Policy paper

Cyber security and resilience policy statement

Updated 9 April 2025

Mae fersiwn amgen o’r mesurau hyn ar gael yn Gymraeg.
An alternative version of these measures is available in Welsh.

Presented to Parliament by the Secretary of State for Science, Innovation and Technology by Command of His Majesty

April 2025

CP 1299

ISBN 978-1-5286-5588-0

© Crown copyright 2025

Ministerial foreword

The first duty of this government is to keep its citizens safe. To anticipate the threats we face, minimise the risks we take, and make the UK as safe and secure as it can possibly be. That is what making National Security our number one priority means in practice. 

The digital revolution is transforming our Critical National Infrastructure and our essential public services. It offers an extraordinary opportunity – to make our people and our country better off. However, it may also bring new and dangerous vulnerabilities.

In an increasingly dangerous and unstable world, we will not hesitate to protect our people from those who seek to do us harm. For too long, successive governments have failed to properly address the growing risk posed by cyber criminals and hostile states. Last year’s cyber-attack on a supplier to NHS hospitals in London caused more than 11,000 acute outpatient appointments and elective procedures to be postponed. Some of those people will have waited months to be seen.

I will not allow this to continue. We must take decisive action to deliver effective and enduring change. That is why, within weeks of entering government, I announced plans for a Cyber Security and Resilience Bill. In this Policy Statement, I set out legislative proposals for this Bill. I also acknowledge that the cyber landscape moves exponentially – a lot can happen in a short space of time. This statement proposes several additional measures to tackle the threats that we are facing now.

Our legislative proposals reflect the insights we have gathered from our international partners, including valuable lessons from the European Union on the implementation of its NIS2 regime. They are also informed by consultations conducted by the previous Government in 2022 and 2023.

However, it is vital that we also recognise the unique threats that the UK faces now and the threats that we cannot yet predict in the decades to come. At the same time, we must ensure that regulation works for businesses and investors, today and tomorrow.

At the core of our proposals is this government’s number one mission: economic growth. Growth is the only route to creating new jobs and putting more money in working people’s pockets. But there is no growth without stability. By securing the digital infrastructure upon which a growing number of our businesses depend, we can deliver the stability they need to innovate and invest.

Every business I have spoken to has said the same thing: we need agile, pro-innovation regulation that is designed for the digital world we live in. Change has never been needed more.

Together, we can grow our economy, rebuild our public services, and deliver a more secure, resilient and prosperous digital future for Britain.

The Rt Hon Peter Kyle MP
Secretary of State for Department for Science, Innovation and Technology

Strategic context

We are facing unprecedented threats to our critical national infrastructure, posing a risk to UK citizens.

Hostile cyber activity in the UK has grown more intense, frequent, and sophisticated, with real world impacts for UK citizens. Last year, a ransomware attack on the NHS led to over 11,000 postponed outpatient appointments and procedures. The 2024 Cyber Breaches Survey also reveals the significant scale of the challenge we face, with half of businesses reporting some form of cyber security breach or attack in the past twelve months.

The National Cyber Security Centre’s Annual Review 2024 (NCSC) describes the threat landscape as ‘diffuse and dangerous’, with persistent attacks from hostile states and organised crime. This poses a threat to our national security. Chinese state sponsored threat actors have already targeted US critical sectors (e.g., Volt Typhoon) and Russia has launched destructive attacks against the Ukrainian government. High profile attacks in the UK have affected local and central government, such as the compromise of the Ministry of Defence’s payment network, and attacks on essential providers, like Southern Water, and on the Leicester City Council and St Helens Borough Council, demonstrate a real risk to both our national and economic security and that of our allies.

Richard Horne, NCSC, Chief Executive Officer (CEO), in a speech to launch the NCSC Annual Review, spoke about the severity of the risk facing the UK as being widely underestimated and the defence and resilience of Critical Network Infrastructure (CNI), supply chains, the public sector, and our wider economy needing to improve urgently.

Resilience is not improving at the rate necessary to keep pace with the threat and this can have serious real-world impacts. The government’s legislative plan for cyber security will address the vulnerabilities in our cyber defences to minimise the impact of attacks and improve the resilience of our critical infrastructure, services and digital economy.

