Published on PublicTechnology.net (https://publictechnology.net)

Home > Government proposes tougher cyber laws for IT outsourcers

Government proposes tougher cyber laws for IT outsourcers

Written by Sam Trendall on 24 January 2022 in News
News

Consultation launched on possible expansion of NIS regulations

Credit: Nick Youngson [1]/CC BY-SA 3.0 [2]

The government has proposed imposing stricter cybersecurity regulation on firms providing outsourced IT services.

A consultation process was launched last week to gather feedback on a range of proposed measures the government believes could “improve the UK’s cyber resilience”.

The first core proposal is to expand the scope of the Network and Information Systems regulation introduced in 2018. The legislation sets out the cybersecurity and data-protection obligations of firms that provide cloud hosting or online services, such as search engines and marketplaces.

Firms found to have breached their NIS duties can be fined up to £17m.

The government plans to extend the rules to cover companies that provide IT outsourcing and managed services to private- and public-sector customers. This would mean many companies delivering billions of pounds’ worth of technology and business-process services to government would face new obligations to implement risk-assessment and governance procedures. Firms would also be asked to demonstrate that they had “put in place reasonable and proportionate security measures to protect their network”.

The plans call for all cyberattacks – and not just those that cause service disruption – to be promptly reported to the relevant regulators. IT providers would further be required to provide details of “plans to ensure they quickly recover from them”.


Related content

  • Cabinet Office to blacklist underperforming outsourcers under new procurement rules [3]
  • New cyber laws aim to ‘put a firewall around’ citizens’ smart devices [4]
  • Ex-NCSC chief Martin asks whether the new cyber strategy will make the UK safer [5]

The costs incurred by regulators in enforcing the NIS guidelines, meanwhile, would be met entirely by firms in scope of the rules – rather than the taxpayer, the government has proposed.

The second central proposal is intended to “give the government the ability to future-proof the NIS regulations by updating them and, if necessary, bring into scope more organisations in the future which provide critical support to essential services”.

The third proposal, which is the subject of its own discrete consultation process, is to create and implement industry-wide “standards and pathways” for cyber companies and professionals.

Introducing the proposals, Julia Lopez, the minister for media, data and digital infrastructure, pointed to the impact on cyberattacks perpetrated against software firm SolarWinds and the US Colonial oil pipeline.

“Five years ago, few people outside of the tech industry had heard of managed service providers. Cloud was the big thing that was going to change the world – and many argue it has already,” she said. But managed services such as remote security operations, automatic patching, and digital accounts and billing were considered mainly as corporate benefits, a means to improve services and reduce costs. What was not recognised until recently, was that having companies with the ability to automatically access the networks of thousands of other companies, would create a unique security threat. One that can, and has, been exploited by our adversaries. Rather than having to exploit vulnerabilities in thousands of companies, the threat can manifest itself only through a small proportion of those organisations.”

She added: “These companies provide an essential service to other businesses and organisations. They allow other companies to thrive and are helping the UK develop its digital economy. We do not want to interfere in their ability to operate. But they do create risks which we need to manage, especially when their clients include government departments and critical infrastructure. Our proposals here are aimed at addressing these risks, whilst allowing these services to continue and succeed. Through these proposals, we will provide a comprehensive framework to ensure that managed services, of the kind mentioned above, take appropriate and proportionate measures to secure their services. This will allow us to gain from their benefits, whilst mitigating against their risks.”

The consultation on standards for the cybersecurity profession is open [6] until 20 March, while the consultation on expansion of the NIS runs until [7] 10 April. 

 

About the author

Sam Trendall is editor of PublicTechnology. He can be reached on sam.trendall@dodsgroup.com [8].

Tags
Cybersecurity [9]
Policy [10]
Categories
Business and industry [11]
Education and skills [12]
#block-views-events-popup-block{ position: fixed; bottom: -30px; padding: 25px 22px; width: 360px; max-width: calc(100% - 30px); text-align: center; border-radius: 0 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; -ms-transform: translateY(100%); -webkit-transform: translateY(100%); transform: translateY(100%); -webkit-transition: all .35s ease-in-out; transition: all .35s ease-in-out; z-index: 2; } #block-views-events-popup-block.show{ bottom:10px; transform:none; -webkit-transform:none; } #block-views-events-popup-block a.btn.btn--outlineWhite { border-color: #fff; color: #fff; background: transparent; } #block-views-events-popup-block .events-popup-close{ position: absolute; cursor: pointer; top: -30px; left: 0; height: 32px; padding: 7px 20px; border-radius: 4px 4px 0 0; color: #fff; background: rgb(0, 170, 200) none repeat scroll 0% 0%; font-size: 13px; } #block-views-events-popup-block .events-popup-close .icon--events-popupClose{ padding-left: 10px; font-family: inherit !important; } #block-views-events-popup-block .icon--events-popupClose:before { content: ''; width: 12px; height: 12px; margin: -1px 7px 0 0; background: url(https://www.publictechnology.net/sites/www.publictechnology.net/themes/pubtech_override/img/close-thin.svg) center no-repeat; background-size: 10px; vertical-align: middle; position: absolute; left: 10px; top: 10px; } #block-views-events-popup-block .views-field.views-field-nid .field-content{ display:none; }

