scoping ambiguities. The gap analysis and scoping stage (Step 01) exists precisely for this: you receive a written determination with supporting rationale, not a verbal opinion. If you are not in scope, we tell you that and the engagement ends.

The NCSC Cyber Assessment Framework (CAF) is the primary compliance framework for Operators of Essential Services under the UK Cyber Security and Resilience Bill. It organises security requirements into four objectives: (A) Managing Security Risk, (B) Protecting Against Cyber Attack, (C) Detecting Cyber Security Events, and (D) Minimising the Impact of Cyber Security Incidents. For data centres, each objective maps to specific operational requirements: Objective A covers security governance; Objective B covers network security, access control, and physical security controls including EN 50600-2-5; Objective C covers monitoring and intrusion detection; Objective D covers incident response and the mandatory Ofcom notification procedures. The CAF uses Indicators of Good Practice (IGPs) to assess compliance. These are observable, evidenceable behaviours rather than binary pass or fail checks. ISO 27001 and Uptime Institute certification address different, partially overlapping frameworks. Most certified facilities find they satisfy 60 to 70 percent of CAF requirements; the remainder requires additional documentation and incident reporting procedures.

A data centre security audit under the Cyber Resilience Bill framework covers four areas conducted across a defined period (typically 5 to 10 working days on-site plus documentation review). Physical security assessment: perimeter inspection, access control testing (card and PIN, biometric, mantrap anti-passback, tailgating resistance), CCTV coverage and retention policy review, visitor management, SIA-licensed guard force review, and EN 50600-2-5 alignment. Resilience and redundancy review: UPS capacity validation, generator switchover testing, fuel supply agreements, cooling N+1 configuration, network path diversity, and documented recovery time objectives. Logical security review: network segmentation architecture, privileged access management, monitoring and alerting, patch management, and security event logging aligned to CAF Objective C. Incident reporting readiness: incident classification procedures, notification runbook completeness, tabletop exercise with your NOC and legal team, and regulatory engagement protocol documentation. You receive a written report mapping findings to NCSC CAF Indicators of Good Practice, a prioritised remediation roadmap, and an evidence pack formatted for regulatory review.

ISO 27001 and Uptime Institute address different frameworks than the NCSC Cyber Assessment Framework. Neither maps directly to the CAF's four objectives. Your existing certifications significantly reduce the audit effort: we spend time identifying gaps rather than documenting controls you have already evidenced. Most certified facilities find they are 60 to 70 percent of the way there. The remaining 30 percent is typically incident reporting procedures with the 24-hour and 72-hour Ofcom notification workflows, CAF Indicator of Good Practice documentation formatted for regulatory review, and in some cases additional physical controls such as anti-passback enforcement or PIDS. We map your existing ISO 27001 Annex A controls to CAF objectives and identify the specific gaps rather than duplicating work you have already completed. See also our ISO 27001 consultancy service for organisations managing both frameworks.

Under the Bill, significant incidents must be notified to Ofcom as the competent authority within 24 hours of first awareness, with a full report within 72 hours. The phrase 'first awareness' is operationally significant: the 24-hour clock starts from the moment any employee becomes aware of a qualifying event, not from when the CISO is briefed. Qualifying incidents include significant service outages affecting critical services (typically defined as outages exceeding four hours), security breaches involving customer data, physical security incidents involving unauthorised access, and environmental failures with potential operational impact. Our incident notification runbooks resolve the 'first awareness' ambiguity with role-specific escalation chains your NOC team can follow at 2am on a Sunday, linking to our supply chain incident reporting guide for events with third-party involvement.

Non-compliance with the UK Cyber Security and Resilience Bill can result in: financial penalties up to £17 million or 4% of global annual turnover (whichever is higher) for serious violations including failure to implement appropriate security measures, failure to report significant incidents within required timelines, or failing to cooperate with regulatory investigations; improvement notices requiring specific remediation within set timeframes; mandatory public disclosure of enforcement action; and in extreme cases, criminal sanctions for directors who knowingly permit non-compliance. Ofcom also has broad investigatory powers including on-site inspections without advance notice, document production orders, and staff interviews. These enforcement powers apply regardless of whether non-compliance caused an actual security incident.

The Bill, read alongside NCSC CAF Objective B and EN 50600-2-5, requires data centres to implement: perimeter security (fencing, barriers, hostile vehicle mitigation where appropriate), multi-factor access control systems with anti-passback and tailgating prevention, 24/7 CCTV monitoring with defined retention periods, formal visitor management procedures with escorted access for non-authorised personnel, and where criticality warrants, SIA-licensed security guard force with documented patrol records. Physical security must be assessed annually and the assessment documented as part of the CAF evidence pack.

The Bill requires annual security audits for data centres in scope as Operators of Essential Services. Audits must cover physical security controls, logical access controls, resilience testing, incident response procedures including notification runbooks, and environmental systems. As the secondary legislation is finalised post-Royal Assent, specific audit cadence requirements for different facility classes will be confirmed. We recommend completing the initial gap analysis and compliance programme now: the framework obligations are already clearly signalled and will not change materially, and organisations demonstrating early good-faith compliance effort are better positioned in the event of early regulatory contact.