Cyber criminals are constantly adapting and improving their strategies

Cyber criminals have continually exploited advances in technology to improve the effectiveness of their malicious activities. Our regulatory framework must keep pace and provide flexibility to respond to future threats as and when they emerge.

Adversaries are exploiting vulnerabilities in critical infrastructure and supply chains, using tools, such as artificial intelligence and commercial cyber capabilities, to enhance their espionage and disruptive activities.

Our growing dependency on technology has made supply chains particularly vulnerable, with ransomware and data extortion emerging as significant threats. Less than one tenth of operators of essential services feel confident in managing the risk from their wider supply chains (Network and Information Systems (NIS) 2018 Second Post Implementation Review). As these actors continue to evolve, the risk to supply chains remains a critical concern, necessitating heightened vigilance and robust cyber resilience measures.

Cyber security is a critical enabler of economic growth, fostering a stable environment for innovation and investment

This government is focused on kickstarting economic growth to improve the prosperity of our country and living standards of working people.

Secure and robust digital services create a stable and secure environment for businesses to thrive, attracting investment and encouraging the development of cutting-edge technologies. This stability not only enhances the competitiveness of individual companies but also drives overall economic progress by reducing downtime and operational disruptions.

Resilient cyber infrastructure is essential for encouraging innovation by providing a secure foundation upon which new ideas and technologies can be built, thereby maintaining the UK’s position at the forefront of global technological advancements.

Our legislative plan for cyber will increase the uptake of essential cyber defences. This will protect more entities from cyber attacks and fostering an environment in which investment and innovation can thrive.

The case for change

In the July 2024 King’s Speech, the government announced it will introduce a Cyber Security and Resilience Bill to strengthen the UK’s cyber defences and build the resilience of our essential services, infrastructure, and digital services.

This policy statement sets out more details for this Cyber Security and Resilience Bill’s measures, as announced in the King’s Speech.

The cyber landscape is consistently changing, with new evidence emerging daily. In recognition of this fact, this policy statement will also set out some additional measures that the government is considering for an appropriate legislative vehicle, which could be this Cyber Security and Resilience Bill.

Current regulatory framework

The UK defines its most important digital and physical infrastructure assets, systems (including information and operational technology), sites, personnel, and functions through the lens of Critical National Infrastructure (CNI). Last year, the government introduced the first new CNI sector in almost a decade when it designated data infrastructure, a first step in updating the UK’s resilience. However, maintaining the security of essential and digital services, including CNI, in a continually shifting threat and hazard landscape, is an ongoing challenge for the government as well as the public and private sector stakeholders responsible for managing and operating those services.

The Network and Information Systems (NIS) Regulations 2018 are the UK’s only cross sector cyber security legislation. They play an essential role in safeguarding the cyber and physical resilience of much of the UK’s CNI by placing security duties on the operators involved in the delivery of essential services.[footnote 1]

The 2018 Regulations cover five sectors (transport, energy, drinking water, health, and digital infrastructure) and some digital services (online marketplaces, online search engines, and cloud computing services). Twelve regulators (called “competent authorities” in the regulations) are responsible for enforcing the regulations. Our regulations need updating to keep pace with the threats faced by regulated entities and we need to take action to bring the UK in line with our counterparts.

A Cyber Security and Resilience Bill will address the specific cyber security challenges faced by the UK while aligning, where appropriate, with the approach taken in the EU NIS 2 directive. This strategic approach ensures we can be flexible and responsive to cyber threats in a proportionate way that balances the impact on business.

This Bill will make substantial improvements to this existing framework by bringing more entities into scope and putting regulators on a stronger footing so that they can carry out their important duties. The measures acknowledge the need for increased visibility over cyber threats, and the importance of simple and clear reporting requirements across different frameworks, including those under consultation by the Home Office to counter ransomware. The Bill will also allow the Government to act against emerging threats without the need for new primary legislation.

In recognition of the evolving threat landscape, this policy statement will outline several additional measures which will enable the government to respond decisively to imminent threats to national security. The additional measures recognise the new status of data centres as CNI and the need for government to set the strategic direction for the increasing variety of sectors in scope of the regulations. The government will decide the appropriate legislative vehicle for the additional measures in due course.