jQuery(window).load(function() { if(jQuery('#event-popup-nid').length){ var eventId = jQuery('#event-popup-nid').text(); jQuery.cookie('eventPageId',eventId); var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; var combinedValueValue = eventId+'-'+countCurrentValue; var countCurrentValue = parseInt(jQuery.cookie('countCurrentName')) || 1; jQuery.cookie('combinedValueName',combinedValueValue); const result = combinedValueValue.split('-'); if( result[1] <= 3 ) { jQuery('section#block-views-events-popup-block').addClass('show'); countCurrentValue = parseInt(result[1]) + 1; jQuery.cookie('countCurrentName',countCurrentValue); combinedValueValue = eventId+'-'+countCurrentValue; jQuery.cookie('combinedValueName',combinedValueValue); } jQuery('.events-popup-close').click(function(){ jQuery('section#block-views-events-popup-block').removeClass('show'); }); } });

(function(e,t,o,n,p,r,i){e.visitorGlobalObjectAlias=n;e[e.visitorGlobalObjectAlias]=e[e.visitorGlobalObjectAlias]||function(){(e[e.visitorGlobalObjectAlias].q=e[e.visitorGlobalObjectAlias].q||[]).push(arguments)};e[e.visitorGlobalObjectAlias].l=(new Date).getTime();r=t.createElement("script");r.src=o;r.async=true;i=t.getElementsByTagName("script")[0];i.parentNode.insertBefore(r,i)})(window,document,"https://diffuser-cdn.app-us1.com/diffuser/diffuser.js","vgo"); vgo('setAccount', '253344499'); vgo('setTrackByDefault', true); vgo('process');
Close
Sign up for our free daily newsletter
Register here
6472
Dods PublicTechnology.net is a Merit Group plc title

Quick Links

  • Home
  • News
  • Opinion
  • Features
  • Private Sector Insight
  • Cyber Week
  • White Papers
  • Events
  • On Demand Webinars
  • Partner Directory
  • About
  • Contact

Services

Dods People Dods Political Intelligence Dods ResearchDods EventsDods Training

Media & Publishing

PoliticsHome Parliament MagazineHolyroodThe House MagazineCivil Service WorldTraining Journal

About Dods

Dods Group Part of Merit Group Privacy Policy Terms & Conditions Advertising Sponsorship
Privacy PolicyTerms & ConditionsAdvertisingSponsorship Subscriptions
  • Registered office: 11th Floor
  • The Shard
  • 32 London Bridge Street
  • London SE1 9SG
  • Company number: 04267888
  • © Merit Group plc 2021

Source URL: https://publictechnology.net/articles/news/government-proposes-tougher-cyber-laws-it-outsourcers

Links
[1] http://www.nyphotographic.com/
[2] https://creativecommons.org/licenses/by-sa/3.0/
[3] https://www.publictechnology.net/articles/news/cabinet-office-blacklist-underperforming-outsourcers-under-new-procurement-rules
[4] https://www.publictechnology.net/articles/news/new-cyber-laws-aim-%E2%80%98put-firewall-around%E2%80%99-citizens%E2%80%99-smart-devices
[5] https://www.publictechnology.net/articles/opinion/ex-ncsc-chief-martin-asks-whether-new-cyber-strategy-will-make-uk-safer
[6] https://www.gov.uk/government/consultations/embedding-standards-and-pathways-across-the-cyber-profession-by-2025
[7] http://www.gov.uk/government/consultations/proposal-for-legislation-to-improve-the-uks-cyber-resilience
[8] mailto:sam.trendall@dodsgroup.com
[9] https://publictechnology.net/tags/cybersecurity
[10] https://publictechnology.net/tags/policy
[11] https://publictechnology.net/categories/business-and-industry
[12] https://publictechnology.net/categories/education-and-skills