Securing Information
Strengthening Business

Cyber Security for Government Suppliers: New IA Frameworks and Standards Are On the Way

Padlocked keyboardBusiness organisations, including the Institute of Directors (IoD) and the Federation of Small Businesses (FSB) are warning that firms need to actively manage their information risk in order to avoid the growing threat of cyber crime. For any business that is handling government information, there are important steps that must be taken — as well as the prospect of new guidelines this Autumn.

Is your firm in the HMG supply chain?

If your company supplies goods and services directly to the government (HMG) then you are undoubtedly already aware of the growing importance of protecting government information in the face of increasing risks. Your company, or parts of it, may be authorised to hold Protectively Marked client information. So you will know all about the need to demonstrate compliance with HMG Information Assurance (IA) standards and the need for an effective regime for managing information risk.

But what about the other companies that supply HMG organisations — either directly or indirectly — and who hold their client’s data? Many firms are a part of the government supply chain even if they are not long-standing HMG suppliers. If you are handling HMG information and don’t know what HMG IA standards are, or are not sure whether they apply to you or not, then this blog is for you.

How does this affect your firm?

HMG organisations are subject to the government Security Policy Framework (SPF) . Mandatory requirement number 5 of the SPF states that an effective system must be in place to ensure that: “security arrangements are fit for purpose, that information risks are appropriately managed, and that any significant control weaknesses are explicitly acknowledged and regularly reviewed”. This applies to the organisation, its delivery partners and its supply chain.

Delivery partner and supply chain organisation security has been a real thorn in the side of HMG organisations which have been trying to figure out how best to meet this requirement. To address this, the Home Office operates the HADRIANprocess of IA assessment of its supply chain companies. More recently the MoD has been developing a framework for IA assessment through the Defence Cyber Protection Partnership (DCPP) which: “seeks to implement controls to increase supply chain security as quickly as possible“. The framework is to be agreed by September 2013 and then once that is achieved: “DCPP members will begin work on extending the controls throughout their supply chains including to small and medium sized enterprises“. (You can find out more in this article – Defence Partnership Tackles Cyber Security Risks ).

In addition, government has engaged with the Intellect group to gain industry input on a cyber security standard by October 2013. Once that has been agreed it is likely that this will be put to industry as best practice for information risk management. So, either via schemes such as HADRIAN, DCPP or other regimes, the requirement for supply chain companies to demonstrate their IA maturity is set to increase.

How big is the threat of cyber crime?

Many companies are already realising the need to improve their information risk management processes to counter the cyber threat. The recent paper from the Director of GCHQ for the Institute of Directors, Countering the Cyber Threat to Businessidentified the risks to commercial companies and advocated following 10 steps to manage information risks .

“Cyber security is a corporate-level risk that all boards, in both the private and public sectors, need to own directly. The cyber threat applies to all, regardless of size or location”.

A report from the Federation for Small Businesses in May 2013identified the £785 million cost of cyber crime to UK industry and also advocated the same 10 basic security steps.

So, if you supply goods and services to HMG organisations, either directly or indirectly, you should consider reviewing what HMG information assets you are responsible for, and how you are protecting them in line with current standards such as ISO27001 or any possible future HMG standards that may be imposed. And you must be prepared to demonstrate that to clients.

Your next steps to managing risk

You need to know what information assets you have that need protecting and then implement effective information risk management. As a result, your business will be able to take advantage of commercial opportunities by making informed risk management decisions. Critically, by managing risk proactively you will also inspire the confidence of clients and partners, demonstrating that you can protect their information as well as your own.

Follow these four steps:

  1. Improve your information risk management by gaining certification to ISO2700.
  2. Take our online risk assessment to see if you are on the track towards IA maturity.
  3. Read our Board’s Guide to Information Risk Management .
  4. Contact an experienced IA company like Ascentor to conduct an IA gap analysis .

Article by Steve Maddison , Director and Principal Consultant at Ascentor.

For Further Information

If you have any questions about the topics we've covered, or would like to have a chat about any aspect of your own cyber security strategy, please get in touch with the team at Ascentor.

Please use the contact details below - also found on our Contact Us page.


Fields marked with an * are required
Share this:

You may also be interested in:

Building business resilience - through Information Security, Business Continuity and Disaster Recovery

How would you recover if something went drastically wrong with some, or all of your business operations? When we think of worst case scenarios,

What’s the difference between cyber security and cyber resilience – and why does resilience matter?

It’s a question we get asked at Ascentor and a Google search will often see returns for ‘cyber security vs cyber resilience’ – as if there’s some

The most popular cyber security standards explained