Cyber Security and Resilience Bill measures

As announced in the King’s Speech 2024:

1. Bringing more entities into scope of the regulatory framework

In the King’s Speech, we announced that we will use a Cyber Security and Resilience Bill to make crucial updates to the NIS Regulations 2018. We will do this by bringing more firms into scope, to better recognise the increasing reliance on digital services and the vulnerabilities posed by supply chains.

The evolving threat landscape and high-profile cyber attacks targeting essential services, as well as the growing dependency on cloud-based and other digital services, necessitates the inclusion of more entities within the regulatory framework.

Supply chains play a crucial role in the wider economy. The complexity of the digital landscape and the interconnectedness of supply chains means that vulnerabilities in one part can have cascading effects on our essential services. It is therefore imperative to recognise the importance of supply chains and develop appropriate measures to manage the risks they pose. Regulating this space will help ensure that all relevant entities adhere to robust cyber security practices, thereby safeguarding the economy and the services upon which society depends.

1.1 Bring Managed Service Providers into scope

1.1.1 Summary of intent

Managed service providers (MSPs) play a critical role in the UK economy by offering core IT services to businesses. These organisations have unprecedented access to clients’ IT systems, networks, infrastructure, and data. This makes them an attractive target for malicious actors and subject to cyber attacks, including those that resulted in impacts on clients. This has included the Cloud Hopper attack on MSPs and the attack on the Ministry of Defence’s personnel system. These highlight the vulnerabilities of MSPs and by extension, the critical services they support.

This measure will expand the remit of current regulations by bringing entities who provide managed services into the scope of the regulations. Placing duties on MSPs will enable us to protect a broader range of services from cyber attacks and build a better picture of the threats facing our essential services.

1.2.2 How the measure would work in practice

The Bill will define the managed services that will be brought into scope of legislation. The characteristics below reflect the services intended to be included. Exact wording will be subject to final drafting.

A managed service is a service which:

  1. is provided to another organisation (i.e., not in-house), and;
  2. relies on the use of network and information systems to deliver the service, and;
  3. relates to ongoing management support, active administration and/or monitoring of IT systems, IT infrastructure, applications, and/or IT networks, including for the purpose of activities relating to cyber security, and;
  4. involves a network connection and/or access to the customer’s network and information systems.

These firms[footnote 2] will be subject to the same duties as those placed on firms that provide digital services, referred to as ‘relevant digital service providers’ under the 2018 Regulations.[footnote 3] The Information Commissioner’s Office (ICO) will act as the regulator and have authority to regulate MSPs through information gathering, investigation and enforcement powers.

1.1.3 Impact

Expanding the scope of the regulations to include managed services will enhance the security of IT infrastructure and reduce the risks of cyber attack. This measure is estimated to secure a further 900-1100 MSPs.[footnote 4] While we expect this measure to have associated costs related to security improvements and compliance, these investments will position MSPs as trusted and reliable partners in the cyber security landscape.

1.2 Strengthening supply chain security and enabling regulators to designate ‘Critical Suppliers’

1.2.1 Summary of intent

Supply chains underpin the essential services and digital infrastructure that our economy and society rely on. A single supplier’s disruption can have far-reaching impacts on the delivery of essential or digital services. Currently, however, there is no targeted mechanism to address critical supply chain vulnerabilities under the 2018 Regulations.

The Bill will enable the government to set stronger supply chain duties for operators of essential services (OES) and relevant digital service providers (RDSP) in secondary legislation, subject to consultation. It will also introduce a power for regulators to identify and designate specific high-impact suppliers as ‘designated critical suppliers’ (DCS), bringing them under comparable obligations as OES and RDSP. This will also extend to certain small and micro RDSPs where they play a pivotal role in supporting essential services.

By embedding supply chain security requirements directly into our regulatory framework, we aim to enhance national cyber resilience and reduce the threat of significant disruptions to critical services if a regulated entity is impacted by an attack on their supply chain.

1.2.2 How the measure would work in practice

Supply Chain Duties for OES and RDSP

The Bill will empower the government to clarify, in secondary legislation, duties on OES and RDSP to manage supply chain cyber risks. These duties will be designed to ensure appropriate and proportionate measures are taken – such as contractual requirements, security checks, or continuity plans – to prevent vulnerabilities in suppliers from undermining essential or digital services.

