Explainers & Guides

Supply Chain Security In the Upcoming UK Cyber Security and Resilience Bill

Discover how the upcoming UK Cyber Security and Resilience Bill will introduce robust new duties on critical suppliers, expand regulatory oversight, and future-proof the UK's critical national infrastructure.

Supply Chain Security In the Upcoming UK Cyber Security and Resilience BillSupply Chain Security In the Upcoming UK Cyber Security and Resilience Bill

Cyber threats, particularly those targeting supply chains, are an ever-increasing problem for critical services in the United Kingdom and beyond. Between 2021 and 2023, supply chain attacks surged by 431%, with projections indicating continued growth through 2025, underscoring the urgency of robust third-party risk management and stepped up efforts by organisations to harden their supply chain security, especially with regard to our Critical National Infrastructure (CNI).

Given this concerning increase in attacks, governments are striving to enhance their national cyber security regulatory frameworks, with the UK set to introduce a new Cyber Security and Resilience Bill this year.

Here, we examine the Bill’s objectives, its evolution from existing legislation, and some of the targeted measures that are being discussed to specifically address the challenge of securing the often vast supply chains of our CNI, offering a comprehensive analysis of its likely implications for operators of UK critical infrastructure.

What is the UK Cyber Security and Resilience Bill?

The Department for Science, Innovation and Technology (DSIT), on 1 April 2025, published a policy paper statement, setting out some of the details and proposed measures of the upcoming Bill.   

The Bill’s overall aim is simple: to improve the UK’s readiness to protect key sectors and the critical digital services they rely on against escalating cyber threats. The Bill is said to update the Network and Information Systems (NIS) Regulations 2018, which is no longer considered adequate to effectively address the scale of the threat. The 2025 Bill is being introduced to expand the remit of current regulations to cover a broader range of digital services and supply chains, particularly those supporting critical national infrastructure (CNI) such as energy, water, transport, healthcare, and digital infrastructure. It is widely regarded as the UK’s response to the EU’s introduction of NIS2, which also focused on:

  • Broadening the range of sectors covered under the framework.
  • Introducing stricter incident reporting.
  • Strengthening regulatory powers for oversight and policy enforcement. 

The UK Cyber Security and Resilience Bill, however, also takes into consideration UK-specific cyber security challenges (such as state-sponsored attacks and legacy infrastructure in sectors such as water and energy) and will be designed to allow for delegated powers, enabling the regulatory framework to be updated swiftly in response to new technologies and threats without the need for lengthy primary legislation processes.

The Bill also proposes that the Information Commissioner’s Office (ICO) serves as a key competent authority. This means they will oversee compliance for relevant digital service providers (RDSPs) and managed service providers, most likely including data centres.  

Currently responsible for upholding information rights and ensuring cyber security compliance, this extended role of the ICO goes towards ensuring that entities involved in providing essential systems and services also meet the new standards that will be set out by the Bill. 

What are the key differences from existing legislation?

The Cyber Security and Resilience Bill significantly expands the scope and rigor of the NIS Regulations 2018. 

While the NIS Regulations focused on operators of essential services (OES) in sectors like energy, transport, and health, and RDSPs such as cloud providers, the new Bill expands its coverage to include data centres, MSPs, and other critical suppliers. 

A further development of the Bill is its emphasis on far stricter incident reporting requirements, mandating a two-stage process: 

  1. An initial notification to regulators and the National Cyber Security Centre (NCSC) within 24 hours of a significant incident
  2. Followed by a full report within 72 hours. 

Incident focus is another key difference. Unlike the NIS Regulations, which focused on incidents disrupting service continuity, the Bill will also cover incidents affecting system and data confidentiality, integrity, or availability.

Furthermore, regulators will gain enhanced powers, including cost recovery mechanisms through fees on regulated entities and the ability to proactively investigate vulnerabilities and designate certain suppliers as ‘designated critical suppliers’, with obligations similar to those of operators of essential services. These measures contrast with the NIS Regulations’ approach, enabling a more dynamic response to emerging threats. 

The Bill also empowers the Secretary of State to update regulations via secondary legislation, ensuring adaptability without requiring new Acts of Parliament - an essential step towards the flexibility required for the government to keep up with the evolving threat landscape. 