Designation of Critical Suppliers

Regulators will be able to individually designate a supplier as a DCS if the supplier’s goods or services are so critical that disruption could cause a significant disruptive effect on the essential or digital service it supports. DCS are therefore expected to account for a very small number and percentage of those suppliers providing goods or services to OES and RDSP. Designation will bring such suppliers directly within scope of core security requirements and incident reporting obligations, ensuring consistent standards across the most critical tiers of the supply chain. The threshold criteria for designation are likely to be:

  • Supply of goods or services: The supplier provides goods or services (including digital services) to an OES (regulated by that regulator) or to an RDSP (in the case of the ICO).
  • Significant disruptive effect: The regulator judges that a failure or disruption in that supplier’s goods or services – or an incident affecting the supplier’s network and information systems – could have a significant disruptive effect on the provision of the essential or digital service.
  • Reliance on networks and information systems: The supplier’s goods or services depend on networks and information systems, making them relevant to the scope of the regulatory framework. This is intended to ensure that suppliers only fall within scope if their goods or services involve or rely upon technology (such as IT infrastructure or operational technology) that could be targeted or disrupted.
  • Not already regulated: The supplier is not subject to similar cyber resilience regulations elsewhere (e.g., under Part 2 of the Communications Act 2003, as amended by the Telecommunications (Security) Act 2021) or elsewhere under the 2018 Regulations.

Extending Regulation to Certain SME RDSPs

RDSPs

Currently, small and micro RDSPs are exempt from the 2018 Regulations. Under these proposals, regulators may designate a smaller RDSP as a critical supplier if it meets the designation criteria outlined above. This ensures proportionate regulation of high-risk suppliers, regardless of size.

Futureproofing and consultation

The Bill will provide flexibility to refine these duties and threshold criteria through secondary legislation, subject to appropriate consultation. This ensures requirements can be updated in line with technological changes, emerging threats, and lessons learned from implementation.

1.2.3 Impact

This new regime will create strong incentives for both regulators and regulated entities to ensure effective oversight of supply chain risk. By addressing supply chain vulnerabilities and ensuring that key suppliers meet appropriate security standards, we intend to reduce the risk of significant disruptions to essential and digital services, enhance national cyber resilience, and bolster trust in critical infrastructure.

We remain committed to minimising regulatory burden on small businesses and ensuring only a small number of critical SME RDSPs are eligible for designation under this measure. The narrow designation grounds we are proposing will ensure this.

2. Empowering regulators and enhancing oversight

We can only bolster the UK’s cyber security if our regulators are well-prepared to take on their new responsibilities and we as government have strong data on the cyber threat. That is why, in the King’s Speech, we committed to putting regulators on a stronger footing to ensure essential cyber safety measures are being implemented. We also committed to improved incident reporting to improve our understanding of the threats.

The measures outlined in this section are focused on ensuring that regulators have the right tools and the clarity of purpose to deliver on this government’s ambitions.

2.1 Technical and methodological security requirements

2.1.1 Summary of intent

The NCSC Cyber Assessment Framework (CAF) is a resource that supports OES and firms that provide digital services to manage and assess their cyber risks. CAF profiles support the development of target levels of cyber resilience within sectors and for organisations in respect of specified vital functions. Two of the types of CAF profile are the Basic Profile and the Enhanced Profile. These set out principles and objectives that organisations should meet to assess and manage their cyber security.

The government’s intent is to establish these principles and objectives on a firmer footing, making it essential for firms to follow best practice and easier for them to do so. This will ensure that firms can invest in cyber security with greater clarity on what is required and make it simpler for the regulators to oversee the requirements.

While expectations on technical standards and methods were put on a statutory footing in the 2018 Regulations, they only relate to digital services firms. This measure will update those requirements, bringing them into closer alignment with NIS2 as well as, where appropriate, allowing them to be extended to operators of essential services.

2.1.2 How the measure would work in practice

The Bill will provide the Secretary of State with powers to make regulations to update the existing requirements. The Secretary of State would be able to exercise these powers following consultation with appropriate bodies.

Further, this would provide the Secretary of State with powers to issue a code of practice setting out guidance on how the regulatory requirements should be satisfied. There are often more than one-way outcomes that can be achieved, so businesses and regulators benefit from additional clarity.

The measure will provide the Secretary of State with powers to tailor the requirements for each sector, as appropriate and proportionate.

2.1.3. Impact

This measure will enable the government to set clear expectations for firms that provide digital services and operate essential services in scope of the Bill, to ensure proportionate and up to date security requirements are in place, while providing a means to update these requirements in response to a changing threat landscape.

2.2 Improving incident reporting

2.2.1 Summary of intent

Reporting of significant cyber incidents provides regulators and NCSC with a better view of the evolving threat landscape, enabling timely assistance where necessary and improved resilience. Many significant events go unreported under the current framework, limiting the ability to identify and assess vulnerabilities.

The Bill will update and enhance the current incident reporting requirements for regulated entities by expanding the incident reporting criteria, updating incident reporting times, streamlining reporting, and enhancing transparency requirements for digital services and data centres. The government’s work on ransomware, currently under consultation (closing 8 April), will complement the Bill, and both DSIT and the Home Office will continue to collaborate to ensure that any future frameworks are aligned and do not create duplication. These proposals are intended to put regulators on a stronger footing to address emerging risks, helping to build our overall cyber resilience.

2.2.2 How the measure would work in practice

Expanding the incident reporting criteria

Under the current NIS regulations, for an incident to be reportable, it must have resulted in interruption to the continuity of the essential or digital service. This is too narrow in scope and many incidents of concern are not reported. The Bill will expand this to capture incidents that are capable of having a significant impact on the provision of the essential or digital service, and incidents that significantly affect the confidentiality, availability, and integrity of a system. This will include the compromise of data confidentiality, spyware attacks that use firms that provide digital services (including MSPs) as a vector to access other organisations, or other incidents significantly affecting the integrity of a system.

Updating incident reporting times

The Bill will introduce a two-stage reporting structure which will require regulated entities to notify their regulator and also inform NCSC of a significant incident no later than 24 hours after becoming aware of that incident, followed by an incident report within 72 hours. This initial notification will serve as an ‘early warning,’ bringing the incident to the attention of the regulator sooner than current practice. In practice, we intend for this procedure to be similar to, and no more onerous than, the equivalent requirements under the EU’s NIS2 Directive.

Streamlining reporting

Regulated entities will be required to report an incident to their regulator and also inform NCSC at the same time, ensuring that NCSC receives the same information as the regulator at the same time. This information will contribute to both the regulators’ and NCSC’s understanding of the threat landscape.

Enhancing transparency requirements

Firms that provide digital services and data centres that experience a significant incident will be required to alert customers who may be affected by that incident. This will encourage openness and accountability among the services in scope.

2.2.3 Impact

This measure is designed to increase the UK’s resilience to cyber attacks by ensuring regulators are promptly informed about incidents in their critical sectors. Transparency requirements will raise standards across service providers and customers will be better informed when the service they rely on could be affected or have a knock-on effect on their business. We are confident these changes will further strengthen the UK’s resilience to cyber threats, balancing the need for increased cyber security with the importance of managing costs effectively for regulated industry.

2.3 Improve the Information Commissioners Office’s information gathering powers

2.3.1 Summary of intent

The Information Commissioner’s Office (ICO) is the regulator for firms that provide digital services (Relevant Digital Service Providers (RDSPs)), regulating online marketplaces, search engines, cloud services and – once the Bill is implemented – managed services.

The intention is to support the ICO in their ability to proactively identify cyber risks and take appropriate steps to prevent imminent attacks. The increasing threat posed by vulnerabilities in digital services, with the services supplied at scale and across multiple sectors, means the ICO’s previous reactive approach is no longer deemed sufficient relative to the risks posed. The primary intent of this measure is to enhance the ICO’s capability to identify and mitigate cyber risks before they materialise, thus preventing attacks and strengthening the digital services sector against future threats.

2.3.2 How the measure would work in practice

The Bill will address the current challenges by providing the ICO with more information to enable it to identify the most critical firms that provide digital services. This will enable it to adopt a proactive, rather than reactive, approach to assessing the cyber security capabilities of digital services. The Bill will:

  • Enhance the ICO’s ability to gather information to assist them in determining the criticality of regulated digital services and their risk-based approach. This includes:

    • an expanded duty for firms that provide digital services to share information with the ICO on registration,
    • expanded criteria for ICO to use their existing current power to serve information notices on firms that provide digital services, and
    • appropriate information gateways for other entities, outside the scope of the NIS Regulations, to share information with the ICO
  • Introduce powers for ICO to enforce a failure to register with the ICO.