The Bill’s focus on supply chain security

In the past 2 years alone, there have been several key examples in the UK of how vulnerable critical entities’ supply chains are to modern cyber threats:

  • 2023 MOVEit Attack: Corporate giants such as the BBC, British Airways, and Boots were impacted by the attack via a payroll provider that was using MOVEit Transfer, leading to exfiltration of employee data and showing how a security breach at one vendor can have cascading effects throughout the wider supply chain ecosystem, well beyond immediate clients and third-parties of the affected supplier.
  • 2023–2024 MoD Payroll Breach: Suspected Chinese hackers targeted a third-party payroll provider, exposing names, bank details, and addresses of 270,000 Ministry of Defence personnel, revealing how supply chain risks can also have national security implications.
  • 2024 NHS Synnovis Attack: Qilin ransomware targeted an NHS supplier, Synnovis, halting London hospital services and canceling thousands of appointments.

In an effort to prevent future attacks of this nature, the Bill plans the following:

NCSC’s CAF profiles as the gold standard

The Bill is set to establish the National Cyber Security Centre’s Cyber Assessment Framework (CAF) as the benchmark for expected security standards. Its Basic and Enhanced Profiles will serve as guidance for OES, RDSPs, and DCS suppliers, covering governance, risk management, and incident recovery. With CAF as a cyber security blueprint, tools like the Cyber Resilience Audit scheme and Cyber Essentials will provide additional verification.

Tougher duties for OES and RDSPs

The Bill introduces strict supply chain responsibilities for operators of essential services (OES) and relevant digital service providers (RDSPs). These obligations will be codified in secondary legislation, informed by stakeholder consultations. The goal is to prevent incidents at suppliers disrupting vital services (such as the NHS outages caused by the Synnovis ransomware attack). 

Designated Critical Suppliers (DCS)

A key feature of the Bill is the power to designate high-impact vendors as Designated Critical Suppliers (DCS), placing them under the same stringent obligations as OES and RDSPs. Regulators will target suppliers whose disruption could cripple essential services or digital infrastructure—for instance, the payroll breach that impacted the Ministry of Defence. To be designated as a DCS, a supplier must:

  • Support an OES or RDSP and rely on network and information systems.

  • Pose a significant disruption risk if their systems fail.

  • Not already be regulated under frameworks like the Telecommunications (Security) Act 2021.

Once designated, DCS entities must meet strict security requirements and report incidents, ensuring even smaller vendors uphold high standards. The designation will remain selective to maintain a focused, high-impact approach.

Enhanced incident reporting

To improve threat response, the Bill enforces a two-stage incident reporting process. Critical suppliers must alert regulators and the NCSC within 24 hours of a major issue, followed by a comprehensive report within 72 hours. This system, prompted by delays during the Synnovis attack, increases visibility and accelerates containment. Digital service providers and data centres must also notify affected customers, building transparency and trust across the board.

Next Steps

The Bill is expected to be introduced to Parliament in 2025, but the implementation of the Bill will also depend on secondary legislation to define the specifics—such as supply chain duties and criteria for designating critical suppliers. 

According to the DSIT policy statement, the legislation will go through consultation, allowing input from regulators, cyber security experts, and industry stakeholders. While no exact dates have been confirmed, consultations are expected to begin after the Bill is introduced in 2025, with drafts likely developed and refined throughout 2026.

What Will Happen Next?

The government has committed to further engagement, building on prior consultations from 2022 and 2023. DSIT has already received inquiries from organisations eager to contribute, showing strong industry interest. As part of the rollout, the Secretary of State will publish a Statement of Strategic Priorities—updated every three to five years—to steer regulators and sectors. The first version is expected to be released during the Bill’s progression through Parliament.

How Should Organisations Prepare?

Public sector bodies and businesses, especially OES should begin assessing their supply chain security posture, aligning their systems with NCSC’s Cyber Assessment Framework (CAF), and updating incident response plans to meet upcoming reporting obligations. Regulators will publish additional guidance as the secondary legislation takes shape, clarifying what compliance will look like in practice.

Conclusions

The Cyber Security and Resilience Bill represents a significant legislative update aimed at strengthening the nation’s cyber defences and increasing resilience across the UK’s critical infrastructure.

The increased oversight of the Bill - to include data centres, managed service providers, and other high-risk suppliers - complements stronger incident reporting rules and tighter control over supply chains. 

The new regime will create strong incentives for both regulators and regulated entities to maintain effective oversight of supply chain risk, aiming to reduce the likelihood and impact of supply chain attacks on CNI.

In summary, the Bill can be expected to fundamentally strengthen supply chain cyber security for UK CNI by imposing clear, enforceable duties on both operators and their most critical suppliers, expanding regulatory oversight, and enabling rapid adaptation to new threats. This marks a shift from reactive to proactive risk management, with a focus on the interconnected digital landscape and the importance of supply chain resilience.

Explainers & Guides

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Explainers & Guides

Download for free

Download

More articles

No items found.
Pattern Trapezoid Mesh

Join our growing community

Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.