2.3.3 Impact

In adopting a more proactive supervisory approach for the most critical firms that provide digital services, the ICO will likely incur additional costs associated with the ongoing monitoring of these entities. These will include the cost of evidence collection, review, analysis, and feedback. We recognise that this will be a challenging and complex task and intend to work closely with the ICO to ensure that appropriate support is in place.

2.4 Improve regulators’ cost recovery mechanisms

2.4.1 Summary of intent

An effective regulatory regime requires independent, well-equipped regulators that are able to fully carry out all of their functions and help protect the key services our economy relies on. The current regulations need to be updated as they limit regulators’ ability to recover costs and creating cash flow challenges.

The government intends to improve the cost recovery regime and introduce a more modern, comprehensive, and flexible regime in line with other similar legislation in the UK. It will allow regulators to set a fees regime, recover costs, or a mixture of these processes to cover the expenses of this regulation, including enforcement, and reduce the need to pass regulatory costs to the taxpayer.

2.4.2 How the measure would work in practice

The Bill will introduce the ability for regulators to set up new fee regimes, allowing for fees to be levied as well as recovering costs via invoices. It will also clarify the intent and scope of the costs regulations and extend this regime to all activities necessary for the performance of the regulators’ functions, including enforcement.

This measure will introduce:

  • A power to request information from regulated entities, so that regulators can set appropriate fees, proportionate to the sectors they regulate;
  • A duty on regulators to publish a Statement of Charging Principles setting out the principles, methodology, and process for raising these funds, as is the practice across many regulatory frameworks;​
  • A duty on regulators to consult with their OES and firms that provide digital services when setting fees and a duty to issue an end-of-cycle statement setting out how these funds are being used;
  • A duty on regulated entities to pay the fee.​

This regime is intended to ensure that regulators operate at cost and are able to carry out the full extent of their functions.

2.4.3 Impact

The proposed measures will ensure that regulators are financially independent and capable of effectively performing their duties, including enforcement, by allowing them to proactively raise funds. In practice, we expect regulators to make varied use of these powers and incorporate them into their existing processes and legal duties.

Overall, we expect this measure will address current cash flow challenges and prevent the financial burden of regulation breaches from falling onto the taxpayer, thereby promoting a more transparent, robust, and reliable regulatory environment.

3.Ensuring the regulatory framework can keep pace with the ever-changing cyber landscape

New technologies and emerging threats require agile regulations. It is important for national security that our regulatory framework is not stagnant. The measure outlined in this section ensures that the government is not beholden to the timescales of primary legislation if the regulations require updating in the future.

3.1 Delegated powers – ensure the regulatory framework is adaptable to emerging threats

3.1.1 Summary of intent

In light of the rapidly evolving cyber threat and technology landscape, government must be able to update regulations to mitigate new risks and to capitalise on technological advancements. This measure seeks to grant new powers to the Secretary of State, enabling the legislative framework to be updated to ensure it is current and effective.

3.1.2 How the measure would work in practice

Through the Bill, the Secretary of State will seek powers to update the regulatory framework without requiring an Act of Parliament, subject to certain safeguards. Such powers could be used to bring new sectors and sub-sectors in scope of the regulations and make changes to the responsibilities and functions of NIS regulators. Delegated powers will enable the government, after any appropriate consultation, to introduce new requirements and duties for regulated entities, as further described above in sections ‘1.2 Strengthening supply chain security and enabling regulators to designate critical suppliers’ and ‘2.1 Technological and methodological security requirements’, where these are considered appropriate and proportionate to impose on digital firms or operators of essential services.

3.1.3 Impact

The proposed measure will ensure that cyber legislation remains relevant and effective by providing a mechanism for timely updates. This will enhance the UK’s regulatory framework, particularly in sectors critical to national security and economic stability. It also provides flexibility to these measures to adapt and accommodate changes in the CNI landscape. Ultimately, the measure will support and better maintain proportionality in regulation, and ensure ongoing protection of essential services, thereby benefiting both the government and the public.

Additional measures under consideration

The cyber landscape is constantly evolving, and cyber actors are changing their tactics to circumvent protections. In recognition of this, we have set out four measures under consideration, which are additional to the commitments made in the King’s Speech. The government will consider the most appropriate legislative vehicle to take forward these measures in due course, which could be this Cyber Security and Resilience Bill.

1. Bring data centres into scope of the regulatory framework

1.1 Summary of intent

Data centres house and support the technology and data that meet the demands of our digital lives. They underpin almost all economic activity and innovation, including the development of AI and other technology, public service delivery, and how we interact with one another. Disruption or compromise of data centre infrastructure can therefore have significant negative impacts on the public, businesses, and national and economic security.

Following the King’s Speech, data centres were designated as CNI in September 2024. In recognition of this, the government is committed to introducing proportionate regulatory oversight. Bringing data centres into scope of the regulations would strengthen and level the consistency of protection across the sector, provide a platform for secure growth and investment, and give government and a designated regulator the levers to steward the sector in the face of an evolving threat landscape in line with other CNI utilities.

1.2 How the measure would work in practice

Data infrastructure would be classified as a relevant sector and data centres an essential service. Based on feedback to the 2023 consultation, the government intends to include data centres within the scope of regulations irrespective of the nature of service(s) offered from them and their ownership.

UK data centres would be in scope at or above 1MW capacity unless it is an enterprise data centre which will only be in scope if they are at or above 10MW capacity.[footnote 5] The operation of a data centre (that meets the thresholds in the UK) will require duties to be met. This would include notifying and providing certain information, having in place appropriate and proportionate measures to manage risks, and reporting significant incidents.

The scope would be adjustable over time, under specified conditions, to account for developments in the market and risk landscape.

1.3 Impact

By bringing data centres into scope, the government aims to strengthen the protection of CNI and all it supports and enables. Externally commissioned research (2024) indicates that there are currently 224 colocation data centres in the UK, managed by 68 operators. Of these, around 182 third-party sites and 64 operators will fall within scope. We expect the number of enterprise data centres within scope of full duties to be relatively low.

This measure is designed to balance security and resilience with the need for growth and investment, recognising that they support each other. We therefore do not intend or expect responsible operators to incur significant compliance costs, but we would provide a full impact assessment upon legislating.

2. Publish a statement of strategic priorities for regulators

2.1 Summary of intent

As this Cyber Security and Resilience Bill will expand the scope of the regulations to bring in new sectors, consistency across different regulators and coherence of approach across sectors becomes increasingly important for regulators and the wider market. That is why we are considering a new measure to provide a clear and coherent framework for cyber security regulation across the twelve regulators and their sectors.

The government is considering introducing a new power for the Secretary of State to publish a Statement of Strategic Priorities. This measure draws on successful models from other regulatory regimes, such as telecoms and online safety, to establish a unified set of objectives and expectations for the implementation of the regulations.

2.2 How the measure would work in practice

The new measure would include a new duty for regulators, tied to the objectives contained within the statement. The objectives set out in a statement of strategic priorities would be developed in consultation with sectors and regulators periodically.

We propose that the Secretary of State would be required to consult with regulators before publishing a Statement of Strategic Priorities and, once issued, the Statement will need to be laid before Parliament to enable scrutiny.

A published Statement is intended to be updated once every three to five years and will be accompanied by a requirement for regulators to report annually on their progress against the objectives contained within the Statement.

2.3 Impact

The Statement would serve as a crucial instrument to streamline roles, responsibilities, and expectations, ensuring that all regulators, across all relevant sectors are implementing the regulations in a consistent manner. Reporting requirements would reassure ministers, the public, and Parliament that appropriate measures are being adopted across sectors.

3. Powers of direction

We are proposing new executive powers for government to enable swift and decisive action in response to cyber threats, ensuring rapid and effective protection.

Empowering the government to respond effectively is crucial for national security. The following powers would enhance our ability to protect critical infrastructure and essential services, strengthening the nation’s resilience in a digitally enabled economy.

Empower the Secretary of State to direct a regulated entity to take action, when it is necessary for national security.

3.1 Summary of intent

We are proposing a new power for the Secretary of State to issue directions to regulated entities, requiring them to take action to address threats to and incidents affecting their systems where there is a significant threat to national security.

At present, the government does not have a power to direct regulated entities to address cyber threats, even where this is judged to be essential for safeguarding national security. The growing threat posed by high capability actors and hostile states means that this is a gap that could be exploited with increasing regularity and impact, putting the operation of the UK’s critical infrastructure at risk.

This new measure would ensure the government can intervene directly to protect networks where necessary for national security.

3.2 How the measure would work in practice

We are considering equipping the Secretary of State with the power to issue a direction to a regulated entity in relation to a specific cyber incident or threat, requiring the entity to take action to remedy the incident or threat. The Secretary of State would only be able to issue a direction where necessary and proportionate for reasons of national security.

Where practicable and provided it would not compromise national security, an entity would be given the opportunity to make representations before it receives a direction.

Once issued, a direction would be laid in Parliament to enable public scrutiny, unless doing so would present a national security risk.

The Secretary of State would be responsible for monitoring and enforcing compliance with directions. We are considering the appropriate enforcement regime for the powers, recognising the importance of complying with a direction for national security reasons. We will also consider the precedents set by the Telecommunications (Security) Act 2021.

3.3 Impact

The power to direct regulated entities would ensure that the government can respond swiftly to incidents and threats with significant national security risks – protecting critical infrastructure from sophisticated cyber threats.

Empower the Secretary of State to direct a regulator to take action when it is necessary for national security.

3.4 Summary of intent

We are considering equipping the Secretary of State with a new power to issue a direction to a regulator on national security grounds, requiring them to exercise their functions to ensure that action is undertaken across their sectors. 

The current system requires regulated entities to undertake ‘appropriate and proportionate’ measures to secure themselves against cyber threats, and regulators issue guidance to their sectors to help them interpret this duty. However, the Government currently lacks the ability to require regulators to, for example, issue guidance stating that ‘appropriate and proportionate’ security measures are likely to require certain levels of network monitoring and testing. This presents a gap if the Government considers that more stringent security measures are required due to a worsening threat landscape. 

This measure is intended to address this gap, by providing the Secretary of State with the power to direct regulators to advise their sectors to adopt more stringent cyber security measures, where this is necessary for national security. 

3.5 How the measure would work in practice 

Secretary of State would have powers to issue a direction to regulators. The power would only be used where necessary for national security, and where the impact of a direction is deemed to be proportionate. 

We would set out requirements for regulators in receipt of a direction to submit reports to the Secretary of State, outlining how they have implemented the direction. 

The Secretary of State would not be able to issue directions to other Secretaries of State or Devolved Governments.

3.6 Impact

The power to direct regulators would serve as an essential tool to ensure that whole sectors are more resilient against cyber security threats in periods of heightened risk.

Conclusion

Changes in global politics and developments in technology mean that the UK is facing greater challenges to its cyber security than ever before. The proposals that we have put forward in this statement aim to meet those challenges, providing robust measures to address the evolving threat landscape.

It is clear that this is the right time to update the UK’s legacy frameworks, address gaps in the current regulation, and ensure that all relevant entities are brought within scope of the rules. Through these measures, we will make sure that our critical infrastructure and services remain protected – for people across the UK to rely on.

Our proposals will ensure that critical infrastructure is protected from hostile actors – securing essential services, such as the NHS and energy providers. Improved standards and regulation will also foster the secure networks and systems that are essential for business growth and innovation.

This Cyber Security and Resilience Bill is one essential tool in the government’s wider approach to addressing the threat posed by cyber attacks, reflecting our commitment to safeguarding the digital economy through a wider tapestry of measures and initiatives. It reflects the government’s commitment to safeguarding the digital economy through a wider tapestry of measures and initiative.

  1. Organisations that operate services that are deemed critical to the economy and wider society. They include critical national infrastructure (water, transport, energy) and other important services, such as healthcare and digital infrastructure. 

  2. Firms covered could include but not limited to those offering services such as managed IT services, IT infrastructure and applications management, IT remote support and systems integration and management (SIAM), managed security services such as and managed security service providers (MSSPs), managed secure operations center (SOC), security information and event management (SIEM), incident response and threat and vulnerability management and relevant business process outsourcing. 

  3. By “relevant digital service providers” we mean the providers of the kind of digital service defined under NIS Regulations 2018 Regulation 1(2). Currently this refers to online marketplaces, online search engines and cloud computing services. In future, this will also include managed service providers once brought into scope of the regulatory framework through the Bill. 

  4. Research on UK managed service providers 

  5. Enterprise data centres are those operated by a business solely to deliver and manage the IT needs of